Biometric Authentication & Identification through Behavioral Biometrics: A Survey

被引:0
|
作者
Pahuja, Gunjan [1 ]
Nagabhushan, T. N. [1 ]
机构
[1] JSS Acad Tech Educ, Noida, India
关键词
Biometrics; keystroke dynamics; typing; authentication & identification; features; KEYSTROKE DYNAMICS; VERIFICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer Security is an important issue now a days because these are used everywhere to store and process the sensitive information. Millions of transactions occur through internet on daily basis and these transactions are to be completed without being exposed to third party. Username and passwords are required to protect the sanctity of the initiating systems. Username can be easily known and passwords can be easily guessed. As the passwords are simple, they are vulnerable to attacks like phishing attacks and brute force attacks etc. Thus a better way to strengthen the password is to combine the passwords with biometrics comprises of behavioral or psychological biometrics. Keystroke dynamics is one of the behavioral biometric techniques, which is cheaper and does not require any additional piece of hardware. The main focus of this paper is to provide an imminent survey of keystroke dynamics based biometrics methods, metrics and various approaches as well as challenges and future directions.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Classification and Authentication of One-dimensional Behavioral Biometrics
    Monaco, John, V
    [J]. 2014 IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2014), 2014,
  • [42] Polar Codes for Biometric Identification and Authentication
    Zhou, Linghui
    Oechtering, Tobias J.
    Skoglund, Mikael
    [J]. 2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [43] A behaviour biometrics dataset for user identification and authentication
    Nnamoko, Nonso
    Barrowclough, Joseph
    Liptrott, Mark
    Korkontzelos, Ioannis
    [J]. DATA IN BRIEF, 2022, 45
  • [44] Stationary mobile behavioral biometrics: A survey
    -Dowling, Aratrika
    Hou, Daqing
    Schuckers, Stephanie
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [45] Mouse Dynamics Behavioral Biometrics: A Survey
    Khan, Simon
    Devlen, Charles
    Manno, Michael
    Hou, Daqing
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [46] Personal authentication through biometric technologies
    Podio, FL
    [J]. 2002 IEEE 4TH INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 2002, : 57 - 66
  • [47] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-Uti, JBT
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 851 - 855
  • [48] Accessing Cloud Services through Biometrics Authentication
    Ruiu, Pietro
    Caragnano, Giuseppe
    Masala, Giovanni L.
    Grosso, Enrico
    [J]. PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS), 2016, : 38 - 43
  • [49] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-uti, JBT
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 694 - 700
  • [50] Survey of Biometric Authentication for E-assessment
    Ojo, S. O.
    Zuva, T.
    Ngwira, S. M.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,