Adaptive Behaviometrics using Dynamic Keystroke for Authentication System

被引:0
作者
Liliana, Dewi Yanti [1 ]
Satrinia, Dwina [1 ]
机构
[1] Univ Brawijaya, Fac Math & Nat Sci, Dept Comp Sci, Malang, East Java, Indonesia
来源
FUTURE INFORMATION TECHNOLOGY | 2011年 / 13卷
关键词
authentication system; biometrics; behaviometrics; dynamic keystroke; local threshold;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The increasing number of information systems requires a reliable authentication system. Authentication system using behavioral biometrics of human or so-called behaviometrics can be the simplest and the best choice. Therefore, Dynamic Keystroke Authentication System (DKAS) becomes an effective solution which can be easily implemented to gain a high security information system. DKAS verify users based on their typing rythm on keyboard. Two main stages of DKAS is enrollment stage to register the user into the system, and the authentication stage to check the validity of the user. Verification is done by comparing the input feature vectors with template references. Feature matching employed is the combination of statistical method, measure of disorder and direction similarity measure. This combination method is chosen because it is simple and requires only small training data. In order to create an adaptive system we use a local threshold which has different value for different users. From the experiment conducted, the accuracy rate in distinguishing genuine and impostor users is 91.72%. This shows that the adaptive method of DKAS has a promising result.
引用
收藏
页码:233 / 237
页数:5
相关论文
共 7 条
[1]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[2]  
Dabbah M.A., 2007, COMP INT IM SIGN PRO
[3]  
Hocquet S., 2005, 4 IEEE WORKSH AUT ID
[4]   Enhancing security and privacy in biometrics-based authentication systems [J].
Ratha, NK ;
Connell, JH ;
Bolle, RM .
IBM SYSTEMS JOURNAL, 2001, 40 (03) :614-634
[5]  
Saeta J.R., 2003, P 4 INT C AUD VID BA, P70
[6]   Keystroke dynamics in password authentication enhancement [J].
Teh, Pin Shen ;
Teoh, Andrew Beng Jin ;
Tee, Connie ;
Ong, Thian Song .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) :8618-8627
[7]  
Tulyakov S, 2005, LECT NOTES COMPUT SC, V3687, P30