CFP last date
20 May 2024
Reseach Article

A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics

Published on May 2013 by Monika Bhatnagar, Raina K. Jain, Nilam S. Khairnar
International Conference on Recent Trends in Engineering and Technology 2013
Foundation of Computer Science USA
ICRTET - Number 5
May 2013
Authors: Monika Bhatnagar, Raina K. Jain, Nilam S. Khairnar
5af04850-193c-440a-b397-96980f48c396

Monika Bhatnagar, Raina K. Jain, Nilam S. Khairnar . A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics. International Conference on Recent Trends in Engineering and Technology 2013. ICRTET, 5 (May 2013), 22-25.

@article{
author = { Monika Bhatnagar, Raina K. Jain, Nilam S. Khairnar },
title = { A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics },
journal = { International Conference on Recent Trends in Engineering and Technology 2013 },
issue_date = { May 2013 },
volume = { ICRTET },
number = { 5 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 22-25 },
numpages = 4,
url = { /proceedings/icrtet/number5/11794-1359/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Engineering and Technology 2013
%A Monika Bhatnagar
%A Raina K. Jain
%A Nilam S. Khairnar
%T A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics
%J International Conference on Recent Trends in Engineering and Technology 2013
%@ 0975-8887
%V ICRTET
%N 5
%P 22-25
%D 2013
%I International Journal of Computer Applications
Abstract

With hundreds of people using computers and mobile devices all over the globe, these devices have an established position in modern society. Nevertheless, most of these devices use weak authentication techniques with passwords and PINs which can be easily hacked. Thus, stronger identification is needed to ensure data security and privacy. In this paper, we give a survey on two of behavioral biometric techniques to computer. We also propose an authentication scheme for desktop that uses characteristics of interaction of user with the input devices viz. keyboard and mouse.

References
  1. Clint Feher a,*, Yuval Elovici a, Robert Moskovitch a, Lior Rokach b,1, Alon Schclar c User identity verification via mouse dynamics.
  2. Roman V. Yampolskiy*, Venu Govindaraju* Behavioral biometrics: a survey and classification.
  3. Enzhe Yu, Sungzoon Cho Keystroke dynamics identity verificationdits problems and practical solutions.
  4. Hafiz Zahid Ullah Khan "Comparative study of authentication techniques" International Journal of Video & Image Processing and Network Security IJVIP0opl;NS Vol: 10 No: 04 9
  5. Sushil Chauhana, A. S. Arorab, Amit Kaula " A survey of emerging biometric modalities", Procedia Computer Science2(2010)213–218,ICEBT 2010.
  6. Ahmed Awad E. Ahmed, Issa Traore"Mouse Dynamics biometric Technology", DOI:10. 4018/978-1-60566-725-6. ch010
  7. Chien Le, "A Survey of Biometrics Security Systems"
Index Terms

Computer Science
Information Sciences

Keywords

Biometric Authentication Classification Data Mining