An active smartphone authentication method based on daily cyclical activity

Reading time: 4 minute
...

📝 Original Info

  • Title: An active smartphone authentication method based on daily cyclical activity
  • ArXiv ID: 1909.00045
  • Date: 2020-03-10
  • Authors: Researchers from original ArXiv paper

📝 Abstract

Smartphones have become an important tool for people's daily lives, which brings higher security requirements in high-risk application areas, for example, mobile payment. Although the combination of physical password, fingerprint and facial recognition have improved the security to a certain extent, there still exists a high risk of being decrepted. This paper attempts an algorithm which is more suitable for studying human partial periodic activity, namely Prophet algorithm. This algorithm has strong robustness for missing data and trend change, and can deal with outliers well. The experimental results on the UniMiB SHAR DATA show that the user simply needs to do 5 cycles of specified actions to realize the prediction of the next time series. The Error analysis of cross validation was applied to 4 different indicators, and the Mean Squared Error of the optimal result "Jumping" behavior was only 8.20%. With these appealing features, The main contribution of this paper is to propose a smart phone user identification system based on behavioral activity cycle, which can be replicated in other behavioral studies. Another outstanding feature of such a system is the capability of fitting models using small data set by exploiting behavioral characteristics derived from periodicity and thus reducing dependence on sensor scanning frequency, therefore the system balances among energy consumption, data quantity and fitting accuracy.

💡 Deep Analysis

Deep Dive into An active smartphone authentication method based on daily cyclical activity.

Smartphones have become an important tool for people’s daily lives, which brings higher security requirements in high-risk application areas, for example, mobile payment. Although the combination of physical password, fingerprint and facial recognition have improved the security to a certain extent, there still exists a high risk of being decrepted. This paper attempts an algorithm which is more suitable for studying human partial periodic activity, namely Prophet algorithm. This algorithm has strong robustness for missing data and trend change, and can deal with outliers well. The experimental results on the UniMiB SHAR DATA show that the user simply needs to do 5 cycles of specified actions to realize the prediction of the next time series. The Error analysis of cross validation was applied to 4 different indicators, and the Mean Squared Error of the optimal result “Jumping” behavior was only 8.20%. With these appealing features, The main contribution of this paper is to propose a sm

📄 Full Content

Smartphones have become an important tool for people's daily lives, which brings higher security requirements in high-risk application areas, for example, mobile payment. Although the combination of physical password, fingerprint and facial recognition have improved the security to a certain extent, there still exists a high risk of being decrepted. This paper attempts an algorithm which is more suitable for studying human partial periodic activity, namely Prophet algorithm. This algorithm has strong robustness for missing data and trend change, and can deal with outliers well. The experimental results on the UniMiB SHAR DATA show that the user simply needs to do 5 cycles of specified actions to realize the prediction of the next time series. The Error analysis of cross validation was applied to 4 different indicators, and the Mean Squared Error of the optimal result "Jumping" behavior was only 8.20%. With these appealing features, The main contribution of this paper is to propose a smart phone user identification system based on behavioral activity cycle, which can be replicated in other behavioral studies. Another outstanding feature of such a system is the capability of fitting models using small data set by exploiting behavioral characteristics derived from periodicity and thus reducing dependence on sensor scanning frequency, therefore the system balances among energy consumption, data quantity and fitting accuracy.

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut