A Secured and Reliable Biometric User Authentication Using Keystroke Template Method

被引:3
|
作者
Visumathi, J. [1 ]
Jayarin, P. Jesu [1 ]
机构
[1] Jeppiaar Engn Coll, Dept Comp Sci & Engn, Madras 600119, Tamil Nadu, India
关键词
Secure computing; keystroke dynamics; biometric authentication;
D O I
10.1080/19361610.2015.1038767
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
One of the major problems faced in today's fast growing ever-expanding Internet world is user authentication. The common method which is based exclusively on username-password has several issues. Some of the issues include loss of password, growing prowess of hackers, and easy access to methods such as phishing and usage of bots. One of the available methods for authentication includes the usage of biometrics as a method to authenticate the user. The method specified in this article is based on keystroke dynamics. A new keystroke algorithm is proposed to make the authentication procedure more secure, reliable, and cheap.
引用
收藏
页码:375 / 384
页数:10
相关论文
共 50 条
  • [1] Keystroke Biometric Systems for User Authentication
    Md Liakat Ali
    John V. Monaco
    Charles C. Tappert
    Meikang Qiu
    [J]. Journal of Signal Processing Systems, 2017, 86 : 175 - 190
  • [2] Keystroke Biometric Systems for User Authentication
    Ali, Md Liakat
    Monaco, John V.
    Tappert, Charles C.
    Qiu, Meikang
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3): : 175 - 190
  • [3] Outlier detection for keystroke biometric user authentication
    Ismail, Mahmoud G.
    Salem, Mohammed A. -M.
    El Ghany, Mohamed A. Abd
    Aldakheel, Eman Abdullah
    Abbas, Safia
    [J]. PeerJ Computer Science, 2024, 10
  • [4] Outlier detection for keystroke biometric user authentication
    Ismail, Mahmoud G.
    Salem, Mohammed A. -M.
    Abd El Ghany, Mohamed A.
    Aldakheel, Eman Abdullah
    Abbas, Safia
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10
  • [5] Biometric Authentication Using Keystroke Dynamics
    Jadhav, Chandralekha
    Kulkarni, Siddhi
    Shelar, Sagar
    Shinde, Kaustubh
    Dharwadkar, Nagaraj V.
    [J]. 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 870 - 875
  • [6] User authentication by information source using fuzzy approach in biometric keystroke dynamics
    Hub, Miloslav
    [J]. PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, : 270 - +
  • [7] Reliable template protection technique for biometric authentication
    Ong, T. S.
    Teoh, Andrew B. J.
    Khor, S. E.
    Connie, T.
    [J]. IEICE ELECTRONICS EXPRESS, 2008, 5 (08): : 278 - 284
  • [8] Studying of keystroke dynamics statistical properties for biometric user authentication
    Alieksieiev, Vasyl
    Strelnitskiy, Aleksey
    Gavva, Dmitry
    Gorelov, Denis
    Synytsia, Yuliia
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), 2018, : 559 - 563
  • [9] POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication
    Ali, Md Liakat
    Tappert, Charles C.
    [J]. PROCEEDINGS OF 2018 IEEE INTERNATIONAL CONFERENCE ON REAL-TIME COMPUTING AND ROBOTICS (IEEE RCAR), 2018, : 612 - 617
  • [10] Biometric verification using keystroke motion and key press timing for ATM user authentication
    Ogihara, Akio
    Matsumura, Hiroyuki
    Shiozaki, Akira
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1 AND 2, 2006, : 199 - 202