期末展示情境
This presentation is the property of its rightful owner.
Sponsored Links
1 / 16

期末展示情境 PowerPoint PPT Presentation


  • 138 Views
  • Uploaded on
  • Presentation posted in: General

期末展示情境. 2013/10/07. 研究內容. 功能性需求與過去 大致 相同 (2010/8-2013/7) 使用者識別 / 服務管理 / 使用者 註冊 .. 主要 針對 非能性 加強 ( 為了提升 識別效果與應用情境 ) 1 st . 增加 一個 Sensor (Dynamics Approach ) 提升識別率 快速回應識別結果 (/flick) 2 nd . 研發 另一個 Approach (Histogram Approach ) 測試資料累積到一定量, 識別率會比 dynamics 高 (90%)

Download Presentation

期末展示情境

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


2391362

期末展示情境

2013/10/07


2391362

研究內容

  • 功能性需求與過去大致相同(2010/8-2013/7)

    • 使用者識別/服務管理/使用者註冊..

  • 主要針對非能性加強 (為了提升識別效果與應用情境)

    • 1st . 增加一個Sensor(DynamicsApproach)

      • 提升識別率

      • 快速回應識別結果 (/flick)

    • 2nd . 研發另一個Approach (Histogram Approach)

      • 測試資料累積到一定量, 識別率會比dynamics高 (90%)

    • 3rd . 結合上述兩種Approaches

      • 取個別優點組合。


Intuition

Intuition

Although single modality (sensor)[5][7] could construct a feasible non-intrusive authentication model; however,

  • Based on recent studies [8][9][10], we think that an authentication model, which combines orientation sensor and touchscreen, may gain better performance than a single modality (either orientation sensor or touchscreen).

  • .

Orientation

Orientation

+

Touchscreen

Touchscreen

*One modality may ok, but two modalities may gain better performance.

*Single modality is ok, but multi-modalities may gain better performance.


Storyboard

分鏡腳本(Storyboard)

  • 案例展示只有密碼是不夠的

    • 使用同樣的密碼/操作行為

      • Genuine Userand Imposters

  • 用Applied Features展示過去版本的概念

    • 只有用Orientation Sensor

  • 用LifeCycle介紹Smartphones內建的Sensors

    • 預計保護的Applications有那些Sensors可使用?

    • Orientation Sensor & Touchscreen

  • Features of Orientation Sensor and Touchscreen

    • Using figures of applied features todemonstrate


2391362

案例展示只有密碼是不夠的

Password is not sufficient for smartphones.

  • Shoulder surfing

  • Password could be

    • written down on a paper.

    • recorded (text file) and stored in a smartphone.

Password

xxx

xxx

xxx

Password

xxx

xxx

xxx


2391362

用過去展示影片的片段

  • 使用同樣的密碼/操作

    • A Genuine Uservs. an Imposter

    • (小偷/手機主人)

    • *子計畫一 第三年DEMO影片1280x720-v4 (0:20 ~ 1:14)

      *強調只有使用密碼保護是不夠的!!!


2391362

展示過去版本的概念

-90<Y<30

  • Orientation Sensor

-60<Z <60

0<X<20


Life cycle smartphones sensors

Life Cycle介紹Smartphones內建的Sensors

Camera

Microphone

loop

loop

1st Application

Telecommunications:

(Voice and Facial)

State 1

Textual/Graphical Password,

Biometrics (Fingerprint, Facial, etc.)

State 0

Idle

Turn

On

2nd Applications

GUI Interactions:

Economic (Transaction, Payment)

Browsing (sensitive information)…Sensorial Interactions:

Games, etc.

Top 10

Smartphone Activitiesa

Accelerometer

Orientation

Touchscreen

a. O2 News Centre, Making calls has become fifth most frequent use for a Smartphone for newly-networked generation of users, http://news.o2.co.uk/Press-Releases/Making-calls-has-become-fifth-most-frequent-use-for-a-Smartphone-for-newly-networked-generation-of-users-390.aspx (2012/6/29)


Behavioral biometrics of touch gesture based on a touchscreen

Behavioral biometricsof Touch Gesture based on a Touchscreen


Behavioral biometrics obtained from orientation and touchscreen of a smartphone

Behavioral biometrics obtained from Orientation and Touchscreen of a smartphone.

-90<Y<30

-60<Z <60

0<X<20


2391362

M組 工作內容

-90<Y<30

-60<Z <60

0<X<20

採雙感應器(Dual Sensors),建構使用者識別機制


Orientation touchscreen

各年度研發內容Orientation + Touchscreen

  • 第一年:Dynamics Approach(快)

    • 以每個Flick動作產生的行為特徵做為識別基礎。

      • 持握角度、角度變化、速度、加速度、移動直線距離、移動路徑長度、曲率、觸控壓力、觸控面積…。

  • 第二年:Histogram Approach(慢、但更準)

    • 累積一定數量的Flicks動作進行統計,以其量化後行為特徵分布做為識別基礎。

      • 如: 統計30個flicks動作,軌跡碰觸的位置分布範圍以及比例。(或移動路徑長度)

  • 第三年:整合兩Approaches的優點

    • 取各自的優點混合使用(前快、後準--每人基準不同)。


References

References

[1] Gafurov, D. Helkala, K. and Søndrol, T. (2006). Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers, 1, 51-59.

[2] Google. (2011b) Face Recognition on Android™ (4.0 Ice Cream Sandwich). available from: https://sites.google.com/site/androidfacerecognition/Home (2011/11/11).

[3] Nakajima, T. Lin, G. and Rahul, P. (2009) Systems and methods for identifying unauthorized users of an electronic device. US Patent & Trademark Office, Serial No. 389106, 2009. available from: http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220100207721%22.PGNR.&OS=DN/20100207721&RS=DN/20100207721 (2011/11/11).

[4] M. Conti, I. Z. Zlatea, and B. Crispo, “Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.” In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (ASIACCS '11). ACM, New York, NY, USA. pp. 249-259, March 22–24, 2011.

[5] W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong , “SenGuard: Passive User Identification on Smartphones Using Multiple Sensors.” 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Shanghai, China. pp. 141-148, 2011.

[6]C.-C. Lin, C.-C. Chang, Deron Liang, C.-H. Yang, “A Preliminary Study on Non-Intrusive User Authentication Method using Smartphone Sensors,” Applied Mechanics and Materials, vols. 284-287, pp. 3270-3274, 2013.

[7] C.C. Lin, D. Liang, C.C. Chang, C.H. Yang: A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users, 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE’2012). (2012) June 20-22; Washingtom, D.C., USA (p245)

[8] D. Gafurov, K. Helkala and T. Søndrol: Journal of Computers. Vol. 1 (2006), p. 51

[9] O. Mazhelis, J. Markuula and J. Veijalainen: Info. Manage. & Comp. Secur. Vol. 13(5) (2005), p. 367

[10] Eric Hess, Facial Recognition: A Value Tool for Law Enforcement, Forensic Magazine October/November 2010,


Example histogram

Example: Histogram

  • The 240-bin histograms of the flick trajectories of two different users.


Storyboard1

分鏡腳本(Storyboard)

  • 1. 使用同樣的密碼/操作行為

  • Operations of a Genuine User

  • Operations of Imposters


  • Login