USER AUTHENTICATION BASED ON BEHAVIORAL PATTERNS

Authors

  • Adrian Kapczynski
  • Pawel Kasprowski
  • Piotr Kuzniacki

DOI:

https://doi.org/10.47839/ijc.6.1.427

Keywords:

Security, biometrics, behavioral biometrics, eye movement analysis, OBER system, keystroke dynamics

Abstract

In this paper biometric techniques based on eye movement and keystroke dynamics were examined. In the first part theoretical aspects concerning biometrics were presented. In second part two prototype systems were characterized: first based on eye movement dynamics and the second based on keystroke dynamics. In the third part chosen system was taken into testing which quantitative effects were presented in categories of FRR, FAR and HTER indicators.

References

J.Ashbourn: BANTAM. Springer Verlag. London, 2002

J. Ashbourn: Biometrics – advanced identity verification. Springer Verlag. London, 2000

J. Daugman,: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, 1993

G. K. Hung: Models of Oculomotor Control, World Scientific Publishing Co., 2001

L. Cowen, L.J. Ball, J.Delin: An eye-movement analysis of web-page usability. Chapter in X. Faulkner, J. Finlay, & F. Detienne (Eds.): People and Computers XVI—Memorable Yet Invisible: Proceedings of HCI 2002. Springer Verlag. London, 2002

D. Noton, L. Stark: Scanpaths in eye movements during pattern perception. Science, 171, 1971

P. Kasprowski. Human Identification Using Eye Movements. Ph.D. Thesis. Silesian University of Technology. Gliwice, 2004

P. Kasprowski, J. Ober. With the flick of an eye, Biometrics Technology Today ISSN 0969-4765, Volume 12, Issue 3, Elsevier Science (2004)

P. Kasprowski, J. Ober. Eye Movement in Biometrics. Proceedings of Biometric Authentication Workshop, European Conference on Computer Vision in Prague 2004. Springer Verlag. London, 2004

A. Kapczynski. About implementation of multiple biometrics authentication system. Proceedings of 2nd International Conference on Information and communication technology security. WSiIZ. Bielsko-Biala, 2003

S. Nanavanti, M. Thieme, R. Nanavati. Biometrics - identity verification. Wiley & Sons, Inc. NY, 2002

R. Spillane. Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin vol. 17, no. 3346, 1975

J. Leggett. Dynamic Identity Verification via Keystroke Characteristics, Int’l J. Man-Machine Studies, vol. 35, no. 6, 1991

F. Monrose, A. Rubin. Keystroke Dynamics as a Biometric for Authentication. Future Generations Computing Systems, vol. 16, no. 4, 2000, pp. 351–359

R. Gaines. Authentication by Keystroke Timing: Some Preliminary Results, tech. report R-256-NSF, RAND, 1980

R. Joyce, G. Gupta. Identity Authentication Based on Keystroke Latencies. Comm. ACM, vol. 33, no. 2, 1990

Downloads

Published

2014-08-01

How to Cite

Kapczynski, A., Kasprowski, P., & Kuzniacki, P. (2014). USER AUTHENTICATION BASED ON BEHAVIORAL PATTERNS. International Journal of Computing, 6(1), 75-79. https://doi.org/10.47839/ijc.6.1.427

Issue

Section

Articles