GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR

被引:0
|
作者
Al-Khazzar, Ahmed [1 ]
Savage, Nick [1 ]
机构
[1] Univ Portsmouth, Elect & Comp Engn Dept, Winston Churchill Ave, Portsmouth, Hants, England
关键词
Behavioural Authentication; Biometric Authentication; Identification; Access Control; Graphical Authentication; BIOMETRICS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the feasibility of having an authentication system based on user's behaviour is studied. The approach used is based on psychological mechanisms of authentication which are a subset of a broader class of biometric mechanisms. This project implemented a 3D graphical maze that a user has to navigate through. The user is authenticated based on information collected from their behaviour in reaction to the maze. Results obtained from the experiments revealed that this authentication system has a mean accuracy of 88.33% in identifying different users from each other.
引用
收藏
页码:86 / 89
页数:4
相关论文
共 50 条
  • [1] Graphical User Authentication Algorithms Based on Recognition: A Survey
    Saadi, Zena M.
    Sadiq, Ahmed T.
    Akif, Omar Z.
    [J]. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2024, 12 (02): : 79 - 93
  • [2] Graphical based user authentication with embedded mouse stroke dynamics
    Revett, Kenneth
    Zia, Asim
    de Magalhaes, Sergio Tenreiro
    Santos, Henrique
    [J]. ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 171 - +
  • [3] User dynamics in graphical authentication systems
    Revett, Kenneth
    Jahankhani, Hamid
    de Magalhaes, Sergio Tenreiro
    Santos, Henrique M. D.
    [J]. GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 173 - +
  • [4] A Hybrid Graphical User Authentication Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    [J]. 2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415
  • [5] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [6] Fuzzy rule based intelligent system for user authentication based on user behaviour
    Roy, Arpita
    Razia, Shaik
    Parveen, Nikhat
    Rao, Arumbaka Srinivasa
    Nayak, Soumya Ranjan
    Poonia, Ramesh Chandra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 409 - 417
  • [7] User Behaviour-Based Mobile Authentication System
    Ali, Adnan Bin Amanat
    Ponnusamy, Vasaki
    Sangodiah, Anbuselvan
    [J]. ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, IC4S 2018, 2019, 924 : 461 - 472
  • [8] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [9] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [10] A Graphical Interface for User Authentication on Mobile Phones
    Umar, Mohammad Sarosh
    Rafiq, Mohammad Qasim
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 69 - 74