期刊文献+

基于鼠标和键盘行为特征组合的用户身份认证 被引量:2

USER IDENTITY AUTHENTICATION BASED ON MOUSE AND KEYBOARD BEHAVIOURAL BIOMETRICS COMBINATION
下载PDF
导出
摘要 为解决单一行为特征存在的不足和提高认证识别率,提出一种基于鼠标和键盘行为特征组合的双指标用户身份认证方法。首先分别提取鼠标和键盘两种指标的行为特征,然后利用支持向量机进行模式识别,实现特征分析和验证,以达到实时监测用户身份、检测非法用户的目的。最后通过多个用户采集鼠标和键盘行为数据进行身份识别与认证实验。结果表明,相对于单一行为特征,该方法提高了用户身份认证的识别率,降低了误识率和拒识率,而且结果优于BP和SOM方法,充分展示了双指标身份认证的高可靠性。 In order to solve the drawback of single behavioural biometrics and to improve the recognition rate of authentication,we put forward a dual-indicator user identity authentication method which is based on the combination of mouse and keyboard behavioural biometrics.First,we extract the behavioural biometrics of two indicators of mouse and keyboard separately,and then use SVM for pattern recognition so as to implement biometrics analysis and verification in order to achieve the goal of timely monitoring users' identities and detecting illegitimate users. Finally,we collect through a group of users the mouse and keyboard behavioural data to carry out the experiment of identity recognition and authentication. Result indicates that compared with single behavioural biometrics,this method increases the recognition rate of user identity authentication and decreases the false accept rate and false reject rate. Besides,the result is better than the BP and SOM methods,which fully shows the high reliability of dual-indicator identity authentication.
出处 《计算机应用与软件》 CSCD 2016年第7期308-312,共5页 Computer Applications and Software
基金 陕西省教育厅科研计划项目(12JK1055)
关键词 行为特征 身份认证 支持向量机 击键特征 鼠标行为 Behavioural biometrics Identity authentication SVM Keystroke features Mouse actions
  • 相关文献

参考文献5

二级参考文献59

  • 1WOOD J D.生物认证[M].陈菊明,邓启威,等译.北京:清华大学出版社,2004.
  • 2ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: Issues and challenges[ C]// Proceedings of IEEE Conference on Multimedia Information Retrieval. [ S. l. ]: IEEE Press, 2004:948 - 960.
  • 3SUTCU Y, QIMING L, MEMON N. Protecting biometric templates with sketch: Theory and practice[ J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3) : 503 - 512.
  • 4KACHOLIA V, PANDIT S. Biometric authentication using random distributions[ C/OL]. [ 2009 - 01 -01 ]. http://shashankpandit. com/papers/bioart/paper. pdf.
  • 5谭文,杨潇,邵坚磊,等.Windows内核安全编程[M].北京:电子工业出版社,2009.
  • 6O'GORMAN L.Comparing passwords,tokens,and biometrics for user authentication[J].Proceedings of the IEEE,2003,91(12):2021-2040.
  • 7WAYMAN J,JAIN A,MALTONI D.Biometric Systems,Technology,Design and Performance Evaluation[M].Springer Publishing Company,2005.
  • 8OBAIDAT M S,SADOUN B.Verification of computer users using keystroke dynamics[J].IEEE Transaction on System,Man,Cybernetics,1997,27(2):261-269.
  • 9PUSARA M,BRODLEY C E.User re-authentication via mouse movements[A].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,DMSEC Session[C].Washington DC,USA,2004.1-8.
  • 10GAMBOA H,FRED A.A behavioral biometric system based on human computer interaction[J].Proceedings of SPIE,2004,54:4-36.

共引文献29

同被引文献12

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部