250 research outputs found
Tap-based User Authentication for Smartwatches
This paper presents TapMeIn, an eyes-free, two-factor authentication method
for smartwatches. It allows users to tap a memorable melody (tap-password) of
their choice anywhere on the touchscreen to unlock their watch. A user is
verified based on the tap-password as well as her physiological and behavioral
characteristics when tapping. Results from preliminary experiments with 41
participants show that TapMeIn could achieve an accuracy of 98.7% with a False
Positive Rate of only 0.98%. In addition, TapMeIn retains its performance in
different conditions such as sitting and walking. In terms of speed, TapMeIn
has an average authentication time of 2 seconds. A user study with the System
Usability Scale (SUS) tool suggests that TapMeIn has a high usability score.Comment: 11 pages, 8 figure
Leveraging Personalization To Facilitate Privacy
Online social networks have enabled new methods and modalities of
collaboration and sharing. These advances bring privacy concerns: online social
data is more accessible and persistent and simultaneously less contextualized
than traditional social interactions. To allay these concerns, many web
services allow users to configure their privacy settings based on a set of
multiple-choice questions.
We suggest a new paradigm for privacy options. Instead of suggesting the same
defaults to each user, services can leverage knowledge of users' traits to
recommend a machine-learned prediction of their privacy preferences for
Facebook. As a case study, we build and evaluate MyPrivacy, a publicly
available web application that suggests personalized privacy settings. An
evaluation with 199 users shows that users find the suggestions to be
appropriate and private; furthermore, they express intent to implement the
recommendations made by MyPrivacy. This supports the proposal to put
personalization to work in online communities to promote privacy and security
Neural Imaging Pipelines - the Scourge or Hope of Forensics?
Forensic analysis of digital photographs relies on intrinsic statistical
traces introduced at the time of their acquisition or subsequent editing. Such
traces are often removed by post-processing (e.g., down-sampling and
re-compression applied upon distribution in the Web) which inhibits reliable
provenance analysis. Increasing adoption of computational methods within
digital cameras further complicates the process and renders explicit
mathematical modeling infeasible. While this trend challenges forensic analysis
even in near-acquisition conditions, it also creates new opportunities. This
paper explores end-to-end optimization of the entire image acquisition and
distribution workflow to facilitate reliable forensic analysis at the end of
the distribution channel, where state-of-the-art forensic techniques fail. We
demonstrate that a neural network can be trained to replace the entire photo
development pipeline, and jointly optimized for high-fidelity photo rendering
and reliable provenance analysis. Such optimized neural imaging pipeline
allowed us to increase image manipulation detection accuracy from approx. 45%
to over 90%. The network learns to introduce carefully crafted artifacts, akin
to digital watermarks, which facilitate subsequent manipulation detection.
Analysis of performance trade-offs indicates that most of the gains can be
obtained with only minor distortion. The findings encourage further research
towards building more reliable imaging pipelines with explicit
provenance-guaranteeing properties.Comment: Manuscript + supplement; currently under review; compressed figures
to minimize file size. arXiv admin note: text overlap with arXiv:1812.0151
Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels
Forensic analysis of digital photo provenance relies on intrinsic traces left
in the photograph at the time of its acquisition. Such analysis becomes
unreliable after heavy post-processing, such as down-sampling and
re-compression applied upon distribution in the Web. This paper explores
end-to-end optimization of the entire image acquisition and distribution
workflow to facilitate reliable forensic analysis at the end of the
distribution channel. We demonstrate that neural imaging pipelines can be
trained to replace the internals of digital cameras, and jointly optimized for
high-fidelity photo development and reliable provenance analysis. In our
experiments, the proposed approach increased image manipulation detection
accuracy from 45% to over 90%. The findings encourage further research towards
building more reliable imaging pipelines with explicit provenance-guaranteeing
properties.Comment: Camera ready + supplement, CVPR'1
An HMM-based behavior modeling approach for continuous mobile authentication
This paper studies continuous authentication for touch interface based mobile
devices. A Hidden Markov Model (HMM) based behavioral template training
approach is presented, which does not require training data from other subjects
other than the owner of the mobile. The stroke patterns of a user are modeled
using a continuous left-right HMM. The approach models the horizontal and
vertical scrolling patterns of a user since these are the basic and mostly used
interactions on a mobile device. The effectiveness of the proposed method is
evaluated through extensive experiments using the Toucha-lytics database which
comprises of touch data over time. The results show that the performance of the
proposed approach is better than the state-of-the-art method
Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices
Studies have shown that children can be exposed to smart devices at a very
early age. This has important implications on research in children-computer
interaction, children online safety and early education. Many systems have been
built based on such research. In this work, we present multiple techniques to
automatically detect the presence of a child on a smart device, which could be
used as the first step on such systems. Our methods distinguish children from
adults based on behavioral differences while operating a touch-enabled modern
computing device. Behavioral differences are extracted from data recorded by
the touchscreen and built-in sensors. To evaluate the effectiveness of the
proposed methods, a new data set has been created from 50 children and adults
who interacted with off-the-shelf applications on smart phones. Results show
that it is possible to achieve 99% accuracy and less than 0.5% error rate after
8 consecutive touch gestures using only touch information or 5 seconds of
sensor reading. If information is used from multiple sensors, then only after 3
gestures, similar performance could be achieved.Comment: Under peer revie
Source Camera Attribution of Multi-Format Devices
Photo Response Non-Uniformity (PRNU) based source camera attribution is an
effective method to determine the origin camera of visual media (an image or a
video). However, given that modern devices, especially smartphones, capture
images, and videos at different resolutions using the same sensor array, PRNU
attribution can become ineffective as the camera fingerprint and query visual
media can be misaligned. We examine different resizing techniques such as
binning, line-skipping, cropping and scaling that cameras use to downsize the
raw sensor image to different media. Taking such techniques into account, this
paper studies the problem of source camera attribution. We define the notion of
Ratio of Alignment, which is a measure of shared sensor elements among
spatially corresponding pixels within two media objects resized with different
techniques. We then compute the Ratio of Alignment between the different
combinations of three common resizing methods under simplified conditions and
experimentally validate our analysis. Based on the insights drawn from the
different techniques used by cameras and the RoA analysis, the paper proposes
an algorithm for matching the source of a video with an image and vice versa.
We also present an efficient search method resulting in significantly improved
performance in matching as well as computation time.Comment: 16 pages, 9 figures, 11 tables. "The paper is under consideration at
Pattern Recognition Letters
Phishing, Personality Traits and Facebook
Phishing attacks have become an increasing threat to online users. Recent
research has begun to focus on the factors that cause people to respond to
them. Our study examines the correlation between the Big Five personality
traits and email phishing response. We also examine how these factors affect
users behavior on Facebook, including posting personal information and choosing
Facebook privacy settings.
Our research shows that when using a prize phishing email, we find a strong
correlation between gender and the response to the phishing email. In addition,
we find that the neuroticism is the factor most correlated to responding to
this email. Our study also found that people who score high on the openness
factor tend to both post more information on Facebook as well as have less
strict privacy settings, which may cause them to be susceptible to privacy
attacks. In addition, our work detected no correlation between the participants
estimate of being vulnerable to phishing attacks and actually being phished,
which suggests susceptibility to phishing is not due to lack of awareness of
the phishing risks and that realtime response to phishing is hard to predict in
advance by online users.
We believe that better understanding of the traits which contribute to online
vulnerability can help develop methods for increasing users privacy and
security in the future
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication
With the increased popularity of smart phones, there is a greater need to
have a robust authentication mechanism that handles various security threats
and privacy leakages effectively. This paper studies continuous authentication
for touch interface based mobile devices. A Hidden Markov Model (HMM) based
behavioral template training approach is presented, which does not require
training data from other subjects other than the owner of the mobile device and
can get updated with new data over time. The gesture patterns of the user are
modeled from multiple sensors - touch, accelerometer and gyroscope data using a
continuous left-right HMM. The approach models the tap and stroke patterns of a
user since these are the basic and most frequently used interactions on a
mobile device. To evaluate the effectiveness of the proposed method a new data
set has been created from 42 users who interacted with off-the-shelf
applications on their smart phones. Results show that the performance of the
proposed approach is promising and potentially better than other
state-of-the-art approaches
Detecting the Presence of ENF Signal in Digital Videos: a Superpixel based Approach
ENF (Electrical Network Frequency) instantaneously fluctuates around its
nominal value (50/60 Hz) due to a continuous disparity between generated power
and consumed power. Consequently, luminous intensity of a mains-powered light
source varies depending on ENF fluctuations in the grid network. Variations in
the luminance over time can be captured from video recordings and ENF can be
estimated through content analysis of these recordings. In ENF based video
forensics, it is critical to check whether a given video file is appropriate
for this type of analysis. That is, if ENF signal is not present in a given
video, it would be useless to apply ENF based forensic analysis. In this work,
an ENF signal presence detection method is introduced for videos. The proposed
method is based on multiple ENF signal estimations from steady superpixels,
i.e. pixels that are most likely uniform in color, brightness, and texture, and
intraclass similarity of the estimated signals. Subsequently, consistency among
these estimates is then used to determine the presence or absence of an ENF
signal in a given video. The proposed technique can operate on video clips as
short as 2 minutes and is independent of the camera sensor type, i.e. CCD or
CMOS
- …