Keystroke Biometric User Verification Using Hidden Markov Model

被引:18
作者
Ali, Md Liakat [1 ]
Thakur, Kutub [1 ]
Tappert, Charles C. [1 ]
Qiu, Meikang [1 ]
机构
[1] Pace Univ, Seidenberg Sch Comp Sci & Informat Syst, Pleasantville, NY 10570 USA
来源
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2016年
关键词
Hidden Markov Model; Identification; Keystroke Biometrics; Verification;
D O I
10.1109/CSCloud.2016.23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric systems such as fingerprint, iris, DNA became popular methods in user authentication. Compared to these biometric systems, keystroke biometric authentication systems have not gained so much attention because of lower accuracy compared to other biometric systems. A number of researches have been conducted on keystroke biometric using different generative and discriminative classifiers. As Hidden Markov Models have proven a great success in voice recognition, this study investigates Hidden Markov Models in keystroke dynamic. This paper proposes a novel user verification technique using 1-substate Hidden Markov Model through keystroke dynamic. To verify the effectiveness of the proposed system, extensive experiments have been conducted and 80% accuracy was achieved by the proposed system.
引用
收藏
页码:204 / 209
页数:6
相关论文
共 21 条
  • [1] Ali M. L., 2015, P STUD FAC RES DAY M
  • [2] Ali M. L., 2015, I MANAGERS J PATTERN, V2
  • [3] Ali M. L., 2016, J SIGNAL PROCESS SYS, V86, P1, DOI DOI 10.1007/S11265-016-1114-9
  • [4] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [5] [Anonymous], 2007, P 2 ACM S INFORM COM
  • [6] [Anonymous], ACM T INFORM S UNPUB
  • [7] [Anonymous], 2015, DATA SCI BIG DATA AN
  • [8] Beigi H, 2011, FUNDAMENTALS OF SPEAKER RECOGNITION, P411
  • [9] Chang WD, 2005, PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, P487
  • [10] Applying hidden Markov models to keystroke pattern analysis for password verification
    Chen, W
    Chang, WD
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 467 - 474