skip to main content
10.1145/3463944.3469101acmconferencesArticle/Chapter ViewAbstractPublication PagesicdarConference Proceedingsconference-collections
short-paper

Cross-Modal Deep Neural Networks based Smartphone Authentication for Intelligent Things System

Published:21 August 2021Publication History

ABSTRACT

Nowadays, identity authentication technology, including biometric identification features such as iris and fingerprints, plays an essential role in the safety of intelligent devices. However, it cannot implement real-time and continuous identification of user identity. This paper presents a framework for user authentication from motion signals such as accelerometers and gyroscope signals powered received from smartphones. The proposed innovation scheme including i) a data preprocessing, ii) a novel feature extraction and authentication scheme based on a cross-modal deep neural network by applying a time-distributed Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM) models. The experimental results of the proposed scheme show the advantage of our approach against methods.

Skip Supplemental Material Section

Supplemental Material

ICDAR21-icdar17.mp4

mp4

52.7 MB

References

  1. Tran Anh Khoa, Cao Hoang Phuc, Pham Duc Lam, Le Mai Bao Nhu, Nguyen Minh Trong, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Tan-Y, Hoang Nam Nguyen, and Dang Ngoc Minh Duc. 2020.Waste Management System Using IoT-Based Machine Learning in University. Wireless Communications and Mobile Computing 2020 (2020), 6138637. https://doi.org/10.1155/2020/6138637Google ScholarGoogle Scholar
  2. Tran Anh Khoa, Nguyen Quang Minh, Hoang Hai Son, Cao Nguyen Dang Khoa, Dinh Ngoc Tan, Nguyen VanDung, Nguyen Hoang Nam, Dang Ngoc Minh Duc, and Nguyen Trung Tin. 2021. Wireless sensor networks and machine learning meet climate change prediction. International Journal of Communication Systems 34, 3 (2021), e4687. https://doi.org/10.1002/dac.4687Google ScholarGoogle Scholar
  3. Igor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone, and Sandro Zappatore. 2019. Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance. IEEE Transactions on Vehicular Technology 68, 1 (2019), 938--946. https://doi.org/10.1109/TVT.2018.2884767Google ScholarGoogle ScholarCross RefCross Ref
  4. Kai Cao and Anil K. Jain. 2019. Automated Latent Fingerprint Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 41, 4 (2019), 788--800. https://doi.org/10.1109/TPAMI.2018.2818162Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rama Chellappa, Ashok Veeraraghavan, and Narayanan Ramanathan. 2009. Gait Biometrics, Overview. Springer US, Boston, MA, 628--633. https://doi.org/10. 1007/978-0--387--73003--5_33Google ScholarGoogle Scholar
  6. Matteo Gadaleta and Michele Rossi. 2018. IDNet: Smartphone-based gait recognition with convolutional neural networks. Pattern Recognition 74 (2018), 25--37. https://doi.org/10.1016/j.patcog.2017.09.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, and Mina Sheikhalishahi. 2018. Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning. In ICT Systems Security and Privacy Protection, Lech Jan Janczewski and Mirosaw Kutyowski (Eds.). Springer International Publishing, Cham, 62--76.Google ScholarGoogle Scholar
  8. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long Short-Term Memory. 9, 8 (1997). https://doi.org/10.1162/neco.1997.9.8.1735Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Tran Anh Khoa, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, and Dang Ngoc Minh Duc. 2020. Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study. Wireless Communications and Mobile Computing 2020 (2020), 8896637. https: //doi.org/10.1155/2020/8896637Google ScholarGoogle ScholarCross RefCross Ref
  10. Yann LeCun and Yoshua Bengio. 1998. Convolutional Networks for Images, Speech, and Time Series. MIT Press, Cambridge, MA, USA, 255--258.Google ScholarGoogle Scholar
  11. Lixiang Li, Xiaohui Mu, Siying Li, and Haipeng Peng. 2020. A Review of Face Recognition Technology. IEEE Access 8 (2020), 139110--139120. https://doi.org/ 10.1109/ACCESS.2020.3011028Google ScholarGoogle ScholarCross RefCross Ref
  12. Xiaoxu Li, Liyun Yu, Dongliang Chang, Zhanyu Ma, and Jie Cao. 2019. Dual Cross-Entropy Loss for Small-Sample Fine-Grained Vehicle Classification. IEEE Transactions on Vehicular Technology 68, 5 (2019), 4204--4212. https://doi.org/10. 1109/TVT.2019.2895651Google ScholarGoogle ScholarCross RefCross Ref
  13. Yansong Li, Qian Luo, Jiajia Liu, Hongzhi Guo, and Nei Kato. 2019. TSP Security in Intelligent and Connected Vehicles: Challenges and Solutions. IEEE Wireless Communications 26, 3 (2019), 125--131. https://doi.org/10.1109/MWC.2019.1800289Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jiajia Liu, Yongpeng Shi, Zubair Md. Fadlullah, and Nei Kato. 2018. Space-Air- Ground Integrated Network: A Survey. IEEE Communications Surveys Tutorials 20, 4 (2018), 2714--2741. https://doi.org/10.1109/COMST.2018.2841996Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, and Chang Yao. 2020. EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Transactions on Industrial Informatics 16, 10 (2020), 6597-- 6606. https://doi.org/10.1109/TII.2019.2946047Google ScholarGoogle ScholarCross RefCross Ref
  16. Onel Harrison 2018. Machine Learning Basics with the K-Nearest Neighbors Algorithm. Retrieved September 11, 2018 from https: //towardsdatascience.com/machine-learning-basics-with-the-k-nearestneighbors- algorithm-6a6e71d01761Google ScholarGoogle Scholar
  17. Patrice Ferlet 2019. How to work with Time Distributed data in a neural network. Retrieved July 23, 2019 from https://medium.com/smileinnovation/how-to-workwith- time-distributed-data-in-a-neural-network-b8b39aa4ce00Google ScholarGoogle Scholar
  18. Prashant Gupta 2017. Decision Trees in Machine Learning. Retrieved May 18, 2017 from https://towardsdatascience.com/decision-trees-in-machine-learning- 641b9c4e8052Google ScholarGoogle Scholar
  19. Pedro M. Santos, João G. P. Rodrigues, Susana B. Cruz, Tiago Lourenço, Pedro M. d'Orey, Yunior Luis, Cecília Rocha, Sofia Sousa, Sérgio Crisóstomo, Cristina Queirós, Susana Sargento, Ana Aguiar, and João Barros. 2018. PortoLivingLab: An IoT-Based Sensing Platform for Smart Cities. IEEE Internet of Things Journal 5, 2 (2018), 523--532. https://doi.org/10.1109/JIOT.2018.2791522Google ScholarGoogle ScholarCross RefCross Ref
  20. Tony Yiu 2019. Understanding Random Forest. Retrieved June 12, 2019 from https://towardsdatascience.com/understanding-random-forest-58381e0602d2Google ScholarGoogle Scholar
  21. Haibin Zhang, Jiajia Liu, Kunlin Li, Huan Tan, and Gaozu Wang. 2020. Gait Learning Based Authentication for Intelligent Things. IEEE Transactions on Vehicular Technology 69, 4 (2020), 4450--4459. https://doi.org/10.1109/TVT.2020.2977418Google ScholarGoogle ScholarCross RefCross Ref
  22. Qin Zou, Yanling Wang, Qian Wang, Yi Zhao, and Qingquan Li. 2020. Deep Learning-Based Gait Recognition Using Smartphones in the Wild. IEEE Transactions on Information Forensics and Security 15 (2020), 3197--3212. https://doi.org/10.1109/TIFS.2020.2985628Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Cross-Modal Deep Neural Networks based Smartphone Authentication for Intelligent Things System

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICDAR '21: Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval
            August 2021
            72 pages
            ISBN:9781450385299
            DOI:10.1145/3463944

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 August 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader