Remote User Authentication Scheme A comparative analysis and improved behavioral biometrics based authentication scheme

被引:2
作者
Kumar, Pramod [1 ]
Rauthan, Manmohan Singh [2 ]
机构
[1] Uttarakhand Tech Univ, Dept Comp Sci & IT, Dehra Dun, UA, India
[2] HNB Garhwal Univ, Dept Comp Sci & Engn, Srinagar, UA, India
来源
2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE) | 2016年
关键词
remote login; biometric; authentication; security; RECOGNITION;
D O I
10.1109/ICMETE.2016.124
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick and reliable ways of automatic recognition of individual's identity identification are being sought. In this paper, we introduced the non-static biometric scheme (behavioural biometric), which aims to authenticate the users on the basis of user's typing patterns. The proposed scheme is practically implemented in MATLAB software and recognizes the identity of users for authentication.
引用
收藏
页码:311 / 313
页数:3
相关论文
共 15 条
[1]  
[Anonymous], PATTERN RECOGNITION
[2]   SPEAKER IDENTIFICATION BY SPEECH SPECTROGRAMS - A SCIENTISTS VIEW OF ITS RELIABILITY FOR LEGAL PURPOSES [J].
BOLT, RH ;
COOPER, FS ;
DAVID, EE ;
DENES, PB ;
PICKETT, JM ;
STEVENS, KN .
JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 1970, 47 (02) :597-&
[3]   HUMAN AND MACHINE RECOGNITION OF FACES - A SURVEY [J].
CHELLAPPA, R ;
WILSON, CL ;
SIROHEY, S .
PROCEEDINGS OF THE IEEE, 1995, 83 (05) :705-740
[4]  
Chourasia N., 2014, P INT C ADV ENG TECH, P41
[5]   HIGH CONFIDENCE VISUAL RECOGNITION OF PERSONS BY A TEST OF STATISTICAL INDEPENDENCE [J].
DAUGMAN, JG .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (11) :1148-1161
[6]   SPEAKER RECOGNITION - IDENTIFYING PEOPLE BY THEIR VOICES [J].
DODDINGTON, GR .
PROCEEDINGS OF THE IEEE, 1985, 73 (11) :1651-1664
[7]  
Duda R.O., 1973, Pattern Classification and Scene Analysis, V3
[8]  
Gaines R.Stockton., 1980, Authentication by keystroke timing: Some preliminary results
[9]   IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J].
JOYCE, R ;
GUPTA, G .
COMMUNICATIONS OF THE ACM, 1990, 33 (02) :168-176
[10]  
Leggett J., HUMAN FACTOR MANAGEM