International Journal of Academic Research in Business and Social Sciences

search-icon

Proposing a Biometric Verification Method for Students Attendance using Mouse Movements

Open access
The biometric authentication checks a user based on its unique characteristics – who you are. Behavioral biometrics has proven very useful in authentication a user. The mouse dynamics has a unique pattern for movements. The paper present the benefits of the user verification system based on mouse dynamics, a method very accurate and efficient enough for future usage. The idea proposed in this article represents a method which has been developed for POSDRU 61434: Modern Education and Quality for Future, a project founded by European Union.
1] A. A. E. Ahmed and I. Traore. Anomaly intrusion detection based on biometrics. In Proceedings of the 2005 IEEE Workshop on Information Assurance, 2005.
[2] J. L. Alba Castro, E. Gonzalez Agulla, E. Argones Rua,and L. Anido Rifon. “ Realistic measurement of student attendance in LMS using biometrics”. In To appear on the Proceedings of the International Symposium on Engineering Education and
Educational Technologies: EEET 2009, 2009.
[3] L. Hong, A. K. Jain, and S. Pankanti, “Can Multibiometrics Improve Performance?”, Proc. AutoID '99, pp.59-64, October 2005.
[4] I.Sogukpinar, L. Yalçin, “User identification via keystroke dynamics”,Ist. Üniv. Journal of Electrical and Electronic Engineering, vol. 4, no. 1,2004, pp. 995-1005,2007.
[5] D. Gonzalez-Jimenez and J. Alba-Castro. “Shape-Driven Gabor Jets for Face Description and Authentication”. IEEE Transactions on Information Forensics and Security,2(4):769–780, 2007.
[6] S. Sanderson and J. Erbetta, “Authentication for secure environments based on iris scanning technology”, in IEEE Colloquium on Visual Biometrics, vol. 8, pp.1-7, 2005.
[7] Bharati, S.; Haseem, R.; Khan, R.; Ritzmann, M.;Wong, A. “Biometric Authentication System using the Dichotomy Model”, Proc. CSIS Research Day, Pace Univ., May 2008.
[8] Chinese Academy of Sciences – Institute of Automation. Database of 756 Grayscale Face Images. Available: http://www.sinobiometrics.com, Version 1.0,2003.
[8] S. Chiasson, P. C. V. Oorschot, and R. Biddle. Graphical password authentication using cued click-points. In 12th European Symposium On Research In Computer Security (ESORICS), 2007. Springer-Verlag, 2007.
[9] S. Chiasson, P. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In USENIX Security Symposium, 2006.
[10] DTREG. SVM - Support Vector Machines. http://www.dtreg.com/svm.htm, Feb 2011.
[11] D. Florencio and C. Herley. A large scale study of web password habits. In Proceedings of WWW 2007, 2007.
[12] H. Gamboa and A. Fred. A behavioral biometric system based on human-computer interaction. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 5404, pages 381–392, Aug. 2004.
[13] P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha. Efficient fingerprint-based user authentication for embedded systems. In Proceedings of the 42nd annual Design Automation Conference (DAC), pages 244–247, 2005.
[14] T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proc. of European Conference on Machine Learning, pages 137–142, 1998.
[15] Z. Jorgensen and T. Yu. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11, pages 476–482, 2011.
[16] K. Killourhy and R. Maxion. Why did my detector do that?!: predicting keystroke-dynamics error rates. In Proceedings of RAID’10, pages 256–276, 2010.