Proceedings ArticleDOI
One v/s All SVM Implementation for Keystroke based Authentication System
TLDR
A machine learning approach is proposed to develop an authentication system that provides more robust user identity information using keystroke dynamics biometrics and shows the increased reliability of the system for authentication purpose.Abstract:
Authentication systems have laid the foundation for validating and securing user's identity. Due to increasing vulnerabilities, the traditional methods like passwords, PINs, tokens etc. cannot keep up with the challenges. The behavioural biometrics like Keystroke dynamics is used to authenticate a legitimate user through typing patterns. In this paper, we propose a machine learning approach to develop an authentication system that provides more robust user identity information using keystroke dynamics biometrics. One-v/s-all classification is applied to 51 users of CMU dataset. For optimization, the SVM classifier is used along with Grid Search for parameter tuning. Grid Search satisfies the goal of choosing the best kernel parameter pair. Experimental evaluation in a heterogeneous environment yields a false acceptance rate (FAR) of 0.2% and a false rejection rate (FRR) of 10.24%. The graphical representation of the result is expressed through ROC (Receiver Operating Characteristic) curve which shows the increased reliability of the system for authentication purpose.read more
Citations
More filters
Handbook Of Biometrics
TL;DR: The handbook of biometrics is universally compatible with any devices to read, and will help you to get the most less latency time to download any of the authors' books like this one.
Patent
Personal identification apparatus
아끼오 나가사까,다까후미 미야따께,나오또 미우라 +2 more
TL;DR: An object of the present invention, but relates to personal identification in environments where non-contact is required, use of which is not clear position shift finger vein pattern image, to realize personal identification with high accuracy.
Journal ArticleDOI
A Systematic Literature Review on Latest Keystroke Dynamics Based Models
Soumen Kumar Roy,Jitesh Pradhan,Abhinav Kumar,Dibya Ranjan Das Adhikary,Utpal Roy,Devadatta Sinha,R. K. Pal +6 more
TL;DR: Six unique KD-based designs are identified and the status of findings toward an effective solution in authentication, identification, and prediction are presented and some indications for a deeper understanding of the issues and further study are provided.
Journal ArticleDOI
A Systematic Literature Review on Latest Keystroke Dynamics Based Models
TL;DR: A comprehensive evaluation and analysis of the most recent studies on the implications of keystroke dynamics (KD) patterns in user authentication, identification, and the determination of useful information is presented in this paper .
Proceedings ArticleDOI
Design of Online English Education Implementation Path Analysis System based on SVM+LDA
TL;DR: Wang et al. as discussed by the authors proposed a conceptual model of online English education users' continuous use behavior based on the theoretical basis of SVM and LDA, and designed a path analysis system.
References
More filters
Journal ArticleDOI
User authentication through keystroke dynamics
TL;DR: This paper presents an original measure for keystroke dynamics that limits the instability of this biometric feature, and has tested this approach on 154 individuals.
Journal ArticleDOI
Computer-access security systems using keystroke dynamics
S. Bleha,C. Slivinsky,B. Hussien +2 more
TL;DR: By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested.
Handbook Of Biometrics
TL;DR: The handbook of biometrics is universally compatible with any devices to read, and will help you to get the most less latency time to download any of the authors' books like this one.
Patent
Method and apparatus for verifying an individual's identity
Young James R,Hammon Robert W +1 more
TL;DR: In this paper, the identity of an individual based on keystroke dynamics was verified using a keystroke generator and a timing encoder coupled to the keyboard for timing periods between keystrokes.