2008
DOI: 10.1186/1687-417x-2008-345047
|View full text |Cite
|
Sign up to set email alerts
|

Design and Evaluation of a Pressure-Based Typing Biometric Authentication System

Abstract: Keystroke authentication systems available in the market are mostly software-based. This is due to the ease of use as well as the low cost of the mechanism. Any new keystroke www.intechopen.com Design and Evaluation of a Pressure Based Typing Biometric Authentication System 237 authentication system has to consider these factors in the design. Likewise, the system designed for PBAS uses simplified hardware which minimizes the cost of production. The system is designed to be compatible with any type of PC. More… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Research in the most immediate past (Changshui and Yanhua, 2000; Cho et al, 2000; Haider et al, 2000; Monrose and Rubin, 2000; Wong et al, 2001; Bergadano et al, 2002; D’Souza, 2002; Henderson et al, 2002; Mantyjarvi et al, 2002; Eltahir et al, 2003, 2004, 2008; Jansen, 2003; Nonaka and Kurihara, 2004; Peacock et al, 2004; Araújo et al, 2005; Chang, 2005; Lee and Cho, 2005; Rodrigues et al, 2005; Curtin et al, 2006; Hosseinzadeh et al, 2006; Lv and Wang, 2006; Clarke and Furnell, 2007; Hocquet et al, 2007; Loy et al, 2007; Grabham and White, 2008; Lv et al, 2008; Saevanee and Bhatarakosol, 2008, 2009; Campisi et al, 2009; Hwang et al, 2009a,b; Killourhy and Maxion, 2009; Revett, 2009; Nguyen et al, 2010; Chang et al, 2011, 2012; Giot et al, 2011; Karnan et al, 2011; Teh et al, 2011; Xi et al, 2011) has incorporated newly developed mathematical and data recording techniques – again employing statistical techniques and neural networks, but also attempting to fuse data from multiple parallel sensors. The types and differences between the various mathematical techniques are discussed in the next section.…”
Section: Overview: Authenticationmentioning
confidence: 99%
“…Research in the most immediate past (Changshui and Yanhua, 2000; Cho et al, 2000; Haider et al, 2000; Monrose and Rubin, 2000; Wong et al, 2001; Bergadano et al, 2002; D’Souza, 2002; Henderson et al, 2002; Mantyjarvi et al, 2002; Eltahir et al, 2003, 2004, 2008; Jansen, 2003; Nonaka and Kurihara, 2004; Peacock et al, 2004; Araújo et al, 2005; Chang, 2005; Lee and Cho, 2005; Rodrigues et al, 2005; Curtin et al, 2006; Hosseinzadeh et al, 2006; Lv and Wang, 2006; Clarke and Furnell, 2007; Hocquet et al, 2007; Loy et al, 2007; Grabham and White, 2008; Lv et al, 2008; Saevanee and Bhatarakosol, 2008, 2009; Campisi et al, 2009; Hwang et al, 2009a,b; Killourhy and Maxion, 2009; Revett, 2009; Nguyen et al, 2010; Chang et al, 2011, 2012; Giot et al, 2011; Karnan et al, 2011; Teh et al, 2011; Xi et al, 2011) has incorporated newly developed mathematical and data recording techniques – again employing statistical techniques and neural networks, but also attempting to fuse data from multiple parallel sensors. The types and differences between the various mathematical techniques are discussed in the next section.…”
Section: Overview: Authenticationmentioning
confidence: 99%
“…(7) The signal period, the signal frequency and the number of samples necessary to represent a single cycle are approximated by using Equations (10), (11) and (13), where the amount of time that needs to be displayed is the period of the signal; i.e., t w " T. (8) In this step, a simulation of the scan backlog effect is considered. The scan backlog indicates how much data remain in the buffer after each retrieval, providing a measure of how well the application is maintaining the throughput rate [20,23]; i.e., a Data Acquisition Card (DAQ) does not retrieve the data at the same rate as the sampling frequency f s . The retrieval speed refers to how fast the computer is taking samples from the buffer toward a specific application.…”
Section: Automatic Fourier Spectrum Detection Using Autocorrelationmentioning
confidence: 99%
“…The pattern of pulses [6] produced by SPWM gating signals is not random or small, but we use a simulation to show that the autocorrelation function can be employed to identify the fundamental frequency of an SPWM signal despite the magnitude of the pattern of pulses under conditions with scan backlog [20,21] and acquisition noise [22].…”
Section: Introductionmentioning
confidence: 99%
“…However, some studies have been done by using other kinds of sensors in order to capture additional information and improve the recognition. Some works (Eltahir et al, 2008;Grabham & White, 2008) have tested the possibility of using a pressure sensor inside each key of the keyboard. In this case, we can exploit an extra information in order to discriminate more easily the users: the pressure force exerced on the key.…”
Section: Mandatory Hardware and Variabilitymentioning
confidence: 99%