Abstract

Many biometric systems based on physiological traits such as ones facial characteristics, iris, and fingerprint have been developed for authentication purposes. Such security systems, however, commonly suffer from impersonation attacks such as obfuscation, abrasion, latent samples, and covert attack. More conventional behavioral methods, such as passwords and signatures, suffer from similar issues and can easily be spoofed. With growing levels of private data readily available across the internet, a more robust authentication system is needed for use in emerging technologies and mobile applications. In this paper, we present a novel multimodal biometric user authentication framework by combining the behavioral dynamic signature with the the physiological electroencephalograph (EEG) to restrict unauthorized access. EEG signals of 33 genuine users were collected while signing on their mobile phones. The recorded sequences were modeled using a bidirectional long short-term memory neural network (BLSTM-NN) based sequential classifier to accomplish person identification and verification. An accuracy of 98.78% was obtained for identification using decision fusion of dynamic signatures and EEG signals. The robustness of the framework was also tested against 1650 impersonation attempts made by 25 forged users by imitating the dynamic signatures of genuine users. Verification performance was measured using detection error tradeoff (DET) curves and half total error rate (HTER) security matrices using true positive rate (TPR) and false acceptance rate (FAR), resulting in 3.75% FAR and 1.87% HTER with 100% TPR for forgery attempts.

Highlights

  • IntroductionCamouflaging information with a practice called steganography was used to send data from one place to another, hiding information in the hair of a messenger, within a wax table, or using secret vanishing ink

  • Privacy of data has been a concern since ancient times

  • The decision of a genuine or forged user was governed based on a threshold value determined to maximize the true positive rate and minimize the false acceptance rate

Read more

Summary

Introduction

Camouflaging information with a practice called steganography was used to send data from one place to another, hiding information in the hair of a messenger, within a wax table, or using secret vanishing ink Since these early strategies, many more methods have evolved to secure data, including digital watermarking, the use of puzzles, patchworks, chameleon schemes, etc. A skilled forgery detection scheme for dynamic signature based versification systems was developed using kinematic theory and sigma-log normal features [13]. Their scheme required skilled forgeries to train the skilled detector. Forgery detection was based on angle features extracted using a grid method which were fuzzified by an exponential membership function

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call