Keystroke and Eye-Tracking Biometrics for User Identification
نویسندگان
چکیده
Two sources of weak biometric data are investigated for the development of user identification models. A probabilistic neural network model is created from keystroke digraph features extracted from raw typing data. A second model is developed from scan-path features extracted from raw eye-tracking data. A third model is created from a combination of features from the two biometric sources. Experimental results show that models based on keystroke biometric data perform very well, whereas the models involving the eye-tracking data are not as successful but encourage further study.
منابع مشابه
Measuring Usability via Biometrics
This paper reviews some exploratory research focused on developing a usability methodology based on objective biometrics computing using physiological data (ECG, respiration, and GSR sensors, as well as an infrared eye tracker) as well as behavior data (mouse and keystroke input). Following a high level literature review, various biometrics are discussed with the goal of motivating further stud...
متن کاملThe Scalability of Keystroke Biometrics in Access Control and Identity Management Systems
Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. We suggest that keystroke biometric systems can play a role in access control for purposes of identity management systems in conjunction wit...
متن کاملApplying Keystroke Biometrics for User Verification and Identification
Biometrics, the computer-based verification or identification of an individual, is becoming more and more essential due to the increasing demand for high-security systems. Accurate and effective keystroke biometric technology can help provide a major boost to the security of electronic commerce, and it can help curb identify theft. We focus here on two keystroke biometric applications that oper...
متن کاملEnhanced User Authentication Through Keystroke Biometrics
In this paper, we look at several metrics for keystroke-enhanced user authentication. We begin by introducing keystroke biometrics and looking at its advantages and disadvantages. We examine a statistical analysis method described in the current literature and show through experimental data how the metric of consecutive keystroke latencies is inadequate for user authentication. The insufficienc...
متن کاملUser authentication by information source using fuzzy approach in biometric keystroke dynamics
A person’s identity verification became very important in information society. This article presents some results of our research of biometric authentication by keystroke dynamics. The comparison of the stochastic approach and using fuzzy modeling is presented as well. Key-Words: Authentication, identification, biometric, keystroke dynamics, data security, fuzzy.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006