The biometric authentication checks a user based on its unique characteristics – who you are. Behavioral biometrics has proven very useful in authentication a user. The mouse dynamics has a unique pattern for movements. The paper present the benefits of the user verification system based on mouse dynamics, a method very accurate and efficient enough for future usage. The idea proposed in this article represents a method which has been developed for POSDRU 61434: Modern Education and Quality for Future, a project founded by European Union.
1] A. A. E. Ahmed and I. Traore. Anomaly intrusion detection based on biometrics. In Proceedings of the 2005 IEEE Workshop on Information Assurance, 2005.
[2] J. L. Alba Castro, E. Gonzalez Agulla, E. Argones Rua,and L. Anido Rifon. “ Realistic measurement of student attendance in LMS using biometrics”. In To appear on the Proceedings of the International Symposium on Engineering Education and
Educational Technologies: EEET 2009, 2009.
[3] L. Hong, A. K. Jain, and S. Pankanti, “Can Multibiometrics Improve Performance?”, Proc. AutoID '99, pp.59-64, October 2005.
[4] I.Sogukpinar, L. Yalçin, “User identification via keystroke dynamics”,Ist. Üniv. Journal of Electrical and Electronic Engineering, vol. 4, no. 1,2004, pp. 995-1005,2007.
[5] D. Gonzalez-Jimenez and J. Alba-Castro. “Shape-Driven Gabor Jets for Face Description and Authentication”. IEEE Transactions on Information Forensics and Security,2(4):769–780, 2007.
[6] S. Sanderson and J. Erbetta, “Authentication for secure environments based on iris scanning technology”, in IEEE Colloquium on Visual Biometrics, vol. 8, pp.1-7, 2005.
[7] Bharati, S.; Haseem, R.; Khan, R.; Ritzmann, M.;Wong, A. “Biometric Authentication System using the Dichotomy Model”, Proc. CSIS Research Day, Pace Univ., May 2008.
[8] Chinese Academy of Sciences – Institute of Automation. Database of 756 Grayscale Face Images. Available: http://www.sinobiometrics.com, Version 1.0,2003.
[8] S. Chiasson, P. C. V. Oorschot, and R. Biddle. Graphical password authentication using cued click-points. In 12th European Symposium On Research In Computer Security (ESORICS), 2007. Springer-Verlag, 2007.
[9] S. Chiasson, P. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In USENIX Security Symposium, 2006.
[10] DTREG. SVM - Support Vector Machines. http://www.dtreg.com/svm.htm, Feb 2011.
[11] D. Florencio and C. Herley. A large scale study of web password habits. In Proceedings of WWW 2007, 2007.
[12] H. Gamboa and A. Fred. A behavioral biometric system based on human-computer interaction. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 5404, pages 381–392, Aug. 2004.
[13] P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha. Efficient fingerprint-based user authentication for embedded systems. In Proceedings of the 42nd annual Design Automation Conference (DAC), pages 244–247, 2005.
[14] T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proc. of European Conference on Machine Learning, pages 137–142, 1998.
[15] Z. Jorgensen and T. Yu. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11, pages 476–482, 2011.
[16] K. Killourhy and R. Maxion. Why did my detector do that?!: predicting keystroke-dynamics error rates. In Proceedings of RAID’10, pages 256–276, 2010.
Copyright: © 2013 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode