User authentication method based on keystroke dynamics and mouse dynamics using HDA

被引:2
|
作者
Shi, Yutong [1 ]
Wang, Xiujuan [1 ]
Zheng, Kangfeng [2 ]
Cao, Siwei [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
基金
北京市自然科学基金;
关键词
Biometrics; Keystroke dynamics; Mouse dynamics; User authentication; VERIFICATION; PERFORMANCE; FUSION;
D O I
10.1007/s00530-022-00997-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric authentication has advantages over traditional authentication based on passwords or pin number (PIN) in that it is based on the user's inherent characteristics which is not easily stolen or lost. Keystroke dynamics and mouse dynamics are biometrics that study the behavior patterns of human-computer interaction (HCI). Personal keystroke pattern and mouse-movement pattern are difficult to imitate and can, therefore, be used for personal identity authentication. Keystrokes and mouse movements can potentially authenticate users without affecting the use of computers and other devices to improve system security. In real environments, authentication methods that fuse keystroke dynamics and mouse dynamics are less accurate. In this paper, a new method of user authentication using complex real-environment HCI data is presented, which is called authentication adaptation network (AAN). In this method, heterogeneous domain adaptation (HDA) method is used for user authentication based on keystroke dynamics and mouse dynamics for the first time. All representative time windows and dimensionality reduction targets of keystroke dynamics features are compared to determine the parameters of AAN to ensure the robustness of the algorithm, and the effectiveness of the algorithm is demonstrated by validation experiments and comparison with the methods proposed in previous studies. Finally, experiments using the collected real-environment HCI dataset obtained 89.22% user authentication accuracy, which indicate that the proposed method achieves an encouraging performance.
引用
收藏
页码:653 / 668
页数:16
相关论文
共 50 条
  • [1] User authentication method based on keystroke dynamics and mouse dynamics using HDA
    Yutong Shi
    Xiujuan Wang
    Kangfeng Zheng
    Siwei Cao
    [J]. Multimedia Systems, 2023, 29 : 653 - 668
  • [2] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    [J]. IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [3] Keystroke Dynamics Based User Authentication using Numeric Keypad
    Saini, Baljit Singh
    Kaur, Navdeep
    Bhatia, Kamaljit Singh
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 25 - 29
  • [4] User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes
    Wang, Xiujuan
    Shi, Yutong
    Zheng, Kangfeng
    Zhang, Yuyang
    Hong, Weijie
    Cao, Siwei
    [J]. SENSORS, 2022, 22 (17)
  • [5] Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics
    Kozierkiewicz-Hetmanska, Adrianna
    Marciniak, Aleksander
    Pietranik, Marcin
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT I, 2016, 9875 : 379 - 387
  • [6] Enhanced Authentication Using Keystroke and Mouse Dynamics
    Boopathi, Mythili
    Vani, M. P.
    [J]. ADVANCES IN KEY ENGINEERING MATERIALS, 2011, 214 : 230 - 234
  • [7] Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification
    Mondal, Soumik
    Bours, Patrick
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY AND BEHAVIOR ANALYSIS (ISBA), 2016,
  • [8] User Authentication Using Keystroke Dynamics via Crowdsourcing
    Foresi, Andrew
    Samavi, Reza
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 336 - 338
  • [9] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2015 - 2027
  • [10] User authentication using keystroke dynamics for cellular phones
    Campisi, P.
    Maiorana, E.
    Lo Bosco, M.
    Neri, A.
    [J]. IET SIGNAL PROCESSING, 2009, 3 (04) : 333 - 341