[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3611659.3615696acmconferencesArticle/Chapter ViewAbstractPublication PagesvrstConference Proceedingsconference-collections
research-article

Exploring the Stability of Behavioral Biometrics in Virtual Reality in a Remote Field Study: Towards Implicit and Continuous User Identification through Body Movements

Published: 09 October 2023 Publication History

Abstract

Behavioral biometrics has recently become a viable alternative method for user identification in Virtual Reality (VR). Its ability to identify users based solely on their implicit interaction allows for high usability and removes the burden commonly associated with security mechanisms. However, little is known about the temporal stability of behavior (i.e., how behavior changes over time), as most previous works were evaluated in highly controlled lab environments over short periods. In this work, we present findings obtained from a remote field study (N = 15) that elicited data over a period of eight weeks from a popular VR game. We found that there are changes in people’s behavior over time, but that two-session identification still is possible with a mean F1-score of up to 71%, while an initial training yields 86%. However, we also see that performance can drop by up to over 50 percentage points when testing with later sessions, compared to the first session, particularly for smaller groups. Thus, our findings indicate that the use of behavioral biometrics in VR is convenient for the user and practical with regard to changing behavior and also reliable regarding behavioral variation.

References

[1]
A. Ajit, N. Banerjee, and S. Banerjee. 2019. Combining Pairwise Feature Matches from Device Trajectories for Biometric Authentication in Virtual Reality Environments. In 2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). IEEE Computer Society, Los Alamitos, CA, USA, 9–97. https://doi.org/10.1109/AIVR46125.2019.00012
[2]
Florian Alt, Stefan Schneegass, Jens Grossklags, Heather Richter Lipford, and Jessica Staddon. 2022. Beyond Passwords—Challenges and Opportunities of Future Authentication. IEEE Security & Privacy 20, 1 (2022), 82–86. https://doi.org/10.1109/MSEC.2021.3127459
[3]
Arman Bhalla, Ivo Sluganovic, Klaudia Krawiecka, and Ivan Martinovic. 2021. MoveAR: Continuous Biometric Authentication for Augmented Reality Headsets. In Proceedings of the 7th ACM on Cyber-Physical System Security Workshop. Association for Computing Machinery, New York, NY, USA, 41–52. https://doi.org/10.1145/3457339.3457983
[4]
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. 2015. Passwords and the evolution of imperfect authentication. Communications of the ACM 58, 7 (2015), 78–87. https://doi.org/10.1145/2699390
[5]
Sascha Brostoff and M. Angela Sasse. 2003. “Ten strikes and you’re out”: Increasing the number of login attempts can improve password usability. In Workshop on Human-Computer Interaction and Security Systems at CHI 2003. ACM, Fort Lauderdale, Florida, USA, 4 pages. https://discovery.ucl.ac.uk/id/eprint/19826/
[6]
Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Henri Schmidt, Marinus Burger, Florian Alt, and Heinrich Hu\ textsectionmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. In Proceedings 2017 Workshop on Usable Security. Internet Society, San Diego, CA, USA. https://doi.org/10.14722/usec.2017.23028
[7]
Peter P. K. Chan, Chao-Ying Chen, Hussein Ayache, Lobo Louie, Alan Lok, Nathan Cheung, and Roy T. H. Cheung. 2021. Gait difference between children aged 9 to 12 with and without potential depressive mood. Gait & posture 91 (2021), 126–130. https://doi.org/10.1016/j.gaitpost.2021.10.012
[8]
David Checa and Andres Bustillo. 2020. A review of immersive virtual reality serious games to enhance learning and training. Multimedia Tools and Applications 79, 9-10 (2020), 5501–5527. https://doi.org/10.1007/s11042-019-08348-9
[9]
Vuthea Chheang, Patrick Saalfeld, Fabian Joeres, Christian Boedecker, Tobias Huber, Florentine Huettl, Hauke Lang, Bernhard Preim, and Christian Hansen. 2021. A collaborative virtual reality environment for liver surgery planning. Computers & Graphics 99 (2021), 234–246. https://doi.org/10.1016/j.cag.2021.07.009
[10]
Sarah Faltaous, Jonathan Liebers, Yomna Abdelrahman, Florian Alt, and Stefan Schneegass. 2019. VPID: Towards Vein Pattern Identification Using Thermal Imaging. i-com 18, 3 (2019), 259–270. https://doi.org/10.1515/icom-2019-0009
[11]
A. Gabell and U.S.L. Nayak. 1984. The Effect of Age on Variability in Gait. Journal of Gerontology 39, 6 (1984), 662–666. https://doi.org/10.1093/geronj/39.6.662
[12]
Ceenu George, Daniel Buschek, Andrea Ngao, and Mohamed Khamis. 2020. GazeRoomLock: Using Gaze and Head-Pose to Improve the Usability and Observation Resistance of 3D Passwords in Virtual Reality. In Augmented Reality, Virtual Reality, and Computer Graphics, Lucio Tommaso de Paolis and Patrick Bourdot (Eds.). Springer International Publishing, Cham, 61–81.
[13]
John Harvey, John Campbell, Stephen Elliott, Michael Brockly, and Andy Adler. 2017. Biometric Permanence: Definition and Robust Calculation. In 2017 Annual IEEE International Systems Conference (SysCon). IEEE, 1–7. https://doi.org/10.1109/SYSCON.2017.7934760
[14]
John H. Hollman, Robert H. Brey, Richard A. Robb, Tami J. Bang, and Kenton R. Kaufman. 2006. Spatiotemporal gait deviations in a virtual reality environment. Gait & posture 23, 4 (2006), 441–444. https://doi.org/10.1016/j.gaitpost.2005.05.005
[15]
J. Bonneau. 2012. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In 2012 IEEE Symposium on Security and Privacy. IEEE, San Francisco, CA, USA, 538–552. https://doi.org/10.1109/SP.2012.49
[16]
A. Jain, Lin Hong, and R. Bolle. 1997. On-line fingerprint verification. IEEE transactions on pattern analysis and machine intelligence 19, 4 (1997), 302–314. https://doi.org/10.1109/34.587996
[17]
Anil K. Jain, Patrick Flynn, and Arun A. Ross (Eds.). 2008. Handbook of biometrics. Springer, New York, NY. https://doi.org/10.1007/978-0-387-71041-9
[18]
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar. 2011. Introduction. In Introduction to Biometrics, Anil K. Jain, Arun A. Ross, and Karthik Nandakumar (Eds.). Springer US, Boston, MA, 1–49. https://doi.org/10.1007/978-0-387-77326-1_1
[19]
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar (Eds.). 2011. Introduction to Biometrics. Springer US, Boston, MA. https://doi.org/10.1007/978-0-387-77326-1
[20]
Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow. 2009. Implicit Authentication for Mobile Devices. In Proceedings of the 4th USENIX Conference on Hot Topics in Security(HotSec’09). USENIX Association, USA, 9.
[21]
Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, and Florian Alt. 2020. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Regina Bernhaupt, Florian ’Floyd’ Mueller, David Verweij, Josh Andres, Joanna McGrenere, Andy Cockburn, Ignacio Avellino, Alix Goguey, Pernille Bjørn, Shengdong Zhao, Briane Paul Samson, and Rafal Kocielnik (Eds.). ACM, New York, NY, USA, 1–21. https://doi.org/10.1145/3313831.3376840
[22]
Kat Krol, Eleni Philippou, Emiliano De Cristofaro, and M Angela Sasse. 2015. "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. arXiv preprint arXiv:1501.04434 (2015).
[23]
Alexander Kupin, Benjamin Moeller, Yijun Jiang, Natasha Kholgade Banerjee, and Sean Banerjee. 2019. Task-Driven Biometric Authentication of Users in Virtual Reality (VR) Environments. In MultiMedia Modeling, Ioannis Kompatsiaris, Benoit Huet, Vasileios Mezaris, Cathal Gurrin, Wen-Huang Cheng, and Stefanos Vrochidis (Eds.). Lecture Notes in Computer Science, Vol. 11295. Springer International Publishing, Cham, 55–67. https://doi.org/10.1007/978-3-030-05710-7_5
[24]
LastPass by LogMeIn. 2019. The 3rd Annual Global Password Security Report. https://lp-cdn.lastpass.com/lporcamedia/document-library/lastpass/pdf/en/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf
[25]
Arthur Le Guennec, Simon Malinowski, and Romain Tavenard. 2016. Data Augmentation for Time Series Classification using Convolutional Neural Networks. In ECML/PKDD Workshop on Advanced Analytics and Learning on Temporal Data. HAL, Riva Del Garda, Italy, 9 pages. https://halshs.archives-ouvertes.fr/halshs-01357973
[26]
Leo Breiman. 2001. Random Forests. Machine Learning 45, 1 (2001), 5–32. https://doi.org/10.1023/a:1010933404324
[27]
Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, Alia Saad, Jonas Auda, Uwe Gruenefeld, Florian Alt, and Stefan Schneegass. 2021. Understanding User Identification in Virtual Reality Through Behavioral Biometrics and the Effect of Body Normalization. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3411764.3445528
[28]
Jonathan Liebers, Sascha Brockel, Uwe Gruenefeld, and Stefan Schneegass. 2022. Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality. International Journal of Human–Computer Interaction (2022), 28 pages. https://doi.org/10.1080/10447318.2022.2120845
[29]
Jonathan Liebers, Patrick Horn, Christian Burschik, Uwe Gruenefeld, and Stefan Schneegass. 2021. Using Gaze Behavior and Head Orientation for Implicit Identification in Virtual Reality. In Proceedings of the 27th ACM Symposium on Virtual Reality Software and Technology(VRST ’21). Association for Computing Machinery, New York, NY, USA, 1–9. https://doi.org/10.1145/3489849.3489880
[30]
M. Sivasamy, V. N. Sastry, and N. P. Gopalan. 2020. VRCAuth: Continuous Authentication of Users in Virtual Reality Environment Using Head-Movement. In 2020 5th International Conference on Communication and Electronics Systems (ICCES). IEEE, Coimbatore, India, 518–523. https://doi.org/10.1109/ICCES48766.2020.9137914
[31]
Mark Roman Miller, Fernanda Herrera, Hanseul Jun, James A. Landay, and Jeremy N. Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports 10, 1 (2020), 10 pages. https://doi.org/10.1038/s41598-020-74486-y
[32]
Florian Mathis, John Williamson, Kami Vaniea, and Mohamed Khamis. 2020. RubikAuth: Fast and Secure Authentication in Virtual Reality. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems(CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–9. https://doi.org/10.1145/3334480.3382827
[33]
Mark Roman Miller, Fernanda Herrera, Hanseul Jun, James A. Landay, and Jeremy N. Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports 10, 1 (2020), 17404. https://doi.org/10.1038/s41598-020-74486-y
[34]
Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2021. Using Siamese Neural Networks to Perform Cross-System Behavioral Authentication in Virtual Reality. In 2021 IEEE Virtual Reality and 3D User Interfaces (VR). IEEE, Lisboa, Portugal, 140–149. https://doi.org/10.1109/VR50410.2021.00035
[35]
Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2022. Combining Real-World Constraints on User Behavior with Deep Neural Networks for Virtual Reality (VR) Biometrics. In 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, Christchurch, New Zealand, 409–418. https://doi.org/10.1109/VR51125.2022.00060
[36]
Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2022. Temporal Effects in Motion Behavior for Virtual Reality (VR) Biometrics. In 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 563–572. https://doi.org/10.1109/VR51125.2022.00076
[37]
Tahrima Mustafa, Richard Matovu, Abdul Serwadda, and Nicholas Muirhead. 2018. Unsure How to Authenticate on Your VR Headset? Come on, Use Your Head!. In Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics(IWSPA ’18). Association for Computing Machinery, New York, NY, USA, 23–30. https://doi.org/10.1145/3180445.3180450
[38]
Alex Nosenko, Yuan Cheng, and Haiquan Chen. 2022. Learning Password Modification Patterns with Recurrent Neural Networks. In Secure Knowledge Management In The Artificial Intelligence Era, Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, and Ziming Zhao (Eds.). Springer International Publishing, Cham, 110–129.
[39]
L. O’Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91, 12 (2003), 2021–2040. https://doi.org/10.1109/JPROC.2003.819611
[40]
Ilesanmi Olade, Charles Fleming, and Hai-Ning Liang. 2020. BioMove: Biometric User Identification from Human Kinesiological Movements for Virtual Reality Systems. Sensors 20, 10 (2020), 2944.
[41]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
[42]
Ken Pfeuffer, Matthias J. Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural Biometrics in VR: Identifying People from Body Motion and Relations in Virtual Reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3290605.3300340
[43]
R. Miller, N. K. Banerjee, and S. Banerjee. 2020. Within-System and Cross-System Behavior-Based Biometric Authentication in Virtual Reality. In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW). IEEE, Atlanta, Georgia, USA, 311–316. https://doi.org/10.1109/VRW50115.2020.00070
[44]
Christian Rack, Andreas Hotho, and Marc Erich Latoschik. 2022. Comparison of Data Encodings and Machine Learning Architectures for User Identification on Arbitrary Motion Sequences., 11-19 pages. https://doi.org/10.1109/AIVR56993.2022.00010
[45]
Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 175–188. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/wash
[46]
Alia Saad, Nick Wittig, Uwe Gruenefeld, and Stefan Schneegass. 2022. A Systematic Analysis of External Factors Affecting Gait Identification. In IEEE International Joint Conference on Biometrics (IJCB). IEEE, Abu Dhabi, United Arab Emirates, 9 pages. https://doi.org/10.1109/IJCB54206.2022.10007994
[47]
M. Angela Sasse, Michelle Steves, Kat Krol, and Dana Chisnell. 2014. The Great Authentication Fatigue – And How to Overcome It. In Cross-cultural design, David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Alfred Kobsa, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Demetri Terzopoulos, Doug Tygar, Gerhard Weikum, P. L. Patrick Rau, and P. PatrickL. Rau (Eds.). Lecture notes in computer science Information systems and application, incl. Internet/web and HCI, Vol. 8528. Springer, Cham, 228–239. https://doi.org/10.1007/978-3-319-07308-8_23
[48]
Albrecht Schmidt. 2000. Implicit human computer interaction through context. Personal Technologies 4, 2-3 (2000), 191–199. https://doi.org/10.1007/BF01324126
[49]
Maximilian Schrapel, Dennis Grannemann, and Michael Rohs. 2022. Sign H3re: Symbol and X-Mark Writer Identification Using Audio and Motion Data from a Digital Pen. In Mensch und Computer 2022 - Tagungsband, Bastian Pfleging, Kathrin Gerling, and Sven Mayer (Eds.). ACM, New York, 209–218. https://doi.org/10.1145/3543758.3543764
[50]
Shen Yiran, Wen Hongkai, Luo Chengwen, Xu Weitao, Zhang Tao, Hu Wen, and Rus Daniela. 2019. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. IEEE Transactions on Dependable and Secure Computing 16, 3 (2019), 484–497. https://doi.org/10.1109/TDSC.2018.2800048
[51]
Issa Traore and Ahmed Awad E. Ahmed (Eds.). 2012. Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, Hershey, PA, USA.
[52]
Issa Traoré and Ahmed Awad E. Ahmed. 2012. Introduction to Continuous Authentication. In Continuous Authentication Using Biometrics: Data, Models, and Metrics, Issa Traore and Ahmed Awad E. Ahmed (Eds.). IGI Global, Hershey, PA, USA, 1–22. https://doi.org/10.4018/978-1-61350-129-0.ch001
[53]
Z. Yu, H. Liang, C. Fleming, and K. L. Man. 2016. An exploration of usable authentication mechanisms for virtual reality systems. In 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). IEEE, Jeju, South Korea, 458–460. https://doi.org/10.1109/APCCAS.2016.7804002

Cited By

View all
  • (2024)Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642471(1-19)Online publication date: 11-May-2024
  • (2024)Navigating the Kinematic Maze: Analyzing, Standardizing and Unifying XR Motion Datasets2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00098(507-514)Online publication date: 16-Mar-2024
  • (2024)Evaluating Deep Networks for Detecting User Familiarity with VR from Hand Interactions2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)10.1109/AIxVR59861.2024.00036(226-230)Online publication date: 17-Jan-2024

Index Terms

  1. Exploring the Stability of Behavioral Biometrics in Virtual Reality in a Remote Field Study: Towards Implicit and Continuous User Identification through Body Movements

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        VRST '23: Proceedings of the 29th ACM Symposium on Virtual Reality Software and Technology
        October 2023
        542 pages
        ISBN:9798400703287
        DOI:10.1145/3611659
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 09 October 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Continuous Identification.
        2. Field Study
        3. Implicit User Identification
        4. Virtual Reality

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        VRST 2023

        Acceptance Rates

        Overall Acceptance Rate 66 of 254 submissions, 26%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)139
        • Downloads (Last 6 weeks)12
        Reflects downloads up to 13 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642471(1-19)Online publication date: 11-May-2024
        • (2024)Navigating the Kinematic Maze: Analyzing, Standardizing and Unifying XR Motion Datasets2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00098(507-514)Online publication date: 16-Mar-2024
        • (2024)Evaluating Deep Networks for Detecting User Familiarity with VR from Hand Interactions2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)10.1109/AIxVR59861.2024.00036(226-230)Online publication date: 17-Jan-2024

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media