Elsevier

Microprocessors and Microsystems

Volume 63, November 2018, Pages 147-157
Microprocessors and Microsystems

Continuous face authentication scheme for mobile devices with tracking and liveness detection

https://doi.org/10.1016/j.micpro.2018.07.008Get rights and content

Abstract

We present a novel scheme for continuous face authentication using mobile device cameras that addresses the issue of spoof attacks and attack windows in state-of-the-art approaches. Our scheme authenticates a user based on extracted facial features. However, unlike other schemes that periodically re-authenticate a user, our scheme tracks the authenticated face and only attempts re-authentication when the authenticated face is lost. This allows our scheme to eliminate attack windows that exist in schemes authenticating periodically and immediately recognise impostor usage. We also introduce a robust liveness detection component to our scheme that can detect printed faces and face videos. We describe how the addition of liveness detection enhances the robustness of our scheme against spoof attacks, improving on state-of-the-art approaches that lack this capability. Furthermore, we create the first dataset of facial videos collected from mobile devices during different real-world activities (walking, sitting and standing) such that our results reflect realistic scenarios. Our dataset therefore allows us to give new insight into the impact of user activity on facial recognition. Our dataset also includes spoofed facial videos for liveness testing. We use our dataset alongside two benchmark datasets for our experiments. We show and discuss how our scheme improves on existing continuous face authentication approaches and efficiently enhances device security.

Introduction

Mobile devices are one of the most widely used technologies of our time, requiring users to store private and personal information to use features and applications. Whilst many devices incorporate a variety of security mechanisms such as a PIN, password, or pattern, recent research has shown that such security mechanisms are susceptible to a variety of forgery attacks, such as the smudge attack [1]. Additionally, such mechanisms are intrinsically limited in that they provide only inconvenient and one-time authentication; the user explicitly authenticates once for entire device access. These mechanisms for authentication leave the device vulnerable to attacks if it is left unlocked by the genuine user.

Recent research in mobile device security has sought to alleviate the issues with traditional security mechanisms by proposing continuous authentication (also known as active authentication) techniques [2]. These techniques typically collect biometric data from the device during use and compares the data to a user profile. Collected biometrics are either behavioural (e.g., touch-screen gestures) or physiological (e.g., fingerprint) [3]. Physiological biometrics often yield better results because they are not as susceptible to change. For this reason, facial recognition in continuous authentication schemes is an active research area.

Using transparently captured faces from mobile devices to authenticate was first proposed in studies such as [4], [5]. Since then, however, the quality of cameras and computational power in devices has made facial recognition more feasible. Industry also has an interest in mobile face recognition with Google incorporating Smart Lock1 into Android and Apple announcing FaceID for iPhone.2 These approaches, however, use facial recognition in a one-time authentication process.

State-of-the-art research into continuous facial authentication sees schemes proposed that periodically (e.g., every 30 s) capture facial images and authenticate them [6]. Such schemes leave windows of attack and can be seen as more periodic than continuous. Conversely, schemes that authenticate each available frame are computationally inefficient. Furthermore, state-of-the-art studies achieve results for robustness against attacks by testing the system using impostor faces only [7] and do not account for the possibility of facial spoof attacks [8]. We also find that such schemes do not account for variety in user activity during face recognition; a crucial area of exploration for real-world systems.

The main focus of this paper is producing novel components that form a facial authentication scheme that mitigates spoof attacks, properly continuously authenticates (rather than periodically) and provides insight into facial recognition in real-world scenarios. Our approach uses features extracted from a detected face to verify the liveness. We show the results of our face recognition approach on faces collected from different illumination conditions and different activities. We mitigate attack windows and improve efficiency by tracking authenticated faces rather than re-authenticating in subsequent video frames. The contributions of this paper are therefore threefold:

  • We create a liveness detection component for use in continuous authentication schemes. It provides mitigation against 2D spoof attacks using printed faces or videos played in front of a mobile device camera. We test our liveness detection on different facial attributes.

  • We present a new facial recognition scheme and experiment with different facial attributes, different attribute sizes, different classification techniques and different datasets. Our results uniquely show and explain face recognition scores during different user activities.

  • We propose and show the effectiveness of a tracking algorithm for ensuring that the face authenticated is the user currently using the device. We show how this novel enhancement can efficiently and consistently maintain security after the user is authenticated.

In Section 2, we briefly summarise the previous work related to our study. Section 3 presents the general idea for our system and describes our novel approach to continuous authentication. Section 4 describes the experiments we performed on our system and discusses the results we obtained. Section 5 concludes our research and Section 6 discusses the future work that can be derived from our system.

Section snippets

Related work and motivation

Research into continuous authentication on mobile devices has attracted a lot of academic interest recently due to the added security concerns of devices. Sensors on mobile devices have led to schemes proposing a variety of biometrics for authentication, including touchscreen gestures [9], keystrokes [10], accelerometer data [11], location [12], facial features [13] and combinations of modalities [14].

The concept of face and facial feature authentication on mobile devices was first demonstrated

Continuous face authentication

Here, we present our novel continuous facial recognition framework that enhances accuracy and robustness. We describe the general concept, our data capture process, the flow and processing of data and how the classification setup we construct allows us to authenticate a face.

Experimental results

In this section, we perform experiments on the proof-of-concept components that form our proposed continuous facial authentication framework. We evaluate the performance and robustness of our framework and assess facial recognition performance during different user activities and different illumination scenarios. We discuss the pre-processing stages, implementation decisions, evaluation metrics and methodology for each experiment. We discuss and explain the results of each experiment.

Conclusion

In this paper, we have presented a novel continuous face authentication scheme for mobile devices that incorporates liveness detection to prevent spoof attacks and face tracking to prevent attack windows between re-authentication. We trained SVM classifiers on facial features extracted from genuine and spoofed images such that we can identify live faces. In our face recognition component, live faces were warped to a standardised pose and textual features extracted into a vector and scored using

Future work

Our future work will focus on further enhancing the framework by addressing its current limitations. We will firstly investigate the prospect of enhancing the facial recognition component of our scheme by implementing state-of-the-art convolutional neural networks.

Secondly, in the future we will consider colour and texture information to expand our liveness detection analysis. We will also expand our liveness detection dataset to include spoofing attacks using masks or 3D models of the face in

Acknowledgement

This research work is carried out as part of a research studentship funded by British Telecommunications, UK.

The authors would also like to thank the group members of the Information Security Group (ISG), International Institute of Cavity Research (IICR), and the Erasmus Mundus A2 team, Centre for Software Reliability (CSR), Machine Learning group, Department of Library & Information Science at City, University of London and employees of British Telecommunications at Adastral Park, Ipswich, UK

Max Smith-Creasey is an Information Engineering Ph.D. student with City, University of London. Prior to this he worked in industry as a Software Engineer at British Telecommunications. He obtained his B.Sc. (Hons) degree from King’s College, University of London in 2014. His research interests include alternative authentication and intrusion detection techniques for mobile devices. He has produced several publications.

References (36)

  • P. Samangouei et al.

    Facial attributes for active authentication on mobile devices

    Image Vis. Comput.

    (2017)
  • A. Aviv, K. Gibson, E. Mossop, M. Blaze, J. Smith, Smudge attacks on smartphone touch screens, in: Proceedings of the...
  • M. Frank et al.

    Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication

    IEEE Trans. Inf. Forensics Secur.

    (2013)
  • R. Yampolskiy et al.

    Behavioural biometrics; a survey and classification

    Int. J. Biom.

    (2008)
  • N. Clarke, S. Karatzouni, S. Furnell, Transparent facial recognition for mobile devices, in: Proceedings of the Seventh...
  • A. Hadid, J. Heikkila, O. Silven, M. Pietikainen, Face and eye detection for person authentication in mobile phones,...
  • D. Crouse, H. Han, D. Chandra, B. Barbello, A.K. Jain, Continuous authentication of mobile user: Fusion of face image...
  • P. Samangouei, V.M. Patel, R. Chellappa, Attribute-based continuous user authentication on mobile devices, in:...
  • A. Hadid, Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research...
  • M. Smith-Creasey, M. Rajarajan, Adaptive threshold scheme for touchscreen gesture continuous authentication using...
  • Z. Sitov et al.

    Hmog: new behavioral biometric features for continuous authentication of smartphone users

    IEEE Trans. Inf. Forensics Secur.

    (2016)
  • A. Primo, V. Phoha, R. Kumar, A. Serwadda, Context-aware active authentication using smartphone accelerometer...
  • U. Mahbub, R. Chellappa, Path: Person authentication using trace histories, in: Proceedings of the IEEE Seventh Annual...
  • M. Fathy, V. Patel, R. Chellappa, Face-based active authentication on mobile devices, in: Proceedings of the IEEE...
  • L. Fridman et al.

    Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

    IEEE Syst. J.

    (2017)
  • T. Ahonen, A. Hadid, M. Pietikinen, Face Recognition with Local Binary Patterns, Springer Berlin Heidelberg, Berlin,...
  • P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, in: Proceedings of the IEEE...
  • C. Cortes et al.

    Support-vector networks

    Mach. Learn.

    (1995)
  • Cited by (23)

    • Biometric authentication using a deep learning approach based on different level fusion of finger knuckle print and fingernail

      2022, Expert Systems with Applications
      Citation Excerpt :

      Biometric systems have a wide variety of applications in forensic, trade, and government services (Kamaruddin & Rosdi, 2019). These systems use biometric traits like fingerprint (Hammad & Wang, 2019; Arteaga-Falconi et al., 2018), iris (Hu et al., 2017), ear (Annapurani et al., 2015; Mamta & Hanmandlu, 2013), face (Kang et al., 2014; Creasey et al., 2018; Verma et al., 2019), finger veins (Kumar & Prathyusha, 2009; Lu et al., 2017; Mohsin et al., 2019), and hand geometry (Gupta et al., 2016) to identity individuals. Unimodal biometric systems typically lack sufficient accuracy and vulnerable to spoofing attacks (Nguyen et al., 2015).

    • Electromagnetic radiation based continuous authentication in edge computing enabled internet of things

      2019, Journal of Systems Architecture
      Citation Excerpt :

      Continuous authentication can significantly mitigate the above security threat, and an effective authentication method is highly desired for the edge host in edge computing environment. Many single biometrics based continuous methods are proposed, such as the authentication method via typing behavior [15], gait pattern and location traces [16], fingerprint [17], plantar pressure [41], face images [42,43], and health monitoring information [18,44]. To enhance the security of the uni-modal biometric authentication, Mondal et al. [21] proposed an authentication approach using a combination of keystroke and mouse biometrics.

    • Identifying People’s Faces in Smart Banking Systems Using Artificial Neural Networks

      2024, International Journal of Computational Intelligence Systems
    • Study on the Implementation of Multimodal Continuous Authentication in Smartphones: A Systematic Review

      2024, International Journal of Advanced Computer Science and Applications
    View all citing articles on Scopus

    Max Smith-Creasey is an Information Engineering Ph.D. student with City, University of London. Prior to this he worked in industry as a Software Engineer at British Telecommunications. He obtained his B.Sc. (Hons) degree from King’s College, University of London in 2014. His research interests include alternative authentication and intrusion detection techniques for mobile devices. He has produced several publications.

    Fatema Albalooshi is an Assistant Professor at the Computer Engineering Department, University of Bahrain. She graduated from the University of Dayton (USA) in May 2015. Dr. Albalooshi had completed her M.Sc. at the University of Nottingham (UK) in December 2009. Her primary research focus is in the field of image processing and object segmentation where she has completed several publications. Dr. Albalooshi’s other research interests include cyber security and authentication, object recognition, neural networks, and medical imagery segmentation.

    Muttukrishnan Rajarajan is Professor of Security Engineering at City, University of London. He obtained his Ph.D. from City, University of London in 2001. His research expertise is in the areas of mobile security, intrusion detection and privacy techniques. He has chaired several international conferences in the area of information security and is involved in the editorial boards of several security and network journals. He is also a visiting fellow at British Telecommunications (BT) UK and is currently actively engaged in the UK Governments Identity Assurance programme (Verify UK).

    View full text