512 Hits in 5.4 sec

An Initial Framework of Fuzzy Neural Network Approach for Online Learner Verification Process

Siti Fairuz Nurr Sadikan, Universiti Tun Hussein Onn Malaysia, 86400 Batu Pahat, Johor Darul Takzim, Malaysia,
2019 International Journal of Advanced Trends in Computer Science and Engineering  
This proposed solution utilizes the keystroke analysis and activity-based authentication for the online learner authentication.  ...  A fuzzy neural network is used to train and validate the online learner's identity. The proposed framework can be implementing in any online learning environment for verifying online learner identity.  ...  Previous research has shown that the fuzzy neural network can be used for continuous authentication. Therefore, fuzzy neural network approach is used in verifying online learner identity.  ... 
doi:10.30534/ijatcse/2019/3781.32019 fatcat:rss3vm5iyvdlxaa5p655bei63u

A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges [article]

D. Shanmugapriya, G. Padmavathi
2009 arXiv   pre-print
Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification.  ...  Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard.  ...  There are two main keystroke analysis approaches for the purposes of identity verification. They are statistical techniques and neural networks techniques.  ... 
arXiv:0910.0817v1 fatcat:l4gygisx55gbrjpqsnue3uj3xe

Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones

Dina EL, Hoda M., Osman Hegazy
2012 International Journal of Advanced Computer Science and Applications  
In addition, the possibility of using keystroke and mouse dynamics for computer authentication is being checked.  ...  With hundreds of millions using computers and mobile devices all over the globe, these devices have an established position in modern society.  ...  Also, we gratefully appreciate Romain Giot, Mohamad El-Abed and Christophe Rosenberger for making their GREYCKeystroke software publicly available to help researchers to create keystroke  ... 
doi:10.14569/ijacsa.2012.031017 fatcat:rauczqen5jhcfo5cklwtonnuu4

Keystroke dynamics in the pre-touchscreen era

Nasir Ahmad, Andrea Szymkowiak, Paul A. Campbell
2013 Frontiers in Human Neuroscience  
Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification.  ...  Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards.  ...  More recently, Cho et al. (2000) developed a web-based neural network identity verification system and were able to attain very low error rates (average FRR error of 1% when FAR was 0%) using a multi-layer  ... 
doi:10.3389/fnhum.2013.00835 pmid:24391568 pmcid:PMC3867681 fatcat:vh5cpunklfh2pomuvig7fqzgn4

Typing patterns: a key to user identification

A. Peacock, Xian Ke, M. Wilkerson
2004 IEEE Security and Privacy  
Lin, "Computer-Access Authentication with Neural Network-Based Keystroke Identity Verification," Int'l Conf. Neural Networks, IEEE CS Press, vol. 1, 1997, pp. 174-178. W. de Ru and J.  ...  Cho, "GA-SVM Wrapper Approach for Feature Subset Selection in Keystroke Dynamics Identity Verification," Proc. Int'l Joint Conf. Neural Networks, IEEE CS Press, vol. 3, 2003, pp.  ... 
doi:10.1109/msp.2004.89 fatcat:3s2g6ccicbav5mqeftjo35vlx4

Applications of keystroke analysis for improved login security and continuous user authentication [chapter]

Steven M. Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel
1996 IFIP Advances in Information and Communication Technology  
This paper examines the use of keystroke analysis as a means of improving authentication in modem information systems, based upon the biometric measurement of user typing characteristics.  ...  The static verifier uses a neural network approach, whilst the dynamic. verifier involves statistical analysis methods.  ...  DYNAMIC KEYSTROKE ANALYSIS The other study concerned a dynamic verification approach, with analysis being based upon statistical methods rather than neural networks.  ... 
doi:10.1007/978-1-5041-2919-0_25 fatcat:fzkwbppdwnffthajuncjyisj6e

Strengthening user Authentication using Keystroke Dynamics

Akshat Shah, Parth Shah, Hitarth Shah, Chetashri Bhadane
2015 International Journal of Engineering Research and  
In this paper, we discuss different approaches and methodologies to authenticate users based on their interactions with a mobile phone keypad, comprising a number of investigators into the ability of neural  ...  networks.  ...  Biometric authentication is a technique that authenticates a user and identifies its identity based on the physiological or behavioral characteristics of a user.  ... 
doi:10.17577/ijertv4is110437 fatcat:erpadluxrbdajneegembo6yufq

Keystroke Dynamics User Authentication Using Advanced Machine Learning Methods [chapter]

Yunbin Deng, Yu Zhong
2015 Gate to Computer Science and Research  
In this chapter, we adopt three popular voice biometrics algorithms to perform keystroke dynamics based user authentication, namely, 1) Gaussian Mixture Model with Universal Background Model (GMM-UBM),  ...  Finally, we discuss challenges and concerns for practical deployment of keystroke authentication technology.  ...  We introduce three new algorithms into the keystroke authentication domain: Gaussian mixture model with universal background model (GMM-UBM), identity vector (i-vector), and deep neural network (DNN).  ... 
doi:10.15579/gcsr.vol2.ch2 fatcat:p77fysjrl5fvvjfjsrwquuma24

Keystroke dynamics authentication for mobile phones

Emanuele Maiorana, Patrizio Campisi, Noelia González-Carballo, Alessandro Neri
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
The effectiveness of using template selection techniques for keystroke verification is also investigated.  ...  In this paper we discuss the feasibility of employing keystroke dynamics to perform user verification on mobile phones.  ...  The feasibility of applying keystroke dynamics verification to mobile devices has been first analyzed in [16] with a neural networks-based approach, which has been further extended in [17] by analyzing  ... 
doi:10.1145/1982185.1982190 dblp:conf/sac/MaioranaCGN11 fatcat:bh5bvlcycjbhholucu2qgsycxa

A broad review on non-intrusive active user authentication in biometrics

Princy Ann Thomas, K. Preetha Mathew
2021 Journal of Ambient Intelligence and Humanized Computing  
Traditionally, a one-time login based credential verification method was utilized for user authentication.  ...  Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics.  ...  Some of the traditional authentication systems are signature verification, identity card verification (Clarke et al. 2009 ), and photographic evidence for verification.  ... 
doi:10.1007/s12652-021-03301-x pmid:34109006 pmcid:PMC8177270 fatcat:kwfsgeg44nd55ktvsd5vfrreza

Design and Evaluation of a Pressure Based Typing Biometric Authentication System [chapter]

Momoh J. E. Salami, Wasil Eltahir, Hashimah Ali
2011 Biometric Systems, Design and Applications  
Introduction Although a variety of authentication devices to verify a user's identity are in use today for computer access control, passwords have been and probably would remain the preferred method.  ...  If both keystroke template and iris of the user are nearly identical with the classifier models, then the system grants access to the user, otherwise access is denied after three (3) trials.  ...  Biometric authentication has been widely used for access control and security systems over the past few years.  ... 
doi:10.5772/17542 fatcat:6wpeigyezvckxiogau6kkxwk74


Shyam Sankar
2020 International Research Journal of Computer Science  
Biometric traits unique enough to exclusively identify a person are used to construct biometric identification/verification systems that selectively grants access based on the success of the recognition  ...  Apart from smartphone users, biometric authentication systems are also being used in airports, banks, military bases, high security prisons etc.  ...  The network uses DenseNet for feature computation and global fingerprint image features along with local patch based image features.  ... 
doi:10.26562/irjcs.2020.v0709.004 fatcat:be2f2rofonhvbjft7zwgid3q6a


Preetha S ., Suhas Kini K ., Shailesh A Patil .
2019 International Journal of Engineering Applied Sciences and Technology  
The subject apparatus is particularly suited for controlling access to a secure resource such as a computer network or data base.  ...  A measure to incorporate keystroke dynamics in daily authentication systems has not been made. User's identity is analyzed using keystroke through their way of typing on a computer keyboard.  ... 
doi:10.33564/ijeast.2019.v04i03.037 fatcat:mxtzdutob5g65n7pgkjt34fhmy

User authentication using keystroke dynamics for cellular phones

P. Campisi, E. Maiorana, M. Lo Bosco, A. Neri
2009 IET Signal Processing  
A new approach for keystroke-based authentication when using a cellular phone keypad as input device is presented.  ...  The employed statistical classifier is able to perform user verification with an average equal error rate of about 13%.  ...  neural networks.  ... 
doi:10.1049/iet-spr.2008.0171 fatcat:tsmerorvgbbwxh2xlmoysnzz5u

Siamese Networks for Static Keystroke Dynamics Authentication

Romain Giot, Anderson Rocha
2019 2019 IEEE International Workshop on Information Forensics and Security (WIFS)  
Such networks aim at comparing two inputs to compute their similarity: the authentication process consists then at comparing the query to an enrollment sample.  ...  Keystroke dynamics authentication aims at recognizing individuals on their way of typing on a keyboard.  ...  Section II presents previous works related on (a) keystroke dynamics authentication with a focus on static password and neural networks, and (b) siamese networks for biometrics.  ... 
doi:10.1109/wifs47025.2019.9035100 dblp:conf/wifs/GiotR19 fatcat:rz4cfoqnmve2tlzs5ofapsmchq
« Previous Showing results 1 — 15 out of 512 results