User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
|
|
- Donald Sims
- 8 years ago
- Views:
Transcription
1 2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok Saevanee Department of Mathematics, Faculty of Science, Chulalongkorn University, Thailand Pattarasinee Bhatarakosol Department of Mathematics, Faculty of Science, Chulalongkorn University, Thailand Abstract Now mobile devices are developed to serve various functions, storing the sensitive information. In order to protect those information and mobile systems from unauthorized users, the authentication system must be installed unavoidably. Additionally, the development of the mobile system is moving forward to the touch screen system for user friendly and quick access mechanism. In this paper, we proposed behavioral manners of users over the touchpad acting like touch screen that is able to detect the finger pressure. These behaviors are keystroke dynamics and the finger pressure. The finding has shown that, the finger pressure gives the discriminative information more than keystroke dynamics with the k-nn analytical method. Moreover, using only the finger pressure produces high accuracy rate of 99%. 1. Introduction Nowadays, Mobile devices, such as cellular phones and Personal Digital Assistants (PDAs), become widespread in excess over 3 billion users [1]. Most of them are operated by touching a display commonly used because the touch screen interface is easy to use and user-friendly operates. Currently, mobile devices are used to not only make or receive a call, take photos, and play video games, but also give the special assistance in the business, such as providing internet access, directing access to and cooperating data, transferring money, and managing bank account. As a consequence, the authentication of users for mobile devices has become an important issue. According to [2], the authentication on mobile devices can be classified in three fundamental approaches. The first approach is using a PIN (Personal Identification Number) or a password which is a secrete-knowledge based technique. This technique offers a standard level of protection and provide cheap and quick authentication. Unfortunately, it is not enough to the safeguard mobile device and data access through them because passwords have never been completely protected by the owners; sharing passwords with friends or any other systems are unavoidable problems. Moreover, the result of a survey from [3] has shown that most users agree that using PIN is very inconvenient and they do not have confidence in the protection of the PIN facility provides. The second approach is the token-based technique or SIM (Subscriber Identification Module). In this approach, when users do not want to use the mobile, the mobile s SIM must be removed. However, removing SIM is not recommended due to inconvenient manners. The last approach is applying the biometric technique. This technique is based on a unique characteristic of a person that provides an improvement on the current authentication. Biometrics relevance with the identification and verification of individual based on human characteristics. Biometric approaches are typically subdivided into two categories: physiological and behavioral biometrics. Physiological biometric is based on bodily characteristics, such as fingerprint, facial recognition, and iris scanning. Behavioral biometric is based on the way people do things, such as keystroke dynamics, mouse movement, and speech recognition. Using any kind of mobile phones, people cannot avoid interact with keystroke dynamics. However, each person may have different styles to press the key because the typing style is based on user s experience and individual skill which is difficult to imitate. The purpose of this paper is to investigate the behavioral manner of users when dialing the phone number on touchpad acting like touch screen on the mobile touch screen detected force in the future [4]. Using keystroke dynamics and the finger pressure /08 $ IEEE DOI /ICCEE
2 information are the features to authenticate users to increase the accuracy using the combination of behavioral biometrics. The remaining of this paper is organized in six sections. In the Section II is presented works published in the area. In the Section III, the purpose of methodology is discussed: gathering the data, extracting the features, and data structuring and anglicizing. The results are presented in Section IV and discuss in Section V. Finally, the conclusions and future work are presented in Section VI. 2. Related works A keystroke dynamics is based on the assumption that different people have unique habitual rhythm pattern in the ways they typed. The first study was done in 1980 by Gaines [5] who showed that the keystroke timing is a feasible authentication measure. Researches on user authentication using the keystroke dynamics are still going on and numbers of the researches are increasing. The assessment of keystroke dynamics is based on the traditional statistical analysis or the relatively newer pattern recognition technique. Previous researchers used the pattern recognition approach, such as z-test [5], Bayesian classifiers [6], and neuron network [6], [7]. However, all of these studies focus on the keystroke dynamics input from a standard PC keyboard. A few studies have considered the feasibility of the keystroke dynamics on mobile devices. In 2002, Mantyjarvit et al. [8] has investigated the keystroke recognition for the virtual keyboard that used to interact with the hand held electronic devices, such as PDAs, and Mobile phones. The result showed that the accuracy for keystroke recognition using k-nn classification is nearly 100%. Additionally, Clarke et al. [7] investigated the feasibility of authenticating users based on their typing 4-digits represented PIN number and 11-digits represented telephone number on mobile devices using the neural network method showing the keystroke latency as viable discriminative characteristics for at least some of the participant. Furthermore, they also investigated on the utilization of keystroke analysis as authentication method in device that offers the tactile environment of thumb-based keyboard [9]. The results from both studied showed that from the two traditionally used keystroke characteristics, the interkey gave promising results. According to the research of Grabham [10], the investigation of a biometric based on force and keypress duration of a user entering a PIN on an ATMtype interface coupled with a component-wise verification scheme was determined. The result of this investigation indicated that using force and key press duration can identify users with high accuracy and low error rate. 3. Experiment Procedure This section described the feasibility study to authenticate a user using combination of force sensitive and keystroke dynamics. The experimental device is a notebook touch pad acting like a mobile touch screen; the measurement of force and value of keystroke dynamics is performed when the user enters 10-digit number on the touch pad. Details of the experiment are elaborated as follows. 3.1 Data Gathering The size of the notebook touchpad, Synaptic Touchpad, is cm2 dividing to the same size of cm2 keys, totally 12 keys. The sensitivity of this pad is approximately 1000 dots per inch. Furthermore, all participants will have time to get used to this touch pad before the measurement process. Referring to the research of [7], 10-digit input value has a longer feature set and made it more difficult for an imposter to duplicate. Thus, the sample size of 10 (n=10; female=6, male=4) entered their cell phone numbers, with 10 digits long, times continuously and repeatedly. The measurement values, the finger pressure and finger position on the touch pad, will be recorded every 20 ms Extracting Features The behavior information on the pad that can be detected consists of keystroke dynamics and the finger pressure. Three features extracted from these behaviors. Two features were extracted during the keystroke dynamics: the inter-key and the hold-time. Another one feature is the finger pressure which is the force applied over the finger position. The inter-key is the duration of interval between two successive keys; the hold-time is the duration of interval between the pressing and releasing of a single key. Figure 1 shows the extracted features: hold-time (H) and inter-key (I) of a volunteer performing one time measurement by typing a 10-digit number. Since there are 10 participants entering times of 10-digit numbers, there are 3,000 values of the holdtime, 2,700 values of the inter-key, and 3,000 values of the finger pressure. These values will be constructed as vectors to be analyzed as described in the next section. 83
3 pressure time (ms) H1 H2 H3 H4 H5 H6 H7 H8 H9 H10 I1 I2 I3 I4 I5 I6 I7 I8 I9 Figure 1. Hold-time and Inter-key for a 10-digit number 3.3 Data Structuring Considering the finger pressure value, this value is obtained in different manners from other values mentioned above. Since the pressing area is not a single small point but it consists of multiple points on the pad, therefore, there are multiple pressing values over the pressed pad for each pressed digit. Thus, the average value of these multiple pressing values is used as the representative for one pressing digit, as shown in Figure 2. As same as other vectors, the vector of the finger pressure values is constructed as follows. P i, j FP i = [ Pi, 1, Pi,2,..., Pi, 10] Where denotes the average value of finger pressure values at the round i of digit j. Since this experiment is interested in using both hold-time and inter-key, vectors of each value will be constructed to determine its characteristics before the combination of these two values is determined the action effect of hold-time and inter-key. Considering the hold-time values of each person that presses one time for a 10-digit number, a vector in R R... R (10 terms) when R + is the set of all positive real numbers is created and can be written as follows. p 1 p p 5 p 3 2 p 4 p... p N N N p k k= Pi j = 1, Where digit j. H i, j HT i = [ Hi, 1, H i,2,..., Hi, 10] denotes the hold-time at the round i of As same as the hold-time value, the feature of the inter-key which is the interval duration between the two successive key, will be generated nine values for one time press of 10 digits. Thus, a vector in R R... R (9 terms) when R + is the set of all positive real numbers is created and can be written as follows. Where digit j. I i, j IK i = [ Ii, 1, I i,2,..., Ii, 9 ] denotes the inter-key at the round i of In order to determine the interaction among the hold-time and the inter-key, the concatenation of HT vector i IK and i is performed as follows. Figure 2. Calculation method of the finger pressure value 3.4 Analyzing Features After transforming the data, we investigated the preliminary feasibility of these behavioral biometrics by k-nn classification method that is widely used in data analysis [8] [11]. In k-nn classification the similarity between a validation sample (testing set) vector and reference vectors (training set) are computed using Euclidean distances. The class of feature vector is determined by selecting the class that has majority among the k- nearest neighbors; these are called k-nearest neighbors [8]. Since the total size of a data set is vector values for each person, thus, this set was divided into two groups for in the analytical process; two-third for training set (20 vectors), and one third for testing set (10 vectors). The pattern classification test was performed with one user acting as the valid user, while all others are acting as impostors. ( HT IK) i = [ Hi, 1, H i,2,..., Hi,10, Ii,1, Ii,2,..., Ii, 9] 84
4 In all biometrics, the measurement values to assess the performance of keystroke dynamics are defined as following: False Acceptance Rate (FAR) refers to the percentage of imposter was accepted by the system. False Rejection Rate (FRR) refers to the percentage of authorized users was rejected from the system. Equal Error Rate (EER) refers to the rate at which both accept and reject errors are equal. Moreover, this value is used to compare the performance of different biometric techniques. 7. Results Equal Error Rate (%) H I P HI HIP HP Features Figure 3. Equal Error Rate of each feature Figure 3 shows the EER values of all biometric measurement: the hold-time (H), the inter-key (I), the finger pressure (P). Additionally, the interactions among these metrics are considered; these are (1) keystroke dynamics which is the interaction between the hold-time and the inter-key (HI), (2) interaction between the hold-time and the finger pressure (HP), and (3) the interaction among three factors (HIP). Consider each main biometric according to Figure 3, the EER value of the hold-time is %, the inter-key is 35%, and the finger pressure has the lowest EER value, 1%. These numbers determine that the accuracy to identify a person can be obtained using the finger pressure value, and the alternative method is to apply the behavior of the hold-time or the inter-key. Referring to Figure 3, the interaction of biometrics is also considered, the results show that the best measurement value is obtained from the interaction between hold-time and finger pressure methods. This method has the EER value as same as the EER value of the finger pressure value, 1%. However, the interaction among three biometrics are also efficient because the EER value is only 9% while using the hold-time and the inter-key behavior does not be a good choice to identify persons since the EER value is 27% Discussion As the fact that the use of mobile devices is rapidly growth and developed, the motivation of stealing is also increased. Therefore, in order to protect the mobile devices, in every type of mobile hardware, the authentication system was implemented. One method to authenticate the mobile users is the use of biometric value, measured from the biometrics methods. The results in this paper that measure the EER values, using k-nn method, from three different behavior measurement values: the hold-time (H), the inter-keys (I), the finger pressure (P) shows that using the finger pressure as the indicator to identify users is the best measurement value although [10] had proposed that the accuracy to identify users can be obtained from the interaction of all three factors (HIP) analyzed by the component-wise verification scheme. Additionally, using the interaction among the hold-time and the finger pressure is also another choice to identify users with high accuracy, in order to protect any forges because the accuracy rate is 99% which is somehow much better than using the keystroke dynamics that analyzed by FF-MLP proposed by [7]. Nevertheless, [8] proposed that the keystroke dynamics can also be applied to identify users with high accuracy, 99%, under the use of the k-nn analytical method. 9. Conclusion Since mobile devices are developed to serve various functions, thus important data may be stored in the mobile memory card. In order to protect those information and mobile system from unauthorized users, the authentication system must be installed unavoidably. Although there are various authenticate methods, using bio data is one of the most interesting area to be applied. Additionally, the development of the mobile system is moving forward to the touch screen system for user friendly and quick access mechanism. Therefore, this paper focuses on the study of implementing the Biometric measurement to identify users. We investigate the potential of each biometrics behavioral by individual and couple, comprise with the hold-time, the inter-key, and the finger pressure. The results have shown that using only the finger pressure with the k-nn analytical method can indicate users with accuracy rate as 99% which is the same as using the combination of the hold-time and the finger pressure. However, the interaction of all three metrics is another alternative method to identify users since the correctness of the identifying mechanism is up to 90%. Therefore, implementing these alternative methods as a 85
5 part of the authentication system of the mobile devices can assure that the system is well protected and difficult to be broken by any imposters. 10. References [1] GSMWorld.com:WorldCellularSubscribers [2] S. Nanavati, M. Thieme, and R. Nanavati, Biometrics identity verification in a networked world, John Wiley & Sons, 2002 [3] N.L. Clarke and S.M. Furnell, Authentication of users on mobile telephones A survey of attitudes and practices, Computers & Security, October 2005, Vol.24, pp [4] [5] R. Gaines, W. Lisowski, S. Press and N. Shapiro, Authentication by keystroke timing: some preliminary results. Rand Report R-2560-NSF, Rand Corporation California, [6] M.S. Obaidat and B. Sadom, Verification of Computer Users Using Keystroke Dynamics, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, April 1997, Vol. 27, pp [7] N.L. Clarke and S.M. Furnell, Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, Springer-Verlag, Berlin, Heidelberg, December 2006, pp [8] J. Mantyiarvi, J. koivumaki and P. Vuori, keystroke recognition for virtual keyboard, Proceeding of international Conference on Multimedia and Expo, November 11, 2002, Vol. 2, pp [9] S. Karatzouni and N. Clark, New Approaches for security, Privacy and Trust in Complex Environments, Springer Boston, Vol.32, [10] N J Grabham and N M White, Use of a Novel Keypad Biometric for Enhanced User Identity Verification, IEEE International Instrumentation and Measurement Technology Conference, Victoria, Vancouver Island, Canada, May 12-15, [11] S.R. Kulkarni, G. Lugosi, and S. S. Venkatesh, Learning Pattern Classification - Survey, IEEE Transaction on Information Theory, October 1998, Vol.44, pp
User Authentication Methods for Mobile Systems Dr Steven Furnell
User Authentication Methods for Mobile Systems Dr Steven Furnell Network Research Group University of Plymouth United Kingdom Overview The rise of mobility and the need for user authentication A survey
More informationDeployment of Keystroke Analysis on a Smartphone
Deployment of Keystroke Analysis on a Smartphone A. Buchoux 1 and N.L. Clarke 1,2 1 Centre for Information Security & Network Research, University of Plymouth, Plymouth, UK info@cisnr.org 2 School of Computer
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
Authentication System for Online Banking Application by Using Keystroke Dynamic on Android Phones Dnyaneshwari S. Dhundad, Prof. D. N. Rewadkar Post Graduate Student, Dept. of Computer Engineering, RMD
More informationPersonal Identification Techniques Based on Operational Habit of Cellular Phone
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationCyberspace Security Use Keystroke Dynamics. Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science
Cyberspace Security Use Keystroke Dynamics by Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment
More informationThe Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
More informationBehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationEstablishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationIdentity Theft, Computers and Behavioral Biometrics
Identity Theft, Computers and Behavioral Biometrics Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafić, Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller,
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationA Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics
370 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics S.Benson Edwin Raj Assistant
More informationContinuous Biometric User Authentication in Online Examinations
2010 Seventh International Conference on Information Technology Continuous Biometric User Authentication in Online Examinations Eric Flior, Kazimierz Kowalski Department of Computer Science, California
More informationInternet and Computing Core Certification Guide Module A Computing Fundamentals
Lesson 4: Using Input/Output Devices input/output devices common input devices common output devices specialized devices how a device connects what a port is what a device driver is What are Input/Output
More informationMulti-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
More informationMeasuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationKEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
More informationA Novel Identification/Verification Model Using Smartphone s Sensors and User Behavior
A Novel Identification/Verification Model Using Smartphone s Sensors and User Behavior Dandachi Ghina, Bachar El Hassan, Anas El Husseini To cite this version: Dandachi Ghina, Bachar El Hassan, Anas El
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationProgressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock
Progressive Authentication on Mobile Devices Zachary Fritchen Introduction Standard authentication schemes on mobile phones are at the moment very limited. They are typically restricted to a single security
More informationRobust Security System for Critical Computers
I.J. Information Technology and Computer Science, 2012, 6, 24-29 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2012.06.04 Robust Security System for Critical Computers
More informationSupport Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
More informationMethod of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
More informationConsumers Awareness of, Attitudes Towards and Adoption of Mobile Phone Security
Consumers Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski Ericsson Research, Kista, Sweden stewart.kowalski@ericsson.com Mikael Goldstein Migoli, Stockholm, Sweden
More informationApplication-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
More informationKeywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
More informationHow To Understand How To Authenticate On A Mobile Device
1 Table of Contents TABLE OF CONTENTS... 2 1 INTRODUCTION... 4 2 METHODS... 4 3 AUTHENTICATION METHODS USED ON MOBILE AND STATIONARY DEVICES... 5 3.1 INTRODUCTION... 5 3.2 SOMETHING THE USER KNOWS... 6
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationVoice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
More informationAutomatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationBiometrics in Secure e-transaction
Biometrics in Secure e-transaction Ms. Swati S Bobde 1, Prof. D. N. Satange 2 1 Post Graduate Student, Dept of Computer Science, Arts, Commerce & Science College, Amravati 2 Asstt. Professor, Dept of Computer
More informationHANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
More informationAuthentication Solutions Through Keystroke Dynamics
Objective: The objective of this paper is to provide a basic understanding of the biometric science of keystroke dynamics, and how BioPassword is using keystroke dynamics technology to deliver enterprise
More informationEnhanced Password Based Security System Based on User Behavior using Neural Networks
I.J. Information Engineering and Electronic Business, 2012, 2, 29-35 Published Online April 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijieeb.2012.02.05 Enhanced Password Based Security System
More informationDESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
More informationEfficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
More informationA Model to Secure Mobile Devices Using Keystroke Dynamics through Soft Computing Techniques
International Journal of Soft Computing and Engineering (IJSCE) A Model to Secure Mobile Devices Using Dynamics through Soft Computing M. Karnan, N. Krishnaraj Abstract- In this mobile world, there are
More informationComparative Analysis of Handwritten, Biometric and Digital Signature
International Review of Social Sciences and Humanities Vol. 4, No. 2 (2013), pp. 43-53 www.irssh.com ISSN 2248-9010 (Online), ISSN 2250-0715 (Print) Comparative Analysis of Handwritten, Biometric and Digital
More informationEvaluation of Sensors as Input Devices for Computer Music Interfaces
Evaluation of Sensors as Input Devices for Computer Music Interfaces Mark T. Marshall 1 and Marcelo M. Wanderley 1 Input Devices and Musical Interaction Laboratory, McGill University - Music Technology,
More information22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationMULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
More informationDetecting Credit Card Fraud
Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationSoftware Only Biometrics to Authenticate Student ID
Software Only Biometrics to Authenticate Student ID Report of Pilot with the University of Texas System TeleCampus Prepared by: Lori McNabb MS Assistant Director, Student and Faculty Services University
More informationA New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users
2012 IEEE Sixth International Conference on Software Security and Reliability A New Non-Intrusive Authentication Method based on the Orientation Sensor for Smartphone Users Chien-Cheng Lin Dept. of Computer
More informationA Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor
More informationAnalysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationBIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION Smita S. Mudholkar 1, Pradnya M. Shende 2, Milind V. Sarode 3 1, 2& 3 Department of Computer Science &
More informationDevelopment of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationDigital Fingerprinting Based on Keystroke Dynamics
Digital Fingerprinting Based on Keystroke Dynamics Abstract A. Ahmed, I. Traore and A. Almulhem Department of Electrical and Computer Engineering University of Victoria, Victoria, BC, Canada e-mail: {aahmed,
More informationDiscriminative Multimodal Biometric. Authentication Based on Quality Measures
Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,
More informationBiometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.
Biometric Security: Client-Server Systems Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.com The Session Private vs Public / Personal vs Public Forms
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationUSING SELF-ORGANIZED MAPS AND ANALYTIC HIERARCHY PROCESS FOR EVALUATING CUSTOMER PREFERENCES IN NETBOOK DESIGNS
International Journal of Electronic Business Management, Vol. 7, No. 4, pp. 297-303 (2009) 297 USING SELF-ORGANIZED MAPS AND ANALYTIC HIERARCHY PROCESS FOR EVALUATING CUSTOMER PREFERENCES IN NETBOOK DESIGNS
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationAn Analysis of Keystroke Dynamics Use in User Authentication
An Analysis of Keystroke Dynamics Use in User Authentication Sam Hyland (0053677) Last Revised: April 7, 2004 Prepared For: Software Engineering 4C03 Introduction Authentication is an important factor
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationTwo Factor Authentication for VPN Access
Trends in cloud computing, workforce mobility, and BYOD policies have introduced serious new vulnerabilities for enterprise networks. Every few weeks, we learn about a new instance of compromised security.
More informationBehavioural Biometrics for Multi-Factor Authentication in Biomedicine
Original Article en19 Behavioural Biometrics for Multi-Factor Authentication in Biomedicine Anna Schlenker 1,2, Milan Šárek 3 1 EuroMISE Centre, Institute of Computer Science AS CR, Prague, Czech Republic
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationMobile Phone Location Tracking by the Combination of GPS, Wi-Fi and Cell Location Technology
IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 566928, 7 pages DOI: 10.5171/2010.566928 Mobile Phone Location Tracking
More informationAccessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationUser Authentication/Identification From Web Browsing Behavior
User Authentication/Identification From Web Browsing Behavior US Naval Research Laboratory PI: Myriam Abramson, Code 5584 Shantanu Gore, SEAP Student, Code 5584 David Aha, Code 5514 Steve Russell, Code
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More informationA Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
More informationSmart Card in Biometric Authentication
Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: zpozgaj@efzg.hr Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationTwo-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
More informationWhite paper. Biometrics and the mitigation of card-related fraud
White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications
More informationAlternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia eandreeva89@gmail.com
More information3D Signature for Efficient Authentication in Multimodal Biometric Security Systems
3D Signature for Efficient Authentication in Multimodal Biometric Security Systems P. M. Rubesh Anand, Gaurav Bajpai, and Vidhyacharan Bhaskar Abstract Unimodal biometric systems rely on a single source
More informationHigh Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
More informationCheap and easy PIN entering using eye gaze
Cheap and easy PIN entering using eye gaze Pawel Kasprowski, Katarzyna Harężlak Institute of Informatics Silesian University of Technology Gliwice, Poland {pawel.kasprowski,katarzyna.harezlak}@polsl.pl
More informationCommon Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation
Abstract Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation Narmeen
More informationA secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {bhavintanti@gmail.com} 2 SVNIT, Surat,Gujarat,India 2 {doshinikki2004@gmail.com}
More informationA SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
More informationAutomated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)
Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM) Yekini N.A. Department of Computer Technology Yaba College of Technology, Lagos Nigeria. Itegboje A.O. PHD Candidate, SMED
More informationPalmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: asfli@ntu.edu.sg
More informationA Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
More informationChapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
More informationClassification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationFace Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationOnline Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
More information