TY - GEN
T1 - Continuous authentication using one-class classifiers and their fusion
AU - Kumar, Rajesh
AU - Kundu, Partha Pratim
AU - Phoha, Vir V.
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/3/9
Y1 - 2018/3/9
N2 - While developing continuous authentication systems (CAS), we generally assume that samples from both genuine and impostor classes are readily available. However, the assumption may not be true in certain circumstances. Therefore, we explore the possibility of implementing CAS using only genuine samples. Specifically, we investigate the usefulness of four one-class classifiers OCC (elliptic envelope, isolation forest, local outliers factor, and one-class support vector machines) and their fusion. The performance of these classifiers was evaluated on four distinct behavioral biometric datasets, and compared with eight multi-class classifiers (MCC). The results demonstrate that if we have sufficient training data from the genuine user the OCC, and their fusion can closely match the performance of the majority of MCC. Our findings encourage the research community to use OCC in order to build CAS as it does not require knowledge of impostor class during the enrollment process.
AB - While developing continuous authentication systems (CAS), we generally assume that samples from both genuine and impostor classes are readily available. However, the assumption may not be true in certain circumstances. Therefore, we explore the possibility of implementing CAS using only genuine samples. Specifically, we investigate the usefulness of four one-class classifiers OCC (elliptic envelope, isolation forest, local outliers factor, and one-class support vector machines) and their fusion. The performance of these classifiers was evaluated on four distinct behavioral biometric datasets, and compared with eight multi-class classifiers (MCC). The results demonstrate that if we have sufficient training data from the genuine user the OCC, and their fusion can closely match the performance of the majority of MCC. Our findings encourage the research community to use OCC in order to build CAS as it does not require knowledge of impostor class during the enrollment process.
UR - http://www.scopus.com/inward/record.url?scp=85048074537&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85048074537&partnerID=8YFLogxK
U2 - 10.1109/ISBA.2018.8311467
DO - 10.1109/ISBA.2018.8311467
M3 - Conference contribution
AN - SCOPUS:85048074537
T3 - 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018
SP - 1
EP - 8
BT - 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th IEEE International Conference on Identity, Security, and Behavior Analysis, ISBA 2018
Y2 - 11 January 2018 through 12 January 2018
ER -