Harun et al., 2010 - Google Patents
Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN)Harun et al., 2010
View PDF- Document ID
- 7169575566943517816
- Author
- Harun N
- Dlay S
- Woo W
- Publication year
- Publication venue
- 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010)
External Links
Snippet
The use of computer has increased rapidly as well as the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require a password authentication scheme to make sure only the genuine individual can …
- 230000001537 neural 0 title abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | Biometric recognition based on free-text keystroke dynamics | |
Karnan et al. | Biometric personal authentication using keystroke dynamics: A review | |
Banerjee et al. | Biometric authentication and identification using keystroke dynamics: A survey | |
Revett et al. | A machine learning approach to keystroke dynamics based user authentication | |
Iranmanesh et al. | Online handwritten signature verification using neural network classifier based on principal component analysis | |
Li et al. | Free-text keystroke dynamics for user authentication | |
Damousis et al. | Four machine learning algorithms for biometrics fusion: A comparative study | |
Harun et al. | Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method | |
Teh et al. | Keystroke dynamics in password authentication enhancement | |
CN109447099A (en) | A kind of Combining Multiple Classifiers based on PCA dimensionality reduction | |
Obaidat | A verification methodology for computer systems users | |
Deng et al. | Keystroke dynamics user authentication using advanced machine learning methods | |
AL-Ghamdi et al. | Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions. | |
Baynath et al. | Keystroke recognition using neural network | |
Harun et al. | Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN) | |
Wankhede et al. | Keystroke dynamics authentication system using neural network | |
Pavaday et al. | Investigating performance of neural networks in authentication using keystroke dynamics | |
Sulavko et al. | Perspective neural network algorithms for dynamic biometric pattern recognition in the space of interdependent features | |
Baynath et al. | Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics. | |
Iryna et al. | Corporate system users identification by the keyboard handwriting based on neural networks | |
Cho | Pattern classification methods for keystroke analysis | |
Ravindran et al. | Keystroke user recognition through extreme learning machine and evolving cluster method | |
Gavrilova et al. | Dealing with biometric multi-dimensionality through chaotic neural network methodology | |
Kusakci | Authorship attribution using committee machines with k-nearest neighbors rated voting | |
Obaidat et al. | Advances in key stroke dynamics-based security schemes |