CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Multimodal Behavioral Biometric Technique for User Identification using Mouse and Keystroke Dynamics

by Anand Motwani, Raina Jain, Jyoti Sondhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 8
Year of Publication: 2015
Authors: Anand Motwani, Raina Jain, Jyoti Sondhi
10.5120/19558-1307

Anand Motwani, Raina Jain, Jyoti Sondhi . A Multimodal Behavioral Biometric Technique for User Identification using Mouse and Keystroke Dynamics. International Journal of Computer Applications. 111, 8 ( February 2015), 15-20. DOI=10.5120/19558-1307

@article{ 10.5120/19558-1307,
author = { Anand Motwani, Raina Jain, Jyoti Sondhi },
title = { A Multimodal Behavioral Biometric Technique for User Identification using Mouse and Keystroke Dynamics },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 8 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number8/19558-1307/ },
doi = { 10.5120/19558-1307 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:20.132108+05:30
%A Anand Motwani
%A Raina Jain
%A Jyoti Sondhi
%T A Multimodal Behavioral Biometric Technique for User Identification using Mouse and Keystroke Dynamics
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 8
%P 15-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel multimodal behavioral biometric technique is implemented to authenticate/identify users by the way they interact with the input devices namely mouse and keyboard. It is also shown how behavioral biometrics is more efficient and secure than physiological biometric systems and moreover the most secured system is that which uses combination of both. This paper explains how the user will first be enrolled into the system. Sufficient number of samples will ensure the accuracy of the system. During verification, the user data will be first matched with that of the database and a probability module will decide over most probable user to be authenticated. The database matching process and simple probability calculation will ensure a time efficient system.

References
  1. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar "User identity verification via mouse dynamics", Information Sciences 201 (2012) 19–36.
  2. Nobuyuki Nishiuchi, "combining dynamic data with physical biometric verification to counteract spoofing", journal of medical informatics & technologies vol. 15/2010, ISSN 1642-603.
  3. Roman V. Yampolskiy, Venu Govindaraju "Behavioral biometrics: a survey and classification", Int. J. Biometrics, Vol. 1, No. 1, 2008.
  4. R. P. Antokumar, Marcus Karnan, "Applying Keystroke Dynamics for Personal Authentication using Artificial Bee Colony Optimization Technique", European Journal of Scientific Research, ISSN 1450-216X Vol. 90 No 2 November, 2012, pp. 234-242, 2012
  5. Benjamin Purgasona, David Hiblerb, Christopher Newport," Security Through Behavioral Biometrics and Artificial Intelligence" , Conference Organized by Missouri University of Science and Technology 2012- Washington D. C. , Procedia Computer Science 12 ( 2012 ) 398 – 403 1877-0509, published by Elsevier, doi: 10. 1016/j. procs. 2012. 09. 093.
  6. Enzhe Yu, Sungzoon Cho," Keystroke dynamics identity verification, its problems and practical solutions, Received 5 November 2003; revised 2 February 2004; accepted 10 February 2004, Computers & Security (2004) 23, 428e440.
  7. H. Saevanee and P. Bhattarakosol, "Authenticating user using keystroke dynamics and finger pressure" , 978-1-4244-2309-5/09/$25. 00 ©2009 IEEE.
  8. Abdul Serwadda , Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran Balagani, "Scan-Based Evaluation of Continuous Keystroke Authentication Systems", Published by the IEEE Computer Society, IT Pro July/August 2013, 1520-9202/13/$31. 00 © 2013 IEEE.
  9. Christopher M. Bishop, "Pattern Recognition and Machine Learning", Springer, Information Science and Statistics, ISBN-10: 0-387-31073-8, ISBN-13: 978-0387-31073-2, February 2006.
  10. http://www. mathsisfun. com/data/probability-events conditional. html
Index Terms

Computer Science
Information Sciences

Keywords

Behavioral biometric physiological biometric probability.