2008
DOI: 10.1155/2008/345047
|View full text |Cite
|
Sign up to set email alerts
|

Design and Evaluation of a Pressure-Based Typing Biometric Authentication System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…All results were calculated online. The results showed FRR of 3.04 and FAR of 3.75 (Eltahir et al 2008).…”
Section: Combined Latency and Ar Classifiersmentioning
confidence: 94%
See 1 more Smart Citation
“…All results were calculated online. The results showed FRR of 3.04 and FAR of 3.75 (Eltahir et al 2008).…”
Section: Combined Latency and Ar Classifiersmentioning
confidence: 94%
“…The hardware layout of the system is unique. It consists of a desktop computer equipped with a data acquisition card, and a specially designed alphanumeric keyboard embedded with pressure sensors (Eltahir et al, 2003). As illustrated in Figure 3, the main hardware components of PBAS are as follows: 1.…”
Section: Pressure Based Typing Biometric Authentication System 21 Symentioning
confidence: 99%
“…keystroke duration, latency between consecutive keystrokes or the force exerted on the keys. Some prior work has been done on the use of keystroke biometrics as a password hardening technique [8][9][10][11]. In addition to the duration between each pair of keystrokes, Obaidat and Sadoun [12] investigated the use of the holding time for each key pressed.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Research in the most immediate past ( Changshui and Yanhua, 2000 ; Cho et al, 2000 ; Haider et al, 2000 ; Monrose and Rubin, 2000 ; Wong et al, 2001 ; Bergadano et al, 2002 ; D’Souza, 2002 ; Henderson et al, 2002 ; Mantyjarvi et al, 2002 ; Eltahir et al, 2003 , 2004 , 2008 ; Jansen, 2003 ; Nonaka and Kurihara, 2004 ; Peacock et al, 2004 ; Araújo et al, 2005 ; Chang, 2005 ; Lee and Cho, 2005 ; Rodrigues et al, 2005 ; Curtin et al, 2006 ; Hosseinzadeh et al, 2006 ; Lv and Wang, 2006 ; Clarke and Furnell, 2007 ; Hocquet et al, 2007 ; Loy et al, 2007 ; Grabham and White, 2008 ; Lv et al, 2008 ; Saevanee and Bhatarakosol, 2008 , 2009 ; Campisi et al, 2009 ; Hwang et al, 2009a , b ; Killourhy and Maxion, 2009 ; Revett, 2009 ; Nguyen et al, 2010 ; Chang et al, 2011 , 2012 ; Giot et al, 2011 ; Karnan et al, 2011 ; Teh et al, 2011 ; Xi et al, 2011 ) has incorporated newly developed mathematical and data recording techniques – again employing statistical techniques and neural networks, but also attempting to fuse data from multiple parallel sensors. The types and differences between the various mathematical techniques are discussed in the next section.…”
Section: Overview: Authenticationmentioning
confidence: 99%
“…Other than new analysis techniques, novel types of data were also considered and analyzed. For example, existing keyboards were modified to generate a measure of the pressure with which a user presses a single key ( Henderson et al, 2002 ; Eltahir et al, 2003 , 2004 ; Nonaka and Kurihara, 2004 ; Lv and Wang, 2006 ; Hocquet et al, 2007 ; Loy et al, 2007 ) – the aim of which was, again, to increase the veracity of user analyzed identity. Such pressure measurements proved useful in building a more accurate template of users’ unique keystroke patterns.…”
Section: Overview: Authenticationmentioning
confidence: 99%