GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR

被引:0
|
作者
Al-Khazzar, Ahmed [1 ]
Savage, Nick [1 ]
机构
[1] Univ Portsmouth, Elect & Comp Engn Dept, Winston Churchill Ave, Portsmouth, Hants, England
关键词
Behavioural Authentication; Biometric Authentication; Identification; Access Control; Graphical Authentication; BIOMETRICS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the feasibility of having an authentication system based on user's behaviour is studied. The approach used is based on psychological mechanisms of authentication which are a subset of a broader class of biometric mechanisms. This project implemented a 3D graphical maze that a user has to navigate through. The user is authenticated based on information collected from their behaviour in reaction to the maze. Results obtained from the experiments revealed that this authentication system has a mean accuracy of 88.33% in identifying different users from each other.
引用
收藏
页码:86 / 89
页数:4
相关论文
共 50 条
  • [41] Sensor-Based User Authentication
    Wang, He
    Lymberopoulos, Dimitrios
    Liu, Jie
    [J]. WIRELESS SENSOR NETWORKS (EWSN 2015), 2015, 8965 : 168 - 185
  • [42] User authentication based on foot motion
    Davrondzhon Gafurov
    Patrick Bours
    Einar Snekkenes
    [J]. Signal, Image and Video Processing, 2011, 5 : 457 - 467
  • [43] Action-based user authentication
    Yampolskiy, Roman V.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2008, 1 (03) : 281 - 300
  • [44] Security in Graphical Authentication
    Rittenhouse, Robert G.
    Chaudry, Junaid Ahsenali
    Lee, Malrey
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 347 - 355
  • [45] Graphical Semantic Authentication
    Dourado, Leonardo dos Santos
    Ishikawa, Edison
    [J]. 2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [46] Click Based Graphical Passward with Text Password Authentication
    Borkar, Vina S.
    Golar, Priti C.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 76 - 79
  • [47] Eye Tracking Recognition-based Graphical Authentication
    Martin, Mihajlov
    Marija, Trpkova
    Sime, Arsenovski
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 166 - 170
  • [48] Personalized graphical user interface based on Java
    Shanxi University of Finance and Economics, No.108, Jinyang Street, Taiyuan, Shanxi, China
    [J]. Commun. Comput. Info. Sci., 1865, PART 2 (308-313):
  • [49] Challenging Challenge Questions: An Experimental Analysis of Authentication Technologies and User Behaviour
    Just, Mike
    Aspinall, David
    [J]. POLICY AND INTERNET, 2010, 2 (01): : 99 - 115
  • [50] A user authentication based on personal history - A user authentication system using e-mail history
    Nishigaki, Masakatsu
    Koike, Makoto
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 305 - +