Computer Science ›› 2016, Vol. 43 ›› Issue (2): 148-154.doi: 10.11896/j.issn.1002-137X.2016.02.033

Previous Articles     Next Articles

Identity Authentication Method Based on User’s Mouse Behavior

XU Jian, LI Ming-jie, ZHOU Fu-cai and XUE Rui   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Aiming at the problems of existing solution for identity authentication,the paper provided a method about the identity authentication based on mouse behaviour.First,it gave the authentication model based on the mouse action and the entity set,and then defined the mouse action by hierarchical division method.At the same time,it gave the definition of features related to the mouse action and the computing method.The paper used random forest classifier as the classification tool to solve the problem of data over-fitting and noise in the existing solution.In the phase of authentication,it used hierarchical classification-decision model for identity authentication.Finally,the paper analyzed the method through experiment,showing a better false rejection rate and false acceptance rate.

Key words: Identity authentication,Mouse behavior,Random forest

[1] Wang Yi,Hu Jian-kun.Global Ridge Orientation Modeling for Partial Fingerprint Identification [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,33(1):72-87
[2] Jing Xiao-yuan,Li Sheng,Zhang D,et al.Optimal subset-division based discrimination and its kernelization for face and palmprint recognition[J].Pattern Recognition,2012,45(10):3590-3602
[3] Su Yu,Shan Shi-guang,Chen Xi-lin,et al.[J].Journal of Software,2010,1(8):1849-1862(in Chinese) 苏煜,山世光,陈熙霖,等.基于全局和局部特征集成的人脸识别[J].软件学报,2010,1(8):1849-1862
[4] Nigam A,Gupta P.Iris recognition using consistent corner optical flow [C]∥Proc of 11th Asian Conference on Computer Vision.2012:358-369
[5] Lee P J-W,Choi S-S,Moon P B-R.An evolutionary keystroke authentication based on ellipsoidal hypothesis space [C]∥ Proc of the 9th Annual Conference on Genetic and Evolutionary Computation.2007:2090-2097
[6] Ahmed,TraoreIssa A A.Biometric recognition based on free-text keystroke dynamics [J].IEEE Transactions on Cyberne-tics,2014,44(4):458-472
[7] Ahmed A A E,Traore I.Detecting computer intrusions usingbehavioral biometrics[C]∥ Proc of 3rd Annual Conference on Privacy.Security,2005:91-98
[8] Jorgensen Z,Yu T.On mouse dynamics as a behavioral biome-tric for authentication[C]∥Proc of the 6th ACM Symposium on Information,Computer and Communications Security.2011:476-482
[9] Gamboa H,Fred A L N,Jain A K.Webbiometrics:User verification via web interaction[C]∥ Proc of 2007 Biometrics Symposium.2007:1-6
[10] Pusara M,Brodley C E.User re-authentication via mouse movements[C]∥ Proc of the 2004 ACM workshop on Visualization and data mining for computer security.2004:1-8
[11] Bours P,Fullu C J.A login system using mouse dynamics[C]∥ Proc of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2009:1072-1077
[12] Schulz D A.Mouse curve biometrics[C]∥ Proc of 2006 Biome-trics Symposium.2006:79-83
[13] Ahmed A A E,Traore I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179
[14] Shen Chao,Cai Zhong-min,Guan Xiao-hong,et al.User authentication and monitoring based on mouse behavioral features[J].Journal on Communications,2010,1(7):68-75(in Chinese) 沈超,蔡忠闽,管晓宏,等.基于鼠标行为特征的用户身份认证与监控[J].通信学报,2010,1(7):68-75

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!