2017
DOI: 10.4236/jmp.2017.89094
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamics Based Authentication Using Information Sets

Abstract: This paper presents keystroke dynamics based authentication system using the information set concept. Two types of membership functions (MFs) are computed: one based on the timing features of all the samples and another based on the timing features of a single sample. These MFs lead to two types of information components (spatial and temporal) which are concatenated and modified to produce different feature types. Two Component Information Set (TCIS) is proposed for keystroke dynamics based user authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…As a result, the function will build a more complex decision boundary than linear methods. The use of the support vector machine in the problem of user identification by keystroke dynamics is considered in (Bhatia & Hanmandlu, 2017).…”
Section: Materiald and Methodsmentioning
confidence: 99%
“…As a result, the function will build a more complex decision boundary than linear methods. The use of the support vector machine in the problem of user identification by keystroke dynamics is considered in (Bhatia & Hanmandlu, 2017).…”
Section: Materiald and Methodsmentioning
confidence: 99%
“…To continue the work of such a user in the system, additional measures will be required, such as the suspension of the employee from work, the intervention of the system administrator, or the use of alternative means of authentication / identification. This issue is beyond the scope of this work (BHATIA, HANMANDLU, 2017).…”
Section: Introductionmentioning
confidence: 94%
“…Our previous work [16] deals with generation of the information set features from the same measurements of keystroke dynamics but uses the Mamta-Hanman entropy function in [17].…”
Section: Motivationmentioning
confidence: 99%
“…In our previous work [16] Step 1: Calculate mean Step 2: Calculate mean Step 3: Compute Step 4: Concatenate I 1 and I 2 to form I. Then train any classifier using concatenated I.…”
Section: The Two-component Information Set (Tcis)mentioning
confidence: 99%