Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/9237
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pang, Tsz Ho | en_US |
dc.date.accessioned | 2020-01-16T08:10:28Z | - |
dc.date.available | 2020-01-16T08:10:28Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.other | 2019cspth730 | en_US |
dc.identifier.uri | http://dspace.cityu.edu.hk/handle/2031/9237 | - |
dc.description.abstract | Authentication in cybersecurity is the process of determining whether someone or something is virtually who or what claims to be. There are three factors of authentication: something the user knows, something the user has and something the user is. It is common for a phone to utilize one of the three factors to authenticate the user. User defined passwords and graphical patterns are commonly used by early model of smartphone to authenticate the users' identity and protect the phone from unauthorized use. But are they as secure as we thought? An unauthorized user could easily gain access to our phone by all means. For instance, our passwords could be leaked if we are not cautious enough. Hacker could try to search for our password via brute force if it is not strong enough. An intruder could even trace the oil mark on our phone's screen to recreate our pattern of choice. However, these methods require users who are willing to make efforts in deciding a long and complicated password and pattern. Apart from the reliance on user's discipline, tying the same password or drawing the same pattern every time we unlock the phone can be utterly inconvenient. To further secure our device and improve user experience, many phone companies started to include some sensors on the phone which makes authenticating user by scanning their biometrics possible. Since our fingerprints and face are a part of our body, it will be difficult for any unauthorized user to obtain data about our biometrics. However, both biometrics and traditional password or graphical pattern have the same security flaw. They are the single point of failure. Conventional smartphones only authenticate users at the initial unlock session. Once the phone is unlocked, the user can access all function freely no matter whether they are the actual phone owner or not. As such, we need to offer a solution to verify if this person is the actual owner of the phone despite of successful initial authentication. Developing a mobile application that keeps track of the phone owner's behavioral biometrics and constantly tracks for abnormal or inconsistent behavior is a viable way to address the problem. Even though a hacker might trick the system in the initial phone unlock, the constant monitoring of user behavioral biometrics will soon reveal that he is not the actual owner of the phone. The objective of the project is to prove the viability of using Chinese handwriting stroke for authentication by developing a continuous authentication method using user' Chinese handwriting stroke as a behavioral biometrics. Through constant comparison between the Chinese handwriting of the current user and that of the phone owner. the application aims to provide a transparent and continuous authentication method, ensuring that the phone is still being used by the actual phone owner. | en_US |
dc.rights | This work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner. | en_US |
dc.rights | Access is restricted to CityU users. | en_US |
dc.title | Behavioral Authentication on Chinese Handwriting | en_US |
dc.contributor.department | Department of Computer Science | en_US |
dc.description.supervisor | Supervisor: Dr. Hancke, Gerhard Petrus; First Reader: Dr. Li, Zhenjiang; Second Reader: Prof. Wang, Lusheng | en_US |
Appears in Collections: | Computer Science - Undergraduate Final Year Projects |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 148 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.