[go: up one dir, main page]

Harun et al., 2010 - Google Patents

Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN)

Harun et al., 2010

View PDF
Document ID
7169575566943517816
Author
Harun N
Dlay S
Woo W
Publication year
Publication venue
2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010)

External Links

Snippet

The use of computer has increased rapidly as well as the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require a password authentication scheme to make sure only the genuine individual can …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Ahmed et al. Biometric recognition based on free-text keystroke dynamics
Karnan et al. Biometric personal authentication using keystroke dynamics: A review
Banerjee et al. Biometric authentication and identification using keystroke dynamics: A survey
Revett et al. A machine learning approach to keystroke dynamics based user authentication
Iranmanesh et al. Online handwritten signature verification using neural network classifier based on principal component analysis
Li et al. Free-text keystroke dynamics for user authentication
Damousis et al. Four machine learning algorithms for biometrics fusion: A comparative study
Harun et al. Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method
Teh et al. Keystroke dynamics in password authentication enhancement
CN109447099A (en) A kind of Combining Multiple Classifiers based on PCA dimensionality reduction
Obaidat A verification methodology for computer systems users
Deng et al. Keystroke dynamics user authentication using advanced machine learning methods
AL-Ghamdi et al. Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions.
Baynath et al. Keystroke recognition using neural network
Harun et al. Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN)
Wankhede et al. Keystroke dynamics authentication system using neural network
Pavaday et al. Investigating performance of neural networks in authentication using keystroke dynamics
Sulavko et al. Perspective neural network algorithms for dynamic biometric pattern recognition in the space of interdependent features
Baynath et al. Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics.
Iryna et al. Corporate system users identification by the keyboard handwriting based on neural networks
Cho Pattern classification methods for keystroke analysis
Ravindran et al. Keystroke user recognition through extreme learning machine and evolving cluster method
Gavrilova et al. Dealing with biometric multi-dimensionality through chaotic neural network methodology
Kusakci Authorship attribution using committee machines with k-nearest neighbors rated voting
Obaidat et al. Advances in key stroke dynamics-based security schemes