Fingerprint Based Authentication System with Keystroke Dynamics for Realistic User

被引:0
作者
Kumar, G. Vinoth [1 ]
Prasanth, K. [1 ]
Raj, S. Govinth [1 ]
Sarathi, S. [1 ]
机构
[1] Kathir Coll Engn, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014) | 2014年
关键词
Biometric technology; fingerprint; keystroke dynamics; user authentication; multimodal biometrics authentication;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the authorized users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystroke dynamics of the password entry. The authentication process is done in three ways. 1. Login credential based on Username and password; 2. Fi ngerprint; 3. Keystroke dynamics (patterns of rhythm and timing created when person types via keyboard). Proposed approach is a multimodal biometrics authentication system.
引用
收藏
页码:206 / 209
页数:4
相关论文
共 7 条
[1]  
De-Song Wang, 2009, 2009 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2009), P65, DOI 10.1109/ICACIA.2009.5361152
[2]   An introduction to biometric recognition [J].
Jain, AK ;
Ross, A ;
Prabhakar, S .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :4-20
[3]   A minutia-based partial fingerprint recognition system [J].
Jea, TY ;
Govindaraju, V .
PATTERN RECOGNITION, 2005, 38 (10) :1672-1684
[4]  
nik V. N. Vap, 2000, NATURE STAT LEARNING
[5]   Comparing passwords, tokens, and biometrics for user atithentication [J].
O'Gorman, L .
PROCEEDINGS OF THE IEEE, 2003, 91 (12) :2021-2040
[6]   User Authentication Based on Representative Users [J].
Schclar, Alon ;
Rokach, Lior ;
Abramson, Adi ;
Elovici, Yuval .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06) :1669-1678
[7]  
Traore Issa, 2005, P IEEE