Transparent Techniques

  • Nathan Clarke


The nature of authentication currently is to authenticate at point-of-entry. Therefore all authentication systems have been designed and developed to tightly operate within those requirements. Applying those same technologies to a different application, such as transparent authentication, results in a series of challenges. This is not completely unexpected, as systems designed for one application are invariably not fit-for-purpose within another application, without some redesign. For biometric-based approaches, the primary challenge is concerned with the sample capture. Within point-of-entry scenarios, the environment within which the sample is taken can be closely controlled whether it be an application guiding the user to provide the sample, swiping the finger at a slower pace across the sensor, changing the orientation of the head so that the camera has a better shot of the face or environment-based controls, such as minimising ambient noise or ensuring an acceptable level of illumination. Biometric systems have therefore been developed knowing such operational variables are under their control – or remain constant. With transparent authentication, such control over the environment and the user is not possible. Instead, the user could be performing a variety of activities whilst the sample is captured, giving rise to a far higher degree of variability in the samples.


Mobile Phone Facial Recognition Equal Error Rate Speaker Recognition Behavioural Profile 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Akkermans, A., Kevenaar, T., Schobben, D.: Acoustic ear recognition for person identification. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID’05), Buffalo (2005)Google Scholar
  2. Alomair, B., Lazos, L., Poovendran, R.: Securing low-cost RFID systems: an unconditionally secure approach. Journal of Computer Security – special edition on RFID systems, 19(2), 229–257 (2011)Google Scholar
  3. Aupy, A., Clarke, N.L.: User authentication by service utilisation profiling. In: Proceedings of ISOneWorld 2005, Las Vegas (2005)Google Scholar
  4. AuthenTec: Smart sensors. AuthenTec. Available at: Accessed 10 Apr 2011
  5. Bishop, M.: Pattern Classification and Machine Learning. Springer, New York (2007)Google Scholar
  6. Bolton, R., Hand, D.: Statistical fraud detection: a review. Stat. Sci. 17(3), 235–255 (2002)MathSciNetMATHCrossRefGoogle Scholar
  7. Brown, M., Rogers, J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. Man Mach. Stud. 39(6), 999 (1993)CrossRefGoogle Scholar
  8. Chan, P., Fan, W., Prodromidis, A., Stolfo, S.: Distributed data mining in credit card fraud detection. IEEE Intell. Syst. 14(6), 67 (1999). Special Issue on Data MiningCrossRefGoogle Scholar
  9. Cho, S., Han, C., Han, D., Kin, H.: Web based keystroke dynamics. Identity verification using neural networks. J. Organ. Comput. Electron. Commer. 10(4), 295–307 (2000)Google Scholar
  10. Clarke, N.L., Furnell, S.M.: Keystroke dynamics on a mobile handset: a feasibility study. Inform. Manage. Comput. Secur. 11(4), 161–166 (2003)CrossRefGoogle Scholar
  11. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)CrossRefGoogle Scholar
  12. Clarke, N.L., Mekala, A.R.: The application of signature recognition to transparent handwriting verification for mobile devices. Inform. Manage. Comput. Secur. 15(3), 214–225 (2007)CrossRefGoogle Scholar
  13. Clarke, N.L., Karatzouni, S., Furnell, S.M.: Transparent facial recognition for mobile devices. In: Proceedings of the 7th Security Conference, Las Vegas (2008)Google Scholar
  14. Corner, M., Noble, B.: Protecting file systems with transient authentication. J. Wirel. Netw. 11(1–2), 7–19 (2005)CrossRefGoogle Scholar
  15. Derawi, M., Nickel, C., Bours, P., Busch, C.: Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, Darmstadt, Germany, 15–17 Oct 2010. Available at: (2010). Accessed 10 Apr 2011
  16. Distimo.: Our presentation from mobile world congress 2010 – mobile application stores state of play. Available at: (2010). Accessed 10 Apr 2011
  17. Doddington, G.: Speaker recognition based on idiolectal differences between speakers. In: Proceedings of Interspeech, vol. 4, Aalborg, (2001)Google Scholar
  18. Dowland, P.: User authentication and supervision in networked systems. PhD thesis, University of Plymouth, Plymouth, 2004Google Scholar
  19. Dowland, P., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Proceedings of the 19th International Conference on Information Security (IFIP SEC), Toulouse, France (2004)Google Scholar
  20. Eagle, N., Pentland, A., Lazer, D.: Inferring social network structure using mobile phone data. Proc. Natl. Acad. Sci. 106, 15274–15278 (2009)CrossRefGoogle Scholar
  21. Evans, J.: Yet another RFID patent hints Apple has an iPhone wallet plan. 925 LLC. Available at: (2010). Accessed 10 Apr 2011
  22. Gafurov, D., Helkala, K., Sondrol, T.: Gait recognition using acceleration from MEMS. In: The First International Conference on Availability, Reliability and Security (ARES 2006). Available at: (2006). Accessed 10 Apr 2011
  23. GB 2375205: Determining identity of a user. UK Patent Office. Available at: (2002). Accessed 10 Apr 2011
  24. Gosset, P. (ed.): ASPeCT: Fraud Detection Concepts: Final Report. Doc Ref. AC095/VOD/W22/DS/P/18/1 (Jan 1998)Google Scholar
  25. Gross, R.: Face databases. In: Li, Stan Z., Jain, Anil K. (eds.) Handbook of Face Recognition. Springer, New York (2005)Google Scholar
  26. Guo, M., Liaw, H., Deng, D., Chao, H.: An RFID secure authentication mechanism in WLAN. Comput. Commun. 34, 236–240 (2011)CrossRefGoogle Scholar
  27. Jain, A., Patrick, F., Arun, R.: Handbook of Biometrics. Springer, New York (2008). ISBN 978-0-387-71040-2CrossRefGoogle Scholar
  28. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 39, 168–176 (1990)CrossRefGoogle Scholar
  29. Karatzouni, S., Clarke, N.L., Furnell, S.M.: Keystroke analysis for thumb-based keyboards on mobile devices. In: Proceedings of the ISOneWorld Conference, Las Vegas (2007a)Google Scholar
  30. Kou, Y., Lu, C., Sirwongwattana, S., Huang, Y.: Survey of fraud detection techniques. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, pp. 749–754 (2004)Google Scholar
  31. Leggett, G., Williams, J.: Verifying identity via keystroke characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)CrossRefGoogle Scholar
  32. Li, F., Clarke, N.L., Papadaki, M., Dowland, P.: Behaviour profiling for transparent authentication on mobile devices. In: Proceedings of the 10th European Conference on Information Warfare (ECIW), Tallinn, Estonia, pp. 307–314, 7–8 July (2011)Google Scholar
  33. Lu, X., Jain, A., Colbry, D.: Matching 2.5D face scans to 3D models. IEEE Trans. Pattern. Anal. 28(1), 31–43 (2006)CrossRefGoogle Scholar
  34. Moreau Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: a first prototype. In: International Conference on Artificial Neural Networks Proceedings (ICANN’97), Lausanne, Switzerland, pp. 1065–1070 (1997)Google Scholar
  35. Napier, R., Laverty, W., Mahar, D., Henderson, R., Hiron, M., Wagner, M.: Keyboard user verification: toward an accurate, efficient and ecological valid algorithm. Int. J. Hum. Comput. Stud. 43(2), 213–222 (1995)CrossRefGoogle Scholar
  36. NIST: Speaker recognition evaluation. NIST. Available at: (2011). Accessed 10 Apr 2011
  37. Nystedt, D.: Samsung develops RFID chip for cell phones. PCWorld. Available at: (2007). Accessed 10 Apr 2011
  38. Obaidat, M.S., Sadoun, B.: Verification of computer user using keystroke dynamics. IEEE Trans. Syst. Man Cybern. B Cybern. 27(2), 261–269 (1997)CrossRefGoogle Scholar
  39. Ord, T., Furnell, S.M.: User authentication for keypad-based devices using keystroke analysis. In: Proceedings of the Second International Network Conference (INC 2000), Plymouth (2000)Google Scholar
  40. Provost, F., Aronis, J.: Scaling up inductive learning with massive parallelism. Mach. Learn. 23, 33–46 (1996)Google Scholar
  41. Reynolds, D., Quatieri, T., Dunn, R.: Speaker verification using adapted Gaussian mixture models. Digit. Signal Process. 10, 19–41 (2000)CrossRefGoogle Scholar
  42. Rodwell, P., Furnell, S.M., Reynolds, P.: A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Comput. Secur. 26(7-8), 468–478 (2007)CrossRefGoogle Scholar
  43. Rosa, L.: Biometric source code. Advanced source code. (2008). Accessed 10 Apr 2011
  44. Rosenblatt, M., Hotelling, S.: Touch screen RFID tag reader. US Patent 2009167699. Available at: (2009). Accessed 10 Mar 2011
  45. Saevanee, H., Bhattarakosol, P.: User authentication using combination of behavioural biometrics over the touchpad acting like touch screen of mobile device. In: Proceedings of the 2008 International Conference on Computer and Electrical Engineering, Washington (2008)Google Scholar
  46. Shin, C., Yun, U., Kim, H., Park, S.: A hybrid approach of neural network and memory-based learning to data mining. IEEE Trans. Neural Netw. 11(3), 637–646 (2000)CrossRefGoogle Scholar
  47. Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Discl. Bull. 17, 3346 (1975)Google Scholar
  48. Stolfo, S.J., Wei, F., Wenke, L., Prodromidis, A., Chan, P.K.: Cost-based modeling for fraud and intrusion detection: results from the JAM project. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX ’00. Proceedings, vol. 2, Hilton Head, SC, pp. 130–144 (2000)Google Scholar
  49. Stormann, C.: Fraud Management Tool: Evaluation Report. Advanced Security for Personal Communications (ASePECT), Deliverable. 13, Doc Ref. AC095/SAG/W22/DS/P/13/2 (1997)Google Scholar
  50. Sun, D., Huai, J., Sun, J., Zhang, J., Feng, Z.: A new design of wearable token system for mobile device security. IEEE Trans. Consum. Electron. 54(4), 1784–1789 (2008)CrossRefGoogle Scholar
  51. Turner, I.: Eye net watch launch PDALok for IPAQ. Computing.Net. Available at: (2001). Accessed 10 Apr 2011
  52. US 5,787,187. Systems and methods for biometric identification using acoustic properties of the ear canal. US Patent (1998)Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Centre for Security, Communications & Network Research (CSCAN)Plymouth UniversityPlymouthUK

Personalised recommendations