| Literature DB >> 34109006 |
Princy Ann Thomas1, K Preetha Mathew2.
Abstract
Authentication is the process of keeping the user's personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Traditionally, a one-time login based credential verification method was utilized for user authentication. Recently, several new approaches were proposed to enhance the user authentication framework but those approaches have been found inconsistent during the authentication execution process. Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics. These authentication models are evaluated in a continuous non-user authentication environment and their results have been presented in way of tabular and graphical representation. Also, the common merits and demerits of the discussed authentication systems are broadly explained discussion section. Henceforth, this study will help the researchers to adopt the best suitable method at each stage to build an authentication framework for non-intrusive active authentication.Entities:
Keywords: Biometric; Keystroke dynamics; Mouse dynamics; User authentication; Voice recognition
Year: 2021 PMID: 34109006 PMCID: PMC8177270 DOI: 10.1007/s12652-021-03301-x
Source DB: PubMed Journal: J Ambient Intell Humaniz Comput
Fig. 1Voice recognition system
Merits and demerits of voice authentication system
| Authors | Methods | Merits | Demerits |
|---|---|---|---|
| Almaadeed et al. ( | Decision based robust procedure | Here, the developed model has utilized the coefficients of mel-frequency to process the audio signal. Finally, the developed strategy has gained accuracy as 98.2% | If the dataset is complex then the developed frame model has gained high error rate and this leads to fall in accuracy rate Moreover, the key reason for achieving high error percentage is in this model the coefficients of linear function is not defined |
| Sizov et al. ( | Backend scheme | It has gained the finest accuracy rate with short duration | The chief limitation behind in this model is similar voice features were trained to verify the own users. Thus, the proposed system is not applicable in miss- match model |
| Medikonda et al. ( | Twofold dataset | The proposed scheme is evaluated under three diverse datasets and has diminished computational complexity and simulation time | But in some cases, it lacks in security because of high noise signal |
| Gałka et al. ( | Embedded scheme | Here, the experimental works are done to validate the system reliability and function rate | However, the voice recognition model using micro processer paradigm is quite complicated task because of its memory size and processor components |
| Navarro et al. ( | Microprocessor- MicroBlaze in FPGA | The scheme required less period for voice recognition | In some circumstances, the gadget architecture needs some modifications and updates to perform voice verification system process. So, the FPGA frame needs more memory spaces to execute the function |
Fig. 2Keystroke events
Advantages and disadvantages of mouse dynamics
| Authors | Methodsa | Advantages | Disadvantages |
|---|---|---|---|
| Antal and Egyed-Zsigmond ( | Performance assessment using Balabit data | All events of mouse scroll functions are recorded. Number of features extracted is 13. Positive result from test 411 and negative result from test 405 | The process execution in short duration might cause dataset error, this tends to gain very less accuracy |
| Kasprowski and Harezlak ( | Eye moving and mouse dynamics frame | The projected scheme has gained better exactness measure and less error rate | Here, the eye statics are recorded in the less frequency; in that case, the designed scheme has obtained high flaw measure |
| Tan et al. ( | Balabit attack mitigation frame using neural network in mouse dynamics | By developing this scheme in mouse dynamics frame, the risk occurrence has reduced | It takes more time to execute the process. Also if the data is complex then wide range of flaw is recorded |
| Ahmed and Traore ( | Neural scheme configuration | Here, the designed neural network automatically predicts and records the mouse action events by its classification process. Thus it has gained good exactness measure | The drawback behind in this model is screen resolution because the signature is recorded in one range of resolution and the user detection is happened in other resolution. Thus it minimizes the accuracy measure. The next one is accelerator setting; the adjustment in rapidity settings can affect the system operation |
| Revett et al. ( | Graphical authentication procedure | Based on the key parameters the original users were detected. Hence the parameters are distance angle and speed | This system model detects the user by analysing the time of each user action. So only few attributes are applicable to carry this process. If the large size of dataset is trained then wide range of flaw measure is recorded |
| Shen et al. ( | Dimensional reduction | It was executed in short duration with high accuracy | Here, the investigation is made on 10 computer users’ actions. So if the diverse dataset is trained then the detection performance might be diminished |
| Feher et al. ( | Random forest scheme | Simple to design the model, also wide range of accuracy improvement for verification is recorded | Diverse kind of mouse and mouse pads were diminished the system functions. Also, maximum time is needed to attain the finest point. On the other hand, the system contains maximum number of instances thus it has needed more memory space to run the execution |
| Lin et al. ( | Double frame classifier with regression model | In this scheme, the unwanted characters are removed in the initial layer of regression function. Hereafter, error mined data is entered into the classification layer to verify the original users | By the experimental evaluation, the projected scheme has obtained high false measure rate |
| Sayed et al. ( | Static authentication by neural scheme | The amount of data utilized for verification is 39 Testing samples 4, merits of this system is it has improved the identification measure. Here, the own users are recognized by their gestures | It has gained high flaw rate and less exactness measure. Moreover, the security aspects also questionable in this scheme |
| Ernsberger et al. ( | Mouse dynamics visualization system | This process is executed in short duration, verification process relatively very fast | Lacks in security against reply attack. Moreover, the system is operated in complex platform. Also, the developed framework is vulnerability for automated attacks |
| Cai et al. ( | Dimension reduction schemes | The matching variability has diminished by 76%. In all test cases, the process of feature space has gained better results | But identifying an appropriate feature space for real time application is a big threat in the mouse dynamics |
| Hinbarji et al. ( | Back propagation based neural scheme | The proposed frame is tested with real time datasets Here, the features of mouse action events were extracted | It takes more time to run the process. Also, only features of actions are extracted, verification frame is not implemented |
| Shen et al. ( | Permutation of conventional mouse | The trust model is built for all users, Attained high secure range. There is no specific gadget to capture or record the mouse action data | But this model is lacked standard validation and common dataset. However, it is not applicable for real time environment |
aFew procedures of mouse dynamics
Events of mouse action captured
| Feature description | Definition |
|---|---|
| Mouse event | e |
| Horizontal coordinate (x-axis) | |
| Vertical coordinate (y-axis) | |
| Timestamp | |
| Starting timestamp of a sequence of movements | |
| Ending timestamp of a sequence of mouse movements | |
| No of mouse movements for a given event | |
| No of pixels in a mouse path from origin | |
| Slope angle of tangent | |
| Average of mouse movements for each event in a given direction | |
| Standard deviation of mouse movement for each event | |
| Movement offset | |
| Movement elapsed time (MET) | |
| Curvature from point i to point j | |
| Speed of curvature | |
| Acceleration of curvature |
Fig. 3Non-intrusive user authentication system architecture
Fig. 4Graphical representation of Keystroke authentication. a Monograph, b digraph and c tri-graph
Experimental results of mouse and keystroke dynamics of the same dataset
| Experimental results of mouse and keystroke dynamics of the same dataset in uncontrolled environment with different sets of user data | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Keystroke authentication | Mouse authentication | ||||||||||||
| Monograph | Digraph | Trigraph | |||||||||||
| Usersa | 5 | 15 | 30 | 5 | 15 | 30 | 5 | 15 | 30 | 5 | 15 | 30 | |
| DT | 0.987 | 0.935 | 0.827 | 0.923 | 0.911 | 0.876 | 0.946 | 0.922 | 0.898 | DT | 0.956 | 0.944 | 0.829 |
| RF | 0.998 | 0.966 | 0.883 | 0.981 | 0.956 | 0.904 | 0.998 | 0.991 | 0.907 | RF | 0.978 | 0.934 | 0.917 |
| KNN | 0.999 | 0.983 | 0.875 | 0.984 | 0.974 | 0.882 | 0.999 | 0.921 | 0.833 | SVM | 0.958 | 0.956 | 0.899 |
| NN | 0.924 | 0.886 | 0.652 | 0.52 | 0.652 | 0.556 | 0.891 | 0.895 | 0.886 | – | – | – | – |
aClients
Fig. 5Graphical representation of mouse dynamics based authentication
Fig. 6Issues in verification system
Fig. 7Keystroke authentication process
Performance and methods assessment
| Authors | Data captured | Method | Analysis | Performancea (%) | ||
|---|---|---|---|---|---|---|
| FAR | FRR | EER | ||||
| Gunetti and Picardi ( | Restricted free text Custom interface, text of 700 to 900 words | Statistics | Timing information | 0.01 | 5 | 0.5 |
| Galka et al. ( | Restricted free text. A collection of passwords chosen by user with length less than 20 characters are typed by user | Statistics | Timing information | 0.47 | 0 | 0.1 |
| Chang et al. ( | Fixed text | Machine learning | Timing information of tying and cognitive factors | 0.055 | 0.03 | 0.6 |
| Password | ||||||
| Pisani et al. ( | Fixed text | Machine learning | Timing information | 0.035 | 0.148 | 0.2 |
| Agarwal and Jalal ( | Restricted free text | Statistical and pattern recognition | Timing information | 0.025 | 0.026 | 20 |
| Kang and Cho ( | Fixed text | Statistical and machine learning | Timing information | 0.06 | 0.058 | 6 |
| Morales et al. ( | Restricted free text | Statistical | Timing information | 5.3 | 90.5 | 0.9 |
| Li et al. ( | Restricted free text | Machine learning | Timing information and other non-conventional information | 0.000 | 0.000 | 0.1 |
| Tirkey and Saini ( | Restricted free text | Machine learning | Timing information | 0.25 | 0.02 | 2.95 |
| Lin et al. ( | Primary data (22 users) | Limited data, average speed per distance | ANN | 2.4 | 6.49 | 2.4614 |
| Revett et al. ( | 6 user primary data | Information is demonstrated as digraph | statistics | 0.02 | 0.05 | 2.5 |
| Baró et al. ( | 10 users primary data | Statistics collection mouse movement | ANN | 0.055 | 0.03 | 0.3 |
| Bours and Fullu ( | 28 users primary data | Acceleration mouse movement | Data estimation | 0.04 | 0.02 | 0.4 |
| Jorgensen and Yu ( | 17 users primary data | Limited data | Logic classifiers | 0.03 | 0.03 | 0.49 |
| Zheng et al. ( | Primary data | Angle-based metrics: way, angle of curving and bend detachment | SVM | 0.05 | 0.04 | 0.013 |
| Feher et al. ( | 25 users | Mouse movement identification | Random forest classifier | 0.08 | 0.09 | 0.1 |
| Lin and Kumar ( | Primary data 20 users | mouse acceleration | Dimensionality reduction | 0.0 | 0.0 | 0.12 |
| Mondal and Bours ( | Primary data 49 users | Mouse action | Classifier | 0.08 | 9.6 | 0.8 |
aMetrics analysis
Statistics of some authentication models
| Referencesa | Model | Score (training set) | Score (validation set) | Examine score | Measure of cross validation | Parameters | Accuracy | Precision | Recall | AUC | F-measure | Malicious scan code (%) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Shen et al. ( | Kernel model | 0.97 | 0.962 | 0.962 | 0.962 | Neighbours 1 | 95 | 92 | 70 | 91 | 79 | 80 |
| Wu et al. ( | Logic based regression | 0.96 | 0.961 | 0.953 | 0.967 | Count 10,000 | 95 | 97 | 64 | 94 | 77 | 82 |
| Lai et al. ( | Linear model | 0.90 | 0.88 | 0.9 | 0.89 | – | 90 | 97 | 20 | 94 | 34 | 84 |
| Rezaei et al. ( | Multi-layer model | 0.961 | 0.951 | 0.95 | 0.964 | Count 1000 | 94 | 97 | 59 | 94 | 74 | 84 |
| Kambourakis et al. ( | Random forest model | 1 | 0.96 | 0.95 | 0.968 | Estimators 14 | 95 | 83 | 73 | 94 | 78 | 86 |
| Giot et al. ( | Support vector frame | 0.96 | 0.95 | 0.951 | 0.962 | 100 | 95 | 97 | 61 | 94 | 75 | 88 |
| Kiyani et al. ( | Gradient boost model | 0.98 | 0.95 | 0.96 | 0.966 | Learning rate (1,0) | 90 | 69 | 69 | 94 | 78 | 87 |
| Sheng et al. ( | Decision based approach | 1 | 0.96 | 0.95 | 0.978 | Depth 3 | 96 | 97 | 61 | 94 | 75 | 86 |
| Barkadehi et al. ( | Text based frame (password cracking) | 0.76 | 0.74 | 0.75 | – | Cracking time 60% | 99 | 98 | 42 | 95 | 60 | 20 |
| Rybnik et al. ( | Fixed text | 0.76 | 0.75 | 0.1 | 0.75 | K = 1 | 90 | 89 | 65 | 88 | 68 | 23 |
| Shen et al. ( | One class analysis model | 0.65 | – | 0.67 | 0.694 | Training model 6 | 76 | 75 | 53 | 62 | ||
| Bailey et al. ( | Behavioural based systems | 0.74 | 0.73 | 0.65 | 0.72 | Training statistics 30 samples | 99.39 | 77 | 98 | 80 | – | |
| Stanić ( | Application frame model | 0.81 | 0.82 | 0.83 | 0.867 | 100 samples | 95 | 97 | 61 | 94 | 75 | 88 |
aWorks done in past
Fig. 8Analysis of key and mouse dynamics authentication system
Fig. 9Key metrics validation: a kernel model, logic regression, linear model, multi-layer approach, RF, support vector, b decision based approach, text based frame, fixed text, one class analysis frame, behavioral based scheme
Fig. 10Score of training and examination: a kernel model, logic regression, linear model, multi-layer approach, RF, support vector, b decision based approach, text based frame, fixed text, one class analysis frame, behavioral based scheme
Fig. 12Trend of research works towards non-user continuous authentication by voice recognition, mouse and keystroke dynamics
Fig. 11Measure of EER, FRR and FAR
Common pros and cons of behavioral biometric techniques for active authentication
| Pros and consa of behavioral biometric system for active authentication | ||||
|---|---|---|---|---|
| Behavioral biometric | Operating method | Prominent algorithm | Pros | Cons |
| Voice biometric recognition | Text independent speaker verification | Gaussian mixture model | Input can be hands off through microphone Unique speech patterns can be used for secure access Can be used by people with physical handicap Suitable for remote access Many devices have built in voice recognition | System needs to be trained separately for each user System may not work for different pronunciations and languages FRR is generally high especially with external noise Algorithms show less accuracy when training and testing environment differs |
| Keystroke dynamics | Free text | SVM | Discriminative capacity Low cost since no extra hardware needed Adds to traditional security systems Time to identify intruder is comparatively less | Tends to change quickly over time Performance depends on several extraneous factors like mental state of the user. Security issues are not widely addressed Comparatively few research on free text The efficiency of the Algorithm depends on the used or trained features |
| Mouse dynamics | Dynamic mouse movement | RF | Used for most system activity Discriminative capacity Enhance security Non-intrusive | Limited range of activities Time to time the actions are differed Performance depends on factors like distance from the mouse, state of mind, and so on Security issues need to be researched Algorithm efficiency depends on features used Time to identify intruder is generally high |
aAdvantages and disadvantages