skip to main content
research-article

Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli

Published: 08 January 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Smart head-worn or head-mounted devices, including smart glasses and Virtual Reality (VR) headsets, are gaining popularity. Online shopping and in-app purchase from such headsets are presenting new e-commerce opportunities to the app developers. For convenience, users of these headsets may store account login, bank account and credit card details in order to perform quick in-app purchases. If the device is unattended, then an attacker, which can include insiders, can make use of the stored account and banking details to perform their own in-app purchases at the expense of the legitimate owner. To better protect the legitimate users of VR headsets (or head mounted displays in general) from such threats, in this paper, we propose to use eye movement to continuously authenticate the current wearer of the VR headset. We built a prototype device which allows us to apply visual stimuli to the wearer and to video the eye movements of the wearer at the same time. We use implicit visual stimuli (the contents of existing apps) which evoke eye movements from the headset wearer but without distracting them from their normal activities. This is so that we can continuously authenticate the wearer without them being aware of the authentication running in the background. We evaluated our proposed system experimentally with 30 subjects. Our results showed that the achievable authentication accuracy for implicit visual stimuli is comparable to that of using explicit visual stimuli. We also tested the time stability of our proposed method by collecting eye movement data on two different days that are two weeks apart. Our authentication method achieved an Equal Error Rate of 6.9% (resp. 9.7%) if data collected from the same day (resp. two weeks apart) were used for testing. In addition, we considered active impersonation attacks where attackers trying to imitate legitimate users' eye movements. We found that for a simple (resp. complex) eye tracking scene, a successful attack could be realised after on average 5.67 (13.50) attempts and our proposed authentication algorithm gave a false acceptance rate of 14.17% (3.61%). These results show that active impersonating attacks can be prevented using complex scenes and an appropriate limit on the number of authentication attempts. Lastly, we carried out a survey to study the user acceptability to our proposed implicit stimuli. We found that on a 5-point Likert scale, at least 60% of the respondents either agreed or strongly agreed that our proposed implicit stimuli were non-intrusive.

    References

    [1]
    Evgeniy R Abdulin and Oleg V Komogortsev. 2015. Person verification via eye movement-driven text reading model. In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--8.
    [2]
    Mohammed Abo-Zahhad, Sabah M Ahmed, and Sherif N Abbas. 2015. A novel biometric approach for human identification and verification using eye blinking signal. IEEE Signal Processing Letters 22, 7 (2015), 876--880.
    [3]
    Armando Barreto, Jing Zhai, and Malek Adjouadi. 2007. Non-intrusive physiological monitoring for automated stress detection in human-computer interaction. Human--Computer Interaction (2007), 29--38.
    [4]
    Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli. 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET biometrics 1, 1 (2012), 11--24.
    [5]
    Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, and Dawn Song. 2013. Safe: Secure authentication with face and eyes. In Privacy and Security in Mobile Systems (PRISMS), 2013 International Conference on. IEEE, 1--8.
    [6]
    Duncan Brumby and Vahab Seyedi. 2012. An empirical investigation into how users adapt to mobile phone auto-locks in a multitask setting. In Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services. ACM, 281--290.
    [7]
    James L Cambier and John E Siedlarz. 2003. Portable authentication device and method using iris patterns. (March 11 2003). US Patent 6,532,298.
    [8]
    Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2, 3 (2011), 27.
    [9]
    Siew Chin Chong, Andrew Beng Jin Teoh, and David Chek Ling Ngo. 2006. Iris authentication using privatized advanced correlation filter. In International Conference on Biometrics. Springer, 382--388.
    [10]
    L Dhir, NE Habib, DM Monro, and S Rakshit. 2010. Effect of cataract surgery and pupil dilation on iris pattern recognition for personal authentication. Eye 24, 6 (2010), 1006--1010.
    [11]
    David L Donoho and Yaakov Tsaig. 2008. Fast solution of-norm minimization problems when the solution may be sparse. IEEE Transactions on Information Theory 54, 11 (2008), 4789--4812.
    [12]
    Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. In NDSS.
    [13]
    FOVE. 2017. THE WORLDâĂŹS FIRSTEYE TRACKING VIRTUAL REALITY HEADSET. (8 April 2017). Retrieved April 9, 2017 from http://www.getfove.com/
    [14]
    Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security 8, 1 (2013), 136--148.
    [15]
    Florian Geiselhart, Michael Rietzler, and Enrico Rukzio. 2016. EyeVR: low-cost VR eye-based interaction. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. ACM, 277--280.
    [16]
    Anjith George and Aurobinda Routray. 2015. A score level fusion method for eye movement biometrics. Pattern Recognition Letters (2015).
    [17]
    Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt, and Heinrich Hussmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. (2017).
    [18]
    Priyanshu Gupta, Shipra Behera, Mayank Vatsa, and Richa Singh. 2014. On Iris Spoofing Using Print Attack. In ICPR. 1681--1686.
    [19]
    Richard Handford. 2016. Ant Financial is to launch VR-based payments. (9 Aug. 2016). Retrieved April 9, 2017 from https://www.mobileworldlive.com/money/news-money/ant-financial-is-to-launch-vr-based-payments/
    [20]
    Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The anatomy of smartphone unlocking: A field study of android lock screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4806--4817.
    [21]
    Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. ItâĂŹsa hard lock life: A field study of smartphone (un) locking behavior and risk perception. In Symposium on usable privacy and security (SOUPS). 213--230.
    [22]
    Kenneth Holmqvist, Marcus Nyström, and Fiona Mulvey. 2012. Eye tracker data quality: what it is and how to measure it. In Proceedings of the symposium on eye tracking research and applications. ACM, 45--52.
    [23]
    Feng Hong, Shujuan You, Meiyu Wei, Yongtuo Zhang, and Zhongwen Guo. 2016. MGRA: Motion Gesture Recognition via Accelerometer. Sensors 16, 4 (2016), 530.
    [24]
    Chih-Wei Hsu, Chih-Chung Chang, Chih-Jen Lin, et al. 2003. A practical guide to support vector classification. (2003).
    [25]
    Anil K Jain and Karthik Nandakumar. 2012. Biometric Authentication: System Security and User Privacy. IEEE Computer 45, 11 (2012), 87--92.
    [26]
    Qiang Ji, Zhiwei Zhu, and Peilin Lan. 2004. Real-time nonintrusive monitoring and prediction of driver fatigue. IEEE transactions on vehicular technology 53, 4 (2004), 1052--1068.
    [27]
    Martti Juhola, Youming Zhang, and Jyrki Rasku. 2013. Biometric verification of a subject through eye movements. Computers in biology and medicine 43, 1 (2013), 42--50.
    [28]
    Pawel Kasprowski and Jozef Ober. 2004. Eye movements in biometrics. In International Workshop on Biometric Authentication. Springer, 248--258.
    [29]
    Tomi Kinnunen, Filip Sedlak, and Roman Bednarik. 2010. Towards task-independent person authentication using eye movement signals. In Proceedings of the 2010 Symposium on Eye-Tracking Research 8 Applications. ACM, 187--190.
    [30]
    Eui Chul Lee, Kang Ryoung Park, and Jaihie Kim. 2006. Fake iris detection by using purkinje image. In International Conference on Biometrics. Springer, 397--403.
    [31]
    Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 1--9.
    [32]
    Zhen Liang, Fei Tan, and Zheru Chi. 2012. Video-based biometric identification using eye tracking technique. In Signal Processing, Communication and Computing (ICSPCC), 2012 IEEE International Conference on. IEEE, 728--733.
    [33]
    Jani Mantyjarvi, Mikko Lindholm, Elena Vildjiounaite, S-M Makela, and HA Ailisto. 2005. Identifying users of portable devices from gait pattern with accelerometers. In Proceedings.(ICASSP‘05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., Vol. 2. IEEE, ii--973.
    [34]
    Marcus Nyström, Ignace Hooge, and Richard Andersson. 2016. Pupil size influences the eye-tracker signal during saccades. Vision Research 121 (2016), 103--95.
    [35]
    Oculus. 2017. Documentation. (8 April 2017). Retrieved April 9, 2017 from https://developer.oculus.com/documentation/
    [36]
    Raspberry Pi. 2017. Raspberry Pi 3 Model B. (8 April 2017). Retrieved April 9, 2017 from https://www.raspberrypi.org/products/raspberry-pi-3-model-b/
    [37]
    Jaishanker K Pillai, Vishal M Patel, Rama Chellappa, and Nalini K Ratha. 2011. Secure and robust iris recognition using random projections and sparse representations. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 9 (2011), 1877--1893.
    [38]
    Chris Roberts. 2007. Biometric attack vectors and defences. Computers 8 Security 26, 1 (2007), 14--25.
    [39]
    Ricardo N Rodrigues, Lee Luan Ling, and Venu Govindaraju. 2009. Robustness of multimodal biometric fusion methods against spoof attacks. Journal of Visual Languages 8 Computing 20, 3 (2009), 169--179.
    [40]
    Sumit Shekhar, Vishal M Patel, Nasser M Nasrabadi, and Rama Chellappa. 2014. Joint sparse representation for robust multimodal biometrics recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 36, 1 (2014), 113--126.
    [41]
    Yiran Shen, Wen Hu, Mingrui Yang, Bo Wei, Simon Lucey, and Chun Tung Chou. 2014. Face recognition on smartphones via optimised sparse representation classification. In Information Processing in Sensor Networks, IPSN-14 Proceedings of the 13th International Symposium on. IEEE, 237--248.
    [42]
    Yiran Shen, Chengwen Luo, Weitao Xu, and Wen Hu. 2015. Poster: An online approach for gait recognition on smart glasses. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 389--390.
    [43]
    Ivo Sluganovic, Marc Roeschlin, Kasper B Rasmussen, and Ivan Martinovic. 2016. Using Reflexive Eye Movements for Fast Challenge-Response Authentication. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1056--1067.
    [44]
    SMI. 2017. AR/VR eye tracking kits. (8 April 2017). Retrieved April 9, 2017 from https://www.smivision.com/oem-eye-tracking/
    [45]
    Umut Uludag and Anil Jain. 2006. Securing fingerprint template: Fuzzy vault with helper data. In Computer Vision and Pattern Recognition Workshop, 2006. CVPRW‘06. Conference on. IEEE, 163--163.
    [46]
    Vuzix. 2017. M100 Smart Glasses - Enterprise. (8 April 2017). Retrieved April 9, 2017 from https://www.vuzix.com/consumer/products_m100/
    [47]
    Chin-An Wang, Donald C Brien, and Douglas P Munoz. 2015. Pupil size reveals preparatory processes in the generation of pro-saccades and anti-saccades. European Journal of Neuroscience 41, 8 (2015), 1102--1110.
    [48]
    Bo Wei, Mingrui Yang, Yiran Shen, Rajib Rana, Chun Tung Chou, and Wen Hu. 2013. Real-time classification via sparse representation in acoustic sensor networks. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems. ACM, 21.
    [49]
    Barry Winn, David Whitaker, David B Elliott, and Nicholas J Phillips. 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative Ophthalmology 8 Visual Science 35, 3 (1994), 1132--1137.
    [50]
    John Wright, Allen Y Yang, Arvind Ganesh, S Shankar Sastry, and Yi Ma. 2009. Robust face recognition via sparse representation. IEEE transactions on pattern analysis and machine intelligence 31, 2 (2009), 210--227.
    [51]
    Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2016. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. In Proceedings of the 15th International Conference on Information Processing in Sensor Networks. IEEE Press, 3.
    [52]
    Dhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, and Nasir Memon. 2015. Design and analysis of shoulder surfing resistant PIN based authentication mechanisms on Google Glass. In International Conference on Financial Cryptography and Data Security. Springer, 281--297.
    [53]
    Wencheng Yang, Jiankun Hu, and Song Wang. 2014. A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE transactions on Information Forensics and Security 9, 7 (2014), 1179--1192.
    [54]
    Yongtuo Zhang, Wen Hu, Weitao Xu, Hongkai Wen, and Chun Tung Chou. 2016. NaviGlass: Indoor Localisation Using Smart Glasses. In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Junction Publishing, 205--216.
    [55]
    Youming Zhang, Jyrki Rasku, and Martti Juhola. 2012. Biometric verification of subjects using saccade eye movements. International Journal of Biometrics 4, 4 (2012), 317--337.

    Cited By

    View all
    • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
    • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: Apr-2024
    • (2024)Simultaneous Authentication of Multiple Users Using a Single mmWave RadarIEEE Internet of Things Journal10.1109/JIOT.2024.335854811:10(17797-17811)Online publication date: 15-May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 1, Issue 4
    December 2017
    1298 pages
    EISSN:2474-9567
    DOI:10.1145/3178157
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2018
    Accepted: 01 October 2017
    Revised: 01 September 2017
    Received: 01 May 2017
    Published in IMWUT Volume 1, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Eye movement
    2. account takeover
    3. biometrics
    4. continuous authentication
    5. insider threat

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)177
    • Downloads (Last 6 weeks)19

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
    • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: Apr-2024
    • (2024)Simultaneous Authentication of Multiple Users Using a Single mmWave RadarIEEE Internet of Things Journal10.1109/JIOT.2024.335854811:10(17797-17811)Online publication date: 15-May-2024
    • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
    • (2024)Uniss-FGD: A Novel Dataset of Human Gazes Over Images of FacesIEEE Access10.1109/ACCESS.2024.340647812(75951-75964)Online publication date: 2024
    • (2023)How Unique do we Move? Understanding the Human Body and Context Factors for User IdentificationProceedings of Mensch und Computer 202310.1145/3603555.3603574(127-137)Online publication date: 3-Sep-2023
    • (2023)NF-HeartProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808517:1(1-24)Online publication date: 28-Mar-2023
    • (2023)Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement DataIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2023.324108172(1-14)Online publication date: 2023
    • (2023)A Secure Authentication Framework to Guarantee the Traceability of Avatars in MetaverseIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328868918(3817-3832)Online publication date: 2023
    • (2023)Metaverse CAN: Embracing Continuous, Active, and Non-Intrusive Biometric AuthenticationIEEE Network10.1109/MNET.2023.331889037:6(67-73)Online publication date: Nov-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media

    -