CFP last date
20 May 2024
Reseach Article

Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse

by Saurabh Singh, K.V.Arya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 1
Year of Publication: 2011
Authors: Saurabh Singh, K.V.Arya
10.5120/2181-2752

Saurabh Singh, K.V.Arya . Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse. International Journal of Computer Applications. 17, 1 ( March 2011), 45-48. DOI=10.5120/2181-2752

@article{ 10.5120/2181-2752,
author = { Saurabh Singh, K.V.Arya },
title = { Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 1 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 45-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number1/2181-2752/ },
doi = { 10.5120/2181-2752 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:32.935619+05:30
%A Saurabh Singh
%A K.V.Arya
%T Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 1
%P 45-48
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Behavioral biometric based systems as a solution of authentication challenge are appealing because of various reasons – unlike other password based or physiological property based systems, there is no chance of acquiring behavioral properties by someone else. In the proposed work, mouse interaction dynamics has been exploited for user authentication purpose. User’s behavior on mouse is unique and can be taken as biometric property. A graphical panel has been designed for acquiring user pattern and a grouping approach has been applied to reduce the size of the pattern. Results are very encouraging and indicate that the designed graphical panel can effectively classify the legitimate users and imposters.

References
  1. Anil K. Jain, Arun Ross and Salil Prabhakar2, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.
  2. Lawrence O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of the IEEE, Vol.91, No. 12, Dec, pp. 2019-2040, 2003.
  3. P. Reid, “Biometrics for Network Security”, Prentice Hall, Upper Saddle River, NJ, 2004.
  4. D. Polemi, Biometric techniques: review and evaluation of biometric techniques for identification and authentication — final report, and editors. Institute of Communication and Computer systems, National Technical University of Athens, 1995.
  5. M. Pusara and C. E. Brodley, User re-authentication via mouse movements, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM Press, Washington DC, USA, 2004, pp. 1--8.
  6. A. Weiss, A. Ramapanicker, P. Shah, S. Noble, and L. Immohr. ”Mouse movements biometric identification : A feasibility study”. In Proc. Student/Faculty Research Day, CSIS, Pace University, pages 1-8, May 2007.
  7. A. A. E. Ahmed and I. Traore, “Detecting computer intrusions using behavioral biometrics. Privacy, Security and Trust”, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Mouse Interaction biometric physiological