Survey on Eye Movement Based Authentication Systems

No matter how sophisticated an authentication system has been devised, human is often considered as the weakest link in the security chain. Security problems can stem from bad interactions between humans and systems. Eye movement is a natural interaction

  • PDF / 726,075 Bytes
  • 16 Pages / 439.37 x 666.14 pts Page_size
  • 96 Downloads / 195 Views

DOWNLOAD

REPORT


stract. No matter how sophisticated an authentication system has been devised, human is often considered as the weakest link in the security chain. Security problems can stem from bad interactions between humans and systems. Eye movement is a natural interaction modality. The application of eye tracking technology in authentication offers a promising and feasible solution to the trading-off between the usability and the security of an authentication system. This paper conducts a comprehensive survey on existing Eye Movement Based Authentication (EMBA) methodologies and systems, and briefly outlines the technical and methodological aspects of EMBA systems. We decompose the EMBA technique into three fundamental aspects: (1) eye movement input modality, (2) eye movement interaction mechanism, and (3) eye movement data recognition. The features and functions of the EMBA modules are further analyzed. An emphasis is put on the interrelationship among the modules and their general impacts on the formation and function of the EMBA framework. The paper attempts to provide a systemic treatment on the state of the art technology and also to outline some potential future development directions in eye movement based interaction or security systems. Keywords: Eye tracking · Authentication · Access control · Human computer interaction · Fixations · Saccades · Graphical password

1

Introduction

Eye tracking technology is very promising as an alternation or an auxiliary channel to human-computer interaction (HCI). Applications of eye movements to real time user interfaces can be divided into two categories: (1) using eye movements as an directly control tool, such as a non-touchable mouse pointer for the disable [1], and (2) analyzing eye movements to obtain the user’s intention and then to facilitate the interaction environment, such as interactive graphical displays [2] and interface usability measurements [3-4]. The two areas utilized the eyes’ behavioral features and attentional features, respectively. The authentication system, as a specific application of eye movement based interaction, happens to be an ideal combination between the two features. First of all, from the perspective of interaction modality, eye tracking device is highly resistance to shoulder surfing which is done either by simply looking over a victims shoulder, or using technical devices like binoculars or miniature cameras to get the personal © Springer-Verlag Berlin Heidelberg 2015 H. Zha et al. (Eds.): CCCV 2015, Part I, CCIS 546, pp. 144–159, 2015. DOI: 10.1007/978-3-662-48558-3_15

Survey on Eye Movement Based Authentication Systems

145

identification number (PIN) [5].Secondly, from the perspective of system usability, eye tracking based interaction is so different from the traditional alpha-number schemes that a new authentication mechanism such as a graphical based password system is more fitting for the human innate memory capability [6-9]. Last but not least, from the perspective of system security, eye movement is also a unique biometric trait wh