Results 1 - 10
of
13
An Efficient User Verification System via Mouse Movements
"... Biometric authentication verifies a user based on its inherent, unique characteristics—who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their unique patterns of mouse movements, is one such behavioral bi ..."
Abstract
-
Cited by 17 (1 self)
- Add to MetaCart
(Show Context)
Biometric authentication verifies a user based on its inherent, unique characteristics—who you are. In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user. Mouse dynamics, with their unique patterns of mouse movements, is one such behavioral biometric. In this paper, we present a user verification system using mouse dynamics, which is both accurate and efficient enough for future usage. The key feature of our system lies in using much more fine-grained (point-bypoint) angle-based metrics of mouse movements for user verification. These new metrics are relatively unique from person to person and independent of the computing platform. Moreover, we utilize support vector machines (SVMs) for accurate and fast classification. Our technique is robust across different operating platforms, and no specialized hardware is required. The efficacy of our approach is validated through a series of experiments. Our experimental results show that the proposed system can verify a user in an accurate and timely manner, and induced system overhead is minor.
Unobservable Reauthentication for Smartphones
- In NDSS. The Internet Society
, 2013
"... The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are becoming a personal entrance to networks, and may store private in-formation. Due to its small size, a smartphone could be easily taken away and used by an attacker. Using a victim’s smartphone, the ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
(Show Context)
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are becoming a personal entrance to networks, and may store private in-formation. Due to its small size, a smartphone could be easily taken away and used by an attacker. Using a victim’s smartphone, the attacker can launch an impersonation at-tack, which threatens the security of current networks, espe-cially online social networks. Therefore, it is necessary to design a mechanism for smartphones to re-authenticate the current user’s identity and alert the owner when necessary. Such a mechanism can help to inhibit smartphone theft and safeguard the information stored in smartphones. In this pa-per, we propose a novel biometric-based system to achieve continuous and unobservable re-authentication for smart-phones. The system uses a classifier to learn the owner’s fin-ger movement patterns and checks the current user’s finger movement patterns against the owner’s. The system contin-uously re-authenticates the current user without interrupt-ing user-smartphone interactions. Experiments show that our system is efficient on smartphones and achieves high accuracy.
Poster: Real-time continuous iris recognition for authentication using an eye tracker,” The ACM Computing Classification System
"... authentication using an eye tracker ..."
(Show Context)
L.f.: Touch gestures based biometric authentication scheme for touchscreen mobile phones
- Proc. of the Eighth China Int’l Conf. on Information Security and Cryptology
, 2013
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
Authentication Systems: Principles and Threats
"... Identity manipulation is considered a serious security issue that has been enlarged with the spread of automated systems that could be accessed either locally or remotely. Availability, integrity, and confidentiality represent the basic requirements that should be granted for successful authenticati ..."
Abstract
- Add to MetaCart
(Show Context)
Identity manipulation is considered a serious security issue that has been enlarged with the spread of automated systems that could be accessed either locally or remotely. Availability, integrity, and confidentiality represent the basic requirements that should be granted for successful authentication systems. Personality verification has taken multiple forms depending on different possession types. They are divided into knowledge based, token based, and biometric based authentication. The permanent ownership to the human being has increased the chances of deploying biometrics based authentication in highly secure systems. It includes capturing the biological traits, which are physiological or behavioral, extracting the important features and comparing them to the previously stored features that belong to the claimed user. Various kinds of attacks aim to take down the basic requirements at multiple points. This paper describes different types of authentication along with their vulnerable points and threatening attacks. Then it provides more details about the biometric system structure as well as examples of distinguishing biological characteristics, organized by their locations. It shows the performance results of various biometric systems along with the deployed algorithms for different components.
A Dynamic Behavioral Biometric Approach to Authenticate Users Employing Their Fingers to Interact with Touchscreen Devices by
, 2015
"... Dissertations by an authorized administrator of NSUWorks. For more information, please contact mgibney@nova.edu. ..."
Abstract
- Add to MetaCart
(Show Context)
Dissertations by an authorized administrator of NSUWorks. For more information, please contact mgibney@nova.edu.
User Authentication Through Biometric Sensors and
, 2013
"... User authentication through biometric sensors and decision fusion ..."
(Show Context)
ABSTRACT
"... The majority of today’s authentication systems, including password and fingerprint scanners, are based on one-time, static authentication methods. A continuous, real-time authentication system opens up the possibility for greater security, but such a system must be unobtrusive and secure. In this wo ..."
Abstract
- Add to MetaCart
(Show Context)
The majority of today’s authentication systems, including password and fingerprint scanners, are based on one-time, static authentication methods. A continuous, real-time authentication system opens up the possibility for greater security, but such a system must be unobtrusive and secure. In this work we studied whether a commercial eye tracker can be used for unobtrusive, continuous, real-time user authentication via iris recognition. In a user study, all 37 participants could be authenticated with 11% equal error rate (EER). For 14 of the 37 users, iris occlusion was sufficiently small to authenticate with 9 % EER. When classified using a k-nearest neighbors algorithm and only the right iris, the same data set allowed 100 % accuracy for k = 3. Although these error rates are too high for standalone use, iris recognition via an eye tracker might enable real-time continuous authentication when combined with other more reliable authentication means (e.g., a password). As eye trackers become widely available their capabilities for multiple factor, continuous authentication will become compelling.
Investigating the Discriminative Power of Keystroke Sound
"... Abstract—The goal of this paper is to determine if keystroke sound can be used to recognize a user. In this regard, we analyze the discriminative power of keystroke sound in the context of a continuous user authentication application. Motivated by the concept of digraphs used in modeling keystroke d ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—The goal of this paper is to determine if keystroke sound can be used to recognize a user. In this regard, we analyze the discriminative power of keystroke sound in the context of a continuous user authentication application. Motivated by the concept of digraphs used in modeling keystroke dynamics, a virtual alphabet is first learned from keystroke sound segments. Next, the digraph latency within pairs of virtual letters, along with other statistical features, are used to generate match scores. The resultant scores are indicative of the similarities between two sound streams, and are fused to make a final authentication decision. Experiments on both static and free text-based authentication on a database of 50 subjects demonstrate the potential as well as limitations of keystroke sound. Index Terms—Keystroke sound, keystroke dynamics, keyboard typing, continuous authentication. I.