BIOMETRIC AUTHENTICATION FOR SYSTEMS THROUGH DIGITAL DYNAMICS
Keywords:
Random Forest; Mahalanobis; Dynamic typing; Press and Press; Press and Release; Release and press, Threshold.Abstract
Biometric authentication through typing dynamics offers security for more systems, coupled with the traditional login and password, as it associates authentication with biometric factors. This work presents methodologies for biometric authentication performance from the middle of the typing dynamics, techniques for extracting characteristics after capturing the time in which to press and release as keys. The methods used were: Mahalanobis distance classifier (classification and authentication) and Random Forest (classification).
Downloads
References
ALSULTAN, A.; WARWICK, K. Keystroke dynamics authentication: a survey of free-text methods. International Journal of Computer Science Issues, v. 10, n. 4, p. 1-10, 2013.
ARAÚJO, L. C. F. Uma metodologia para autenticação pessoal baseada em dinâmica da digitação. 2004. Dissertação (Mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação, Campinas, SP. Disponível em: http://www.repositorio.unicamp.br/handle/REPOSIP/259073. Acesso em: 3 ago. 2018.
BREIMAN, L.. Random forests. Machine learning, v. 45, n. 1, p. 5-32, 2001. https://doi.org/10.1023/A:1010933404324.
COSTA, C. R. N. et al. Autenticação Biométrica via Dinâmica da Digitação em Teclados Numéricos. In: SIMPÓSIO BRASILEIRO DE TELECOMUNICAÇÕES–SBrT’05. 22., 2005. Campinas. Anais [...]. Campinas, 2005.
CRUZ, M. A. S.; DUARTE, J. C.; GOLDSCHMIDT, Ronaldo Ribeiro. Keystroke Dynamics Applied to Periodic Authentication in Virtual Learning Environments. Brazilian Journal of Computers in Education, v.25, n.2, p.36-60, 2017. doi:http://dx.doi.org/10.5753/rbie.2017.25.02.36.
LINDEN, R. Técnicas de agrupamento. Revista de Sistemas de Informação da FSMA, v. 4, p. 18-36, 2009.
JOYCE, R.; GUPTA, G. Identity authentication based on keystroke latencies. Communications of the ACM, v. 33, n. 2, p. 168-176, 1990. https://doi.org/10.1145/75577.75582
BLEHA, S. A.; OBAIDAT, M. S. Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Transactions on Systems, Man, and Cybernetics, v. 21, n. 2, p. 452-456, 1991. https://doi.org/10.1109/21.87093
HAN, J.; PEI, J.; KAMBER, M. Data mining: concepts and techniques. Burnaby, Canada: Elsevier, 2011.
HALL, M. et al. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter, v. 11, n. 1, p. 10-18, 2009. https://doi.org/10.1145/1656274.1656278