CFP last date
20 January 2025
Reseach Article

Smartphone-based Gait Authentication for Health Insurance Incentives: A Data-Driven Approach to Verify Walking Compliance

by Sandip Dutta, Soumen Roy, Purba Banerjee, Utpal Roy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 46
Year of Publication: 2024
Authors: Sandip Dutta, Soumen Roy, Purba Banerjee, Utpal Roy
10.5120/ijca2024924109

Sandip Dutta, Soumen Roy, Purba Banerjee, Utpal Roy . Smartphone-based Gait Authentication for Health Insurance Incentives: A Data-Driven Approach to Verify Walking Compliance. International Journal of Computer Applications. 186, 46 ( Nov 2024), 1-13. DOI=10.5120/ijca2024924109

@article{ 10.5120/ijca2024924109,
author = { Sandip Dutta, Soumen Roy, Purba Banerjee, Utpal Roy },
title = { Smartphone-based Gait Authentication for Health Insurance Incentives: A Data-Driven Approach to Verify Walking Compliance },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2024 },
volume = { 186 },
number = { 46 },
month = { Nov },
year = { 2024 },
issn = { 0975-8887 },
pages = { 1-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number46/smartphone-based-gait-authentication-for-health-insurance-incentives-a-data-driven-approach-to-verify-walking-compliance/ },
doi = { 10.5120/ijca2024924109 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-11-08T23:09:21+05:30
%A Sandip Dutta
%A Soumen Roy
%A Purba Banerjee
%A Utpal Roy
%T Smartphone-based Gait Authentication for Health Insurance Incentives: A Data-Driven Approach to Verify Walking Compliance
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 46
%P 1-13
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Some of few health insurance companies now offer lower premiums to people who walk 10,000 steps every day. The main problem in this plan is figuring out who qualifies. We suggest using data from smartphone sensors while people walk. This data can track steps and confirm who’s walking. This could help prevent misuse of the program. In response to the aforementioned conundrum, we have procured and meticulously analysed the gait patterns of 87 volunteers. Our investigation has determined that the Scale Manhattan an efficacious anomaly detector, suitable for individual verification in active mode, achieving an equal error rate from 10.20% to 13.76%. Our proposed detection system has undergone validation procedures employing datasets gathered across multiple sessions and repetitions. Based on a judiciously conducted realistic appraisal of the proposed model for each subject, we assert that this method of individual authentication holds merit for the aforementioned campaign, engendering tangible benefits for prospective beneficiaries. Beyond the immediate insurance incentives, this approach possesses the potential to motivate individuals not only to procure insurance coverage but also to foster their physical and psychological well-being. Our innovative methodology provides a substantive solution for health insurance companies contemplating the implementation of analogous promotional endeavours.

References
  1. Aditya Birla Health launches new policy with up to 100% return of premium— Mint.
  2. Ala Abdulhakim Abdulaziz. Features Extraction Scheme for Behavioural Biometric Authentication in Touchscreen Mobile Devices. PhD thesis, Universiti Teknologi Malaysia, 2016.
  3. Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez, and Ruben Tolosana. MultiLock: Mobile active authentication based on multiple biometric and behavioural patterns. In Proceedings of the 1st International Workshop on Multimodal Understanding and Learning for Embodied Applications (MULEA 2019), pages 53–59, 2019.
  4. Jamil Ahmad, Muhammad Sajjad, Zahoor Jan, Irfan Mehmood, Seungmin Rho, and Sung Wook Baik. Analysis of interaction trace maps for active authentication on smart devices. Multimedia Tools and Applications, 76(2017):4069– 4087, 2017.
  5. Md Liakat Ali, John V. Monaco, Charles C. Tappert, and Meikang Qiu. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems, 86(217):1–16, 2016.
  6. Arwa Alsultan, Kevin Warwick, and Hong Wei. Free-text keystroke dynamics authentication for Arabic language. IET Biometrics, 5(3):164–169, 2016.
  7. Prince Yaw Owusu Amoako and Isaac Olusegun Osunmakinde. Emerging bimodal biometrics authentication for non-venue-based assessments in open distance e-learning (OdeL) environments. International Journal of Technology Enhanced Learning, 12(2), 2020.
  8. Noureddine Amraoui, Amine Besrour, Riadh Ksantini, and Belhassen Zouari. Implicit and continuous authentication of smart home users. In Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA 2019), pages 1228–1239, 2020.
  9. Margit Antal, Zsolt Bokor, and L´aszl´o ZsoltSzab´o. Information revealed from scrolling interactions on mobile devices. Pattern Recognition Letters, 56(2015):7–13, 2015.
  10. Tanapat Anusas-Amornkul. Strengthening password authentication using keystroke dynamics and smartphone sensors. In Proceedings of the 9th International Conference on Information Communication and Management (ICICM 2019), ACM International Conference Proceeding Series, pages 70– 74. Association for Computing Machinery, 2019.
  11. S. Ayeswarya and Jasmine Norman. A survey on different continuous authentication systems. International Journal of Biometrics, 11(1):67–99, 2019.
  12. Okan Engin Basar, Gulfem Alptekin, Hasan Can Volaka, Mustafa Isbilen, and Ozlem Durmaz Incel. Resource usage analysis of a mobile banking application using sensor-andtouchscreen- based continuous authentication. Procedia Computer Science, 155:185–192, 2019.
  13. Michael Boakye Osei, Enoch Opanin Gyamfi, and Mohammed Okoe Alhassan. Keystroke dynamics algorithm for securing web-based password driven systems. Asian Journal of Research in Computer Science, 4(4):1–26, 2020.
  14. A. Buriro, S. Gupta, B. Crispo, and F.D. D Frari. DIALERAUTH: A motion-assisted touch-based smartphone user authentication scheme. In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY 2018), pages 267–276, Tempe, AZ, USA, 2018. Association for Computing Machinery.
  15. Yufei Chen, Chao Shen, ZhaoWang, and Tianwen Yu. Modeling interactive sensor-behavior with smartphones for implicit and active user authentication. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2017), pages 1–6, 2017.
  16. Heather Crawford, Karen Renaud, and Tim Storer. A framework for continuous, transparent mobile device authentication. Computers and Security, 39(2013):127–136, 2013.
  17. Timothy Dee, Ian Richardson, and Akhilesh Tyagi. Continuous transparent mobile device touchscreen soft keyboard biometric authentication. In Procedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems (VLSID 2019), pages 539–540. IEEE, jan 2019.
  18. Daniel Escobar Grisales, Juan. C. V´asquez-Correa, Jes´us F. Vargas-Bonilla, and Juan Rafael Orozco-Arroyave. Identity verification in virtual education using biometric analysis based on keystroke dynamics. TecnoL´ogicas, 23(47):197– 211, 2020.
  19. Tao Feng, Xi Zhao, Nick Desalvo, Tzu Hua Liu, Zhimin Gao, Xi Wang, and Weidong Shi. An investigation on touch biometrics: Behavioral factors on screen size, physical context and application context. Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST 2015), 2015.
  20. Andrew Foresi and Reza Samavi. User authentication using keystroke dynamics via crowdsourcing. In Proceedings of the 17th International Conference on Privacy, Security and Trust (PST 2019), pages 1–3, 2019.
  21. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security, 8(1):136–148, 2013.
  22. Ahmet Melih Gedikli and Mehmet O¨ nder Efe. A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics. In Chawki Djeddi, Akhtar Jamil, and Imran Siddiqi, editors, Proceedings of the 4th Mediterranean Conference Pattern Recognition and Artificial Intelligence (MedPRAI 2020), volume 1144 of Communications in Computer and Information Science, pages 9–23. Springer, Cham, 2020.
  23. Romain Giot, Mohamad El-Abed, Baptiste Hemery, and Christophe Rosenberger. Unconstrained keystroke dynamics authentication with shared secret. Computers and Security, 30(6-7):427–445, 2011.
  24. Romain Giot and Anderson Rocha. Siamese networks for static keystroke dynamics authentication. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS 2019), pages 1–6, 2019.
  25. Sandeep Gupta, Attaullah Buriro, and Bruno Crispo. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access. Mobile Information Systems, 2018.
  26. Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, and Ian Oakley. CASA: Context-aware scalable authentication. In Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS 2013), pages 1–10, 2013.
  27. Itay Hazan, Oded Margalit, and Lior Rokach. Securing keystroke dynamics from replay attacks. Applied Soft Computing Journal, 85(2019):105798, 2019.
  28. Jiacang Ho and Dae Ki Kang. One-class Na¨ıve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Applied Intelligence, 48(6):1547–1564, 2018.
  29. Anbiao Huang, Shuo Gao, Junliang Chen, Lijun Xu, and Arokia Nathan. High security user authentication enabled by piezoelectric keystroke dynamics and machine learning. IEEE Sensors Journal, 20(21):13037–13046, 2020.
  30. Hani Jawed, Zara Ziad, Muhammad Mubashir Khan, and Maheen Asrar. Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms. Turkish Journal of Electrical Engineering and Computer Sciences, 28(2018):1698–1709, 2018.
  31. Himanka Kalita, Emanuele Maiorana, and Patrizio Campisi. Keystroke dynamics for biometric recognition in handheld devices. In Proceedings of the 43rd International Conference on Telecommunications and Signal Processing (TSP 2020), pages 410–416, 2020.
  32. Hassan Khan, Aaron Atwater, and Urs Hengartner. Itus: An implicit authentication framework for android. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom 2014), pages 507– 518. Association for Computing Machinery, 2014.
  33. Ali Khodabakhsh, Erwin Haasnoot, and Patrick Bours. Predicted templates: Learning-curve based template projection for keystroke dynamics. In Proceedings of the International Conference of the Biometrics Special Interest Group (IOSIG 2018), pages 1–5, 2018.
  34. Kevin S. Killourhy and Roy A. Maxion. Comparing anomalydetection algorithms for keystroke dynamics. In Proceedings of the International Conference on Dependable Systems and Networks, pages 125–134, 2009.
  35. Dong In Kim, Shincheol Lee, and Ji Sun Shin. A new feature scoring method in keystroke dynamics-based user authentications. IEEE Access, 8(2020):27901–27914, 2020.
  36. Gutha Jaya Krishna and Vadlamani Ravi. Keystroke based user authentication using modified differential evolution. In Proceedings of the IEEE Region 10th Annual International Conference (TENCON 2019), pages 739–744. IEEE, 2019.
  37. Hyungu Lee, Jung Yeon Hwang, Dong In Kim, Shincheol Sung-Hoon Lee, Shincheol Sung-Hoon Lee, and Ji Sun Shin. Understanding keystroke dynamics for smartphone users authentication and keystroke dynamics on smartphones builtin motion sensors. Security and Communication Networks, 2018:1–10, 2018.
  38. Hyungu Lee, Jung Yeon Hwang, Shincheol Sung Hoon Lee, Dong In Kim, Shincheol Sung Hoon Lee, Jaehwan Lee, and Ji Sun Shin. A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive and Mobile Computing, 54(2019):45–57, 2019.
  39. Shincheol Sung-Hoon Lee, Jung Yeon Hwang, Hyungu Lee, Dong In Kim, Shincheol Sung-Hoon Lee, and Ji Sun Shin. Distance-based keystroke dynamics smartphone authentication and threshold formula model. Journal of the Korea Institute of Information Security and Cryptology, 28(2):369–383, 2018.
  40. Sung Hoon Lee, Jong Hyuk Roh, Soo Hyung Kim, and Seung Hun Jin. Feature subset for improving accuracy of keystroke dynamics on mobile environment. Journal of Information Processing Systems, 14(2):523–538, 2018.
  41. Wei Han Lee and Ruby B. Lee. Implicit smartphone user authentication with sensors and contextual machine learning. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017), pages 1–12, 2017.
  42. Wei Han Lee, Jorge Ortiz, Bongjun Ko, and Ruby Lee. Inferring smartphone users’ handwritten patterns by using motion sensors. ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018.
  43. Lingjun Li, Xinxin Zhao, and Guoliang Xue. Unobservable re-authentication for smartphones. In Proceedings of the 20th Annual Network and Distributed System Security Symposium, pages 1–16. The Internet Society, 2013.
  44. Yantao Li, Hailong Hu, and Gang Zhou. Using data augmentation in continuous authentication on smartphones. IEEE Internet of Things Journal, 6(1):628–640, 2019.
  45. Md Liakat Ali and Charles C. Tappert. POHMM/SVM: A hybrid approach for keystroke biometric user authentication. In Proceedings of the IEEE International Conference on Real- Time Computing and Robotics (RCAR 2018), pages 612–617, 2019.
  46. Xiaoshi Liang, Futai Zou, Linsen Li, and Ping Yi. Mobile terminal identity authentication system based on behavioral characteristics. International Journal of Distributed Sensor Networks, 16(1):1–12, 2020.
  47. X. Liu, C. Shen, and Y. Chen. Multi-source interactive behavior analysis for continuous user authentication on smartphones. In Jie Zhou, Yunhong Wang, Zhenan Sun, Zhenhong Jia, Jianjiang Feng, Shiguang Shan, Kurban Ubul, and Zhenhua Guo, editors, Proceedings of the Chinese Conference on Biometric Recognition (CCBR 2018), volume 10996 of Lecture Notes in Computer Science, pages 669–677. Springer, Cham, 2018.
  48. Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, and Rama Chellappa. Active user authentication for smartphones: A challenge data set and benchmark results. In Proceedings of the IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS 2016), pages 1–8, 2016.
  49. Saket Maheshwary and Vikram Pudi. Mining keystroke timing pattern for user authentication. In Annalisa Appice, Michelangelo Ceci, Corrado Loglisci, Elio Masciari, and Zbigniew W. Ra´s, editors, Proceedings of the International Workshop on New Frontiers in Mining Complex Patterns (NFMCP 2016), volume 10312 of Lecture Notes in Computer Science, pages 213–227. Springer, Cham, 2017.
  50. Abir Mhenni, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition. Future Generation Computer Systems, 97(2019):210–218, 2019.
  51. Abir Mhenni, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. Computers and Security, 83(2019):151–166, 2019.
  52. Abir Mhenni, Denis Migdal, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. Vulnerability of adaptive strategies of keystroke dynamics based authentication against different attack types. In Proceedings of the International Conference on Cyberworlds (CW 2019), pages 274–278, 2019.
  53. Jugurta Montalv˜ao, Eduardo O. Freire, Murilo A. Bezerra, and Rodolfo Garcia. Contributions to empirical analysis of keystroke dynamics in passwords. Pattern Recognition Letters, 52, 2014.
  54. Hebatollah Mostafa, Abeer Mohamed Elkorany, Mohammad El-Ramly, and Hassan Shaban. Behavio2Auth: Sensor-based behavior biometric authentication for smartphones. In Proceedings of the ArabWIC 6th Annual International Conference Research Track (ArabWIC 2019), pages 1–6. Association for Computing Machinery, 2019.
  55. Masanori Nakakuni and Hiroshi Dozono. User authentication method for computer-based online testing by analysis of keystroke timing at the input of a family name. In Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI 2018), pages 71– 76, 2018.
  56. Ha Nguyen Ngoc and Ngoc Tran Nguyen. An enhanced distance metric for keystroke dynamics classification. Eighth International Conference on Knowledge and Systems Engineering, pages 285–290, 2016.
  57. Yogesh Patel, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, and George L.Walker. Keystroke dynamics using auto encoders. In Proceedings of the International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019, pages 1–8, 2019.
  58. Shivani Payal, Bhushan Garware, and Shubhangi Kelkar. Towards designing a framework for practical keystroke dynamics based authentication. In Advances in Intelligent Systems and Computing, volume 614, 2018.
  59. Darpan Kumar Purwar, Deepika Vishwakarma, Neha Singh, and Vineeta Khemchandani. One v/s all SVM implementation for keystroke based authentication system. In Proceedings of the 4th International Conference on Information Systems and Computer Networks (ISCON 2019), pages 268–272, 2019.
  60. Suhail Javed Quraishi and Sarabjeet Singh Bedi. On keystrokes as continuous user biometric authentication. International Journal of Engineering and Advanced Technology, 8(6):4149–4153, 2019.
  61. Siti Rahayu Selamat, Teh Teck Guan, and Robiah Yusof. Enhanced authentication for web-based security using keystroke dynamics. International Journal of Network Security and Its Applications, 12(4):1–16, 2020.
  62. Khandaker Abir Rahman, Deepak Neupane, Abdulrahman Zaiter, and Md Shafaeat Hossain.Web user authentication using chosen word keystroke dynamics. In Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019, 2019.
  63. Nataasha Raul, Royston D’mello, Mandar Bhalerao, Royston D’mello, and Mandar Bhalerao. Keystroke dynamics authentication using small datasets. In Proceedings of the Security and Privacy: Second ISEA International Conference (ISEAISAP 2018), volume CCIS 939, pages 89–96, 2019.
  64. Aditi Roy, Tzipora Halevi, and Nasir Memon. An HMMbased behavior modeling approach for continuous mobile authentication. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), pages 1–5, 2014.
  65. Napa Sae-Baeid, Nasir Memon, Napa Sae-bae Id, and Nasir Memon. Distinguishability of keystroke dynamic template. PLoS ONE, 17(1):1–17, jan 2022.
  66. Baljit Singh Saini, Parminder Singh, Anand Nayyar, Navdeep Kaur, Kamaljit Singh Bhatia, Shaker El-Sappagh, and Jong Wan Hu. A three-step authentication model for mobile phone user using keystroke dynamics. IEEE Access, 8(2020):125909–125922, 2020.
  67. Asma Salem, Ahmad Sharieh, Azzam Sleit, and Riad Jabri. Enhanced authentication system performance based on keystroke dynamics using classification algorithms. KSII Transactions on Internet and Information Systems, 13(8), 2019.
  68. Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, and Roy A. Maxion. Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Transactions on Information Forensics and Security, 133(1):48–62, 2017.
  69. Chao Shen, Yong Zhang, Zhongmin Cai, Tianwen Yu, and Xiaohong Guan. Touch-interaction behavior for continuous user authentication on smartphones. In Proceedings of the International Conference on Biometrics (ICB 2015), pages 157–162, 2015.
  70. Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S. Balagani. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security, 11(5):877–892, 2016.
  71. Lichao Sun, Yuqi Wang, Bokai Cao, Philip S. Yu, Witawas Srisa-An, and Alex D. Leow. Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multiview Deep Learning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017.
  72. Yan Sun, Hayreddin Ceker, and Shambhu Upadhyaya. Shared keystroke dataset for continuous authentication. In Proceedings of the 8th IEEE International Workshop on Information Forensics and Security (WIFS 2016), pages 1–6, 2017.
  73. Ramin Toosi and Mohammad Ali Akhaee. Time-frequency analysis of keystroke dynamics for user authentication. Future Generation Computer Systems, 115(2021):438–447, feb 2021.
  74. Tim Van hamme, Davy Preuveneers, and Wouter Joosen. Managing distributed trust relationships for multi-modal authentication. Journal of Information Security and Applications, 40(2018):258–270, 2018.
  75. Yuhua Wang, Chunhua Wu, Kangfeng Zheng, and Xiujuan Wang. Improving reliability: User authentication on smartphones using keystroke biometrics. IEEE Access, 7(2019):26218–26228, 2019.
  76. Guannan Wu, Jian Wang, Yongrong Zhang, and Shuai Jiang. A continuous identity authentication scheme based on physiological and behavioral characteristics. Sensors, 18(1):179, 2018.
  77. Yafang Yang, Bin Guo, ZhuWang, Mingyang Li, Zhiwen Yu, and Xingshe Zhou. BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Networks, 84(2019):9–18, 2019.
  78. Enzhe Yu and Sungzoon Cho. Keystroke dynamics identity verification: Its problems and practical solutions. Computers and Security, 23(5):428–440, 2004.
Index Terms

Computer Science
Information Sciences
Biometrics
User authentication
Health insurance

Keywords

Human gait analysis Human computer interaction Gesture Action recognition Anomaly detection User authentication Scaled manhattan