Behavior Based Authentication using Gestures and Signatures

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=sAf7vuKRJoI



Duration: 36:07
471 views
6


Research community has done a significant amount of work on authenticating users based upon their typing behavior. The arrival of touch interface devices has opened up a new direction for research in user authentication. We explore two ideas of authenticating the users on touch screen devices: 1. Identifying distinct patterns in the way a user performs certain gestures on the touch screen and using those patterns to authenticate the user 2. Identifying distinct behavioral patterns in the way a user performs his/her signature and using those patterns to authenticate the user The use of a set of predefined gestures eliminates the need to remember a password. The user is shown the gesture that he needs to perform and all he has to do is to perform that gesture on the screen. Using the training data, the gesture is evaluated and decision is made whether the user is a legitimate user or an imposter. For now, we have evaluated this scheme only on smart phones. The idea of authenticating the user using his behavior of performing the signature is evaluated for tablets. The user is required to do his signature on the touch screen for authentication. The behavior of doing the signature is evaluated using the training data and a classification decision is made. Forging of signature has always been a problem. Our scheme eliminates this problem. If a signature has been very accurately copied such that the forged and actual signatures look exactly alike, a human eye can usually not distinguish between the two. We will show that our scheme can distinguish even between signatures that look alike to the point that a human eye cannot distinguish between them.




Other Videos By Microsoft Research


2016-08-01Achieving Household Energy Breakdown at Scale
2016-08-01Verifying Constant-Time Implementations
2016-07-28Quantum Computation for Quantum Chemistry: Status, Challenges, and Prospects - Session 3
2016-07-28Asymptotic behavior of the Cheeger constant of super-critical percolation in the square lattice
2016-07-28Recovering Washington’s Wolves & Preserving the Critical Link
2016-07-28The similarity distance on graphs and graphons
2016-07-28Neural Acceleration for General-Purpose Approximate Programs
2016-07-28Snow Hydrology at the Scale of Mountain Ranges
2016-07-28Vote Privacy, Revisited: New Definitions, Tools and Constructions
2016-07-28Dispelling an Old Myth about an Ancient Algorithm
2016-07-28Behavior Based Authentication using Gestures and Signatures
2016-07-28Approximating the Expansion Profile and Almost Optimal Local Graph Clustering
2016-07-28Stochastic Dual Coordinate Ascent and its Proximal Extension for Regularized Loss Minimization
2016-07-28A Practical Approach to Reduce the Power Consumption of LCD Displays
2016-07-28CryptDB: Processing Queries on an Encrypted Database
2016-07-28Performing Time, Space and Light
2016-07-28Probabilistic Methods for Efficient Search & Statistical Learning in Extremely HighDimensional Data
2016-07-28Quantum Computation for Quantum Chemistry: Status, Challenges, and Prospects - Session 4
2016-07-28Quantum Computation for Quantum Chemistry: Status, Challenges, and Prospects - Session 2
2016-07-28Quantum Computation for Quantum Chemistry: Status, Challenges, and Prospects - Session 1
2016-07-28Bug Finding Techniques for Programs with Infinitely Many States



Tags:
microsoft research