Keystroke Authentication on Enhanced Needleman Alignment Algorithm
نویسندگان
چکیده
منابع مشابه
Enhanced User Authentication Through Keystroke Biometrics
In this paper, we look at several metrics for keystroke-enhanced user authentication. We begin by introducing keystroke biometrics and looking at its advantages and disadvantages. We examine a statistical analysis method described in the current literature and show through experimental data how the metric of consecutive keystroke latencies is inadequate for user authentication. The insufficienc...
متن کاملA Survey On Keystroke Authentication By Using Local Search Algorithm
In now a days Password authentication plays a vital role typing biometrics as a transparent layer of user authentication for security. Keystroke authentication provides security to the applications like electronic mail, banking and any other web services etc., There are several types of techniques to protect our passwords but it can be easily hacked by the hackers through so many algorithms. By...
متن کاملEnhanced Knowledge-Based User Authentication Technique Via Keystroke Dynamics
Some common words (name, address, E-mail ID, password, ...), we press daily and we are habituated to press it in same rhythm, which is unique and can be used to segregate and distinguish people. In this paper we are considering password as well as habitual rhythm of the entered password to enhance the security level in knowledge-based user authentication. Recognizing typing style promises a par...
متن کاملKeystroke Dynamics Authentication
Everybody needs to authenticate himself on his computer before using it, or even before using different applications (email, e-commerce, intranet, . . . ). Most of the times, the adopted authentication procedure is the use of a classical couple of login and password. In order to be efficient and secure, the user must adopt a strict management of its credentials (regular changing of the password...
متن کاملUser Authentication Based On Keystroke Dynamics
The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Information Management
سال: 2014
ISSN: 2160-5912,2160-5920
DOI: 10.4236/iim.2014.64021