Simulation of a Characteristics Identification Algorithm

Article Preview

Abstract:

Keystroke rhythm identification, which extracts biometric characteristics through keyboards without additional expensive devices, is a kind of biometric identification technology. The paper proposes a dynamic identity authentication model based on the improved keystroke rhythm algorithm in Rick Joyce model and implement this model in a mobile phone system. The experimental results show that comparing with the original model, the false alarm rate of the improved model decreases a lot in the mobile phone system, and its growth of imposter pass rate is slower than the Rick Joyce models. The improved model is more suitable for small memory systems, and it has better performance in security and dynamic adaptation. This improved model has good application value.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 945-949)

Pages:

2306-2309

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Bleha, C. Slivinsky, B. Hussien. Computer-Access Security Systems Using Keystroke Dynamics. IEEE Transactions On Pattern Analysis and Machine Intelligence. Vol 12, No. 12, December (2005).

DOI: 10.1109/34.62613

Google Scholar

[2] F. Monrose, A.D. Rubin. Keystroke Dynamics as a Biometric for Authentication. Future generation Computing Systems( FGCS), Journal: Security on The Web(Special issue), March (2007).

DOI: 10.1016/s0167-739x(99)00059-x

Google Scholar

[3] R. Joyce, G. Gupta. Identity Authentication Based on Keystroke Latencies, Communications of the ACM, February (1990).

DOI: 10.1145/75577.75582

Google Scholar

[4] F. Bergadano,D. Gunetti, C. Picardi Universityof Torino. User Authentication Through Keystroke Dynamics, ACM Transactions on Information and System Security, Vol. 5, No. 4, November (2002).

DOI: 10.1145/581271.581272

Google Scholar

[5] W. G. de Ru, J. Eloff. Enhanced Password Authentication Through Fuzzy Logic, IEEE Expert, Vol. 12, No. 6, Nov/Dec (2007).

DOI: 10.1109/64.642960

Google Scholar

[6] J. SleggettJ, G. Williams , J. Usnick. Dynamic Identity Verification via Keystroke Characteristics, International journal of Man-machine Studies, (2001).

DOI: 10.1016/s0020-7373(05)80165-8

Google Scholar

[7] F. Monrose, M. K. Reiter,S. Wetzel. Password Hardening Based on Keystroke Dynamic, Proceedings of the 6-th ACM Conference on Computer and Communication Security, (1999).

DOI: 10.1145/319709.319720

Google Scholar