Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








127 Hits in 3.9 sec

User Authentication by Keystroke Dynamics Using Machine Learning Algorithms

Najla Alavi, Kasim K
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Keystroke Dynamics has high use in cyber intelligence. The paper examines the helpfulness of keystroke dynamics to build up the individual personality.  ...  Pair wise user coupling technique is proposed. The proposed procedures are approved by utilizing keystroke information.  ...  User Coupling (PUC) is the most vigorous identification scheme. Also, this method has a lower computational complexity.  ... 
doi:10.32628/cseit1953137 fatcat:ufg4sdt6svenlip7yf5xpmhesm

Graphical Based Authentication System Using Keystroke Parameters and Cued Click- Points: A Survey

Ruta Gore
2019 International Journal for Research in Applied Science and Engineering Technology  
A possible remedy against such a scenario is to use Keystroke Dynamics for providing security in banking application.  ...  This paper gives the survey of different techniques used by the researcher for providing security.  ...  Author uses different machine learning algorithms along with the pairwise user coupling technique and show the performance of each separate technique .  ... 
doi:10.22214/ijraset.2019.1133 fatcat:f5hbf2m7k5cqjodpxwda6gbzsa

ENHANCING SECURITY USING KEYSTROKE DYNAMICS

Preetha S ., Suhas Kini K ., Shailesh A Patil .
2019 International Journal of Engineering Applied Sciences and Technology  
Pairwise user coupling in a bottom-up tree structure scheme gives the best performance, both concerning accuracy and time complexity. The proposed techniques are validated by using keystroke data.  ...  A study of the usefulness of keystroke dynamics to establish the person identity was done by Mondal, Soumik, and Patrick Bours (2017) in [3] .  ... 
doi:10.33564/ijeast.2019.v04i03.037 fatcat:mxtzdutob5g65n7pgkjt34fhmy

One-handed Keystroke Biometric Identification Competition

John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia
2015 2015 International Conference on Biometrics (ICB)  
This work presents the results of the One-handed Keystroke Biometric Identification Competition (OhKBIC), an official competition of the 8th IAPR International Conference on Biometrics (ICB).  ...  A unique keystroke biometric dataset was collected that includes freely-typed longtext samples from 64 subjects.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or the US government  ... 
doi:10.1109/icb.2015.7139076 dblp:conf/icb/MonacoPTBMRMFO15 fatcat:55kitaa6o5fzzaioppjbsqjkaq

Keystroke Dynamics: Concepts, Techniques, and Applications [article]

Rashik Shadman, Ahmed Anu Wahab, Michael Manno, Matthew Lukaszewski, Daqing Hou, Faraz Hussain
2023 arXiv   pre-print
This survey can be a reference for researchers working on keystroke dynamics.  ...  Keystroke dynamics promises to be non-intrusive and cost-effective as no addition hardware is required other than a keyboard.  ...  They proposed pairwise user coupling technique along with different machine learning algorithms. They also tried to analyze person identification via an optimized feature set.  ... 
arXiv:2303.04605v1 fatcat:hwxavino55gdtefe34xqdkukli

Continuous Authentication by Free-text Keystroke based on CNN and RNN

Lu Xiaofeng, Zhang Shengfei, Pan Hui, Pietro Lio
2020 Computers & security  
Personal keystroke modes are difficult to imitate and can therefore be used for identity authentication.  ...  The keystroke habits of a person can be learned according to the keystroke data generated when the person inputs free text.  ...  They used various machine learning algorithms in combination with the proposed pairwise user coupling technique and demonstrated the performance of each separate technique, as well as the performance when  ... 
doi:10.1016/j.cose.2020.101861 fatcat:zgnlnf2dhbgchddepujbbcnb2a

Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning

Sowndarya Krishnamoorthy, Luis Rueda, Sherif Saad, Haytham Elmiligi
2018 Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA '18  
The keystroke dynamics-based authentication proposed increases the security by verifying based on the alphanumeric-based and personal identification numberbased schemes.  ...  Authenticating mobile phone users using keystroke analysis There has also been some work done by N. L. Clarke on mobile user authentication by using keystroke dynamics.  ... 
doi:10.1145/3230820.3230829 dblp:conf/icbea/KrishnamoorthyR18 fatcat:dejtezhncnf4vpss6pvwibwuua

APPLYING EMPIRICAL THRESHOLDING ALGORITHM FOR A KEYSTROKE DYNAMICS BASED AUTHENTICATION SYSTEM

Priya Chaliyath Venugopal, Kamalan Saroja Angel Viji
2019 Journal of Information and Communication Technology  
One way to strengthen the password-based authentication technique, is by keystroke dynamics.  ...  The second step involves user authentication by applying these threshold values.  ...  A KDA method using pairwise user coupling and machine learning algorithms were presented for both static and dynamic text content resulting to a moderate accuracy of 89.7% (Mondal & Bours, 2017) .  ... 
doi:10.32890/jict2018.18.4.1 fatcat:sobvnwofw5a6zoy4pwyal64rfu

Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface

Avinash Jairam, Tzipora Halevi, Theodore Raphan
2022 Frontiers in Computer Science  
In this paper, we study whether a subset of features that embody human cognitive motor features can be used to identify a particular user.  ...  Recently, Frank et al. have suggested that security could be improved by having an interface with biometric features of finger swiping.  ...  When a Personal Identification Number (P.I.N) is used for identification, an intruder can possibly steal the PIN by looking over the shoulder of a user logging into a system, i.e., "shoulder surfing."  ... 
doi:10.3389/fcomp.2022.754716 fatcat:7qaujf6dv5fplltlg6b3cvyxqq

Improving User Identification Accuracy in Facial and Voice Based Mood Analytics using Fused Feature Extraction

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
based personality profile which is almost unique for each user.  ...  User identification involves a lot of complex procedures including image processing, voice processing, biometric data processing and other user specific parameters.  ...  PROPOSED USER IDENTIFICATION ALGORITHM The proposed system can be represented using the following block diagram, a.  ... 
doi:10.35940/ijitee.b1118.1292s319 fatcat:mit5yizrrvdmhp3dh2sxljmwvi

A heuristics for HTTP traffic identification in measuring user dissimilarity

Adeyemi R. Ikuesan, Mazleena Salleh, Hein S. Venter, Shukor Abd Razak, Steven M. Furnell
2020 Human-Intelligent Systems Integration  
This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the Internet  ...  Additionally, this study extends the paradigm of user identification based on the intrinsic characteristics of users, exhibited in network traffic.  ...  The study presented in (Bergadano et al. 2002) applied the keystroke dynamics of users for identification.  ... 
doi:10.1007/s42454-020-00010-2 fatcat:rv4hod2fq5fp5lkwkg2a4w7fpy

Use of random time-intervals (RTIs) generation for biometric verification

Nikolaos A. Laskaris, Stefanos P. Zafeiriou, Lambrini Garefa
2009 Pattern Recognition  
By incorporating it in an SVM-based verification system, which was trained and tested using a medium sized dataset (from 40 persons), a considerably low equal error rate (EER) of ∼5% was achieved.  ...  By reconstructing and comparing the dynamics across repetitions from the same subject a noticeable consistency was observed.  ...  Keystroke dynamics [3] also known as typing recognition, is a typical biometric approach of this kind. It analyses the way a person types.  ... 
doi:10.1016/j.patcog.2008.12.028 fatcat:xyug7grkubejpnryf7bucspsha

Fusion of eye movement and mouse dynamics for reliable behavioral biometrics

Pawel Kasprowski, Katarzyna Harezlak
2016 Pattern Analysis and Applications  
Achieving such results were possible using dissimilarity matrices based on dynamic time warping distance.  ...  using a common web camera.  ...  Therefore, these values were used in the current research. The sequential minimal optimization algorithm was used [50] with the multiclass problem solved using pairwise coupling [51] .  ... 
doi:10.1007/s10044-016-0568-5 fatcat:ywgscrrcebbmbpolyts4pgblfq

Ranking to Learn and Learning to Rank: On the Role of Ranking in Pattern Recognition Applications [article]

Giorgio Roffo
2017 arXiv   pre-print
In such a case feature selection is used, that, by producing ranked lists of features, helps to filter out the unwanted information.  ...  The rationale behind this fact is that many pattern recognition problems are by nature ranking problems.  ...  Data needed to analyze keystroke dynamics is obtained by keystroke logging.  ... 
arXiv:1706.05933v1 fatcat:oc4xtmyqkvf4njpqsojewv75qu

Investigating the Tradeoffs of Everyday Text-Entry Collection Methods

André Rodrigues, Hugo Nicolau, André Santos, Diogo Branco, Jay Rainey, David Verweij, Jan David Smeddinck, Kyle Montague, Tiago Guerreiro
2022 CHI Conference on Human Factors in Computing Systems  
Here, participants contributed by transcribing, composing, passively having sentences analyzed and refecting on their contributions.  ...  The act of typing itself thereby encodes rich information, such as the typing method, the context it is performed in, and individual traits of the person typing.  ...  Thus, even if an attacker knows the users' password, an additional implicit security layer can verify the identity based on keystroke dynamics [12, 14] .  ... 
doi:10.1145/3491102.3501908 fatcat:ahio32hbdvfmbieev7hgdwgfym
« Previous Showing results 1 — 15 out of 127 results