TY - GEN
T1 - Touchpad input for continuous biometric authentication
AU - Chan, Alexander
AU - Halevi, Tzipora
AU - Memon, Nasir
PY - 2014
Y1 - 2014
N2 - Authentication is a process which is used for access control in computer security. However, common existing methods of authentication, which are based on authentication during the login stage, are insecure due to the lack of authentication after the initial instance. Ideally, authentication should be continuous and should not interfere with a user's normal behavior as to not create an inconvenience for the user. Behaviometric identification, for example, verifies a user's identity based on his behavior, both continuously and without interruption. This work shows that it is possible, with great accuracy, to identify different users based on their touchpad behaviors. While linear classifiers proved ineffective at classifying touchpad behavior, kernel density estimation and decision tree classification each proved capable of classifying data sets with over 90% accuracy.
AB - Authentication is a process which is used for access control in computer security. However, common existing methods of authentication, which are based on authentication during the login stage, are insecure due to the lack of authentication after the initial instance. Ideally, authentication should be continuous and should not interfere with a user's normal behavior as to not create an inconvenience for the user. Behaviometric identification, for example, verifies a user's identity based on his behavior, both continuously and without interruption. This work shows that it is possible, with great accuracy, to identify different users based on their touchpad behaviors. While linear classifiers proved ineffective at classifying touchpad behavior, kernel density estimation and decision tree classification each proved capable of classifying data sets with over 90% accuracy.
KW - behaviometrics
KW - behavior
KW - biometrics
KW - touchpad
UR - http://www.scopus.com/inward/record.url?scp=84907322127&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84907322127&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-44885-4_7
DO - 10.1007/978-3-662-44885-4_7
M3 - Conference contribution
AN - SCOPUS:84907322127
SN - 9783662448847
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 86
EP - 91
BT - Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings
PB - Springer Verlag
T2 - 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014
Y2 - 25 September 2014 through 26 September 2014
ER -