A k-nearest neighbor approach for user authentication through biometric keystroke dynamics

被引:43
作者
Hu, J. [1 ]
Gingrich, D. [1 ]
Sentosa, A. [2 ]
机构
[1] RMIT Univ, Sch Comp Sci & IT, Melbourne, Vic, Australia
[2] Editure Pty Ltd, Melbourne, Vic, Australia
来源
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13 | 2008年
基金
澳大利亚研究理事会;
关键词
biometric security; keystroke dynamics; access control; biometric authentication;
D O I
10.1109/ICC.2008.301
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke dynamics exhibit people's behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its high FAR (False Acceptance Rate) and FRR (False Rejection Rate). A significant progress, in terms of improving the FAR and FRR performance, has been made by the work of Gunetti and Picardi (2005). However, their identification based authentication suffers a severe scalability issue as it needs to verify the input with every, training sample of every user within the whole database. In this paper, a k-nearest neighbor approach has been proposed to classify users' keystroke dynamics profiles. For authentication, an input will lie checked against the profiles within the cluster which has greatly reduced the verification load. Experiment has demonstrated the same level of FAR and FRR as that of Gunetti and Picardi approach while as high as 66.7% improvement of the authentication speed has been achieved.
引用
收藏
页码:1556 / +
页数:2
相关论文
共 11 条
[1]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[2]  
*BIOP, BIOP AUTH SOFTW HOM
[3]   Fingerprint matching using transformation parameter clustering [J].
Germain, RS ;
Califano, A ;
Colville, S .
IEEE COMPUTATIONAL SCIENCE & ENGINEERING, 1997, 4 (04) :42-49
[4]  
Gollman, 2013, COMPUTER SECURITY
[5]  
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[6]   On-line fingerprint verification [J].
Jain, A ;
Hong, L ;
Bolle, R .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (04) :302-314
[7]  
Lau Edmond, 2004, Enhanced user authentication through keystroke biometrics, V6
[8]  
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[9]  
POLEMI D, BIOMETRIC TECHNIQUES
[10]  
SENTOSA A, 2007, THESIS RMIT U