2018
DOI: 10.4236/jmp.2018.92008
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamics Based Authentication Using Possibilistic Renyi Entropy Features and Composite Fuzzy Classifier

Abstract: This paper presents the formulation of the possibilistic Renyi entropy function from the Renyi entropy function using the framework of Hanman-Anirban entropy function. The new entropy function is used to derive the information set features from keystroke dynamics for the authentication of users. A new composite fuzzy classifier is also proposed based on Mamta-Hanman entropy function and applied on the Information Set based features. A comparison of the results of the proposed approach with those of Support Vec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 20 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…This classifier employs several rules based on the training samples. A study [303] shows that the composite fuzzy classifier outperforms SVM and RF. Similarly, a study [304] compared fuzzy classifier with other previously proposed four ap-proaches and found that the classifier is more impressive than others.…”
Section: ) Binary Classificationsmentioning
confidence: 99%
“…This classifier employs several rules based on the training samples. A study [303] shows that the composite fuzzy classifier outperforms SVM and RF. Similarly, a study [304] compared fuzzy classifier with other previously proposed four ap-proaches and found that the classifier is more impressive than others.…”
Section: ) Binary Classificationsmentioning
confidence: 99%
“…At the beginning of the KDA-related studies, researchers focused on applying KD to fixedlength and fixed-content data such as usernames and passwords [43]. Classifiers such as nearest neighbor classifiers [27], statistical classifiers [43,53], neural network classifiers [3], ranking-based classifiers [17], and fuzzy-based classifiers [11] were used to verify users. Recently, many researchers have turned focus on long text verification [49,55].…”
Section: Introductionmentioning
confidence: 99%