中央研究院  |   資訊科學研究所  |   多媒體網路與系統實驗室 
Trajectory based Behavior Analysis for User Verification
(NOTE: Sheng-Wei Chen is also known as Kuan-Ta Chen.)

Abstract
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden pattern on the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior on the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The result shows that the proposed method can accurately verify the user identity. The similar method may also be applied for the task of recognition, predicting the trajectory type without pre-defined identity.

Citation
Hsing-Kuo Pao, Hong-Yi Lin, and Kuan-Ta Chen, "Trajectory based Behavior Analysis for User Verification," In Proceedings of IDEAL 2010, Sep 2010.

BibTex
@INPROCEEDINGS{pao10:behavior,
  AUTHOR     = {Hsing-Kuo Pao and Hong-Yi Lin and Kuan-Ta Chen},
  TITLE      = {Trajectory based Behavior Analysis for User Verification},
  BOOKTITLE  = {Proceedings of IDEAL 2010},
  MONTH      = {Sep},
  YEAR       = {2010}
}
Downloads