Skip to main content

2018 | OriginalPaper | Buchkapitel

A Literature Survey on Authentication Using Behavioural Biometric Techniques

verfasst von : Rajvardhan Oak

Erschienen in: Intelligent Computing and Information and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With technological advancements and the increasing use of computers and internet in our day to day lives, the issue of security has become paramount. The rate of cybercrime has increased tremendously in the internet era. Out of the numerous crimes, identity theft is perhaps the one that poses the most dangers to an individual. More and more voices strongly declare that the password is no longer a reliable IT security measure and must be replaced by more efficient systems for protecting the computer contents. Behavioural biometrics is an emerging technology that resolves some of the major flaws of the previous scheme. This paper is the first stage of a project which aims to develop a novel authentication system using behavioural biometrics. It presents a comprehensive survey of various techniques and recent works in the respective fields.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat L. Wang, X. Geng, L. Wang, and X. Geng. Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference—Imprint of: IGI Publishing, Hershey, PA, 2009 L. Wang, X. Geng, L. Wang, and X. Geng. Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference—Imprint of: IGI Publishing, Hershey, PA, 2009
2.
Zurück zum Zitat Michelle Boatwright, Xin Luo, “What Do We Know About Biometrics Authentication?”, InfoSecCD ‘07: Proceedings of the 4th annual conference on Information security curriculum development 2007 Michelle Boatwright, Xin Luo, “What Do We Know About Biometrics Authentication?”, InfoSecCD ‘07: Proceedings of the 4th annual conference on Information security curriculum development 2007
3.
Zurück zum Zitat James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,” Biometric Systems: Technology, Design and Performance Evaluation”, Springer, ISBN: 1852335963 James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,” Biometric Systems: Technology, Design and Performance Evaluation”, Springer, ISBN: 1852335963
4.
Zurück zum Zitat Tarik Mustafi´c, Arik Messerman, Seyit Ahmet Camtepe, Aubrey-Derrick Schmidt, Sahin Albayrak, “Behavioral Biometrics for Persistent Single Sign-On”, Proceedings of the 7th ACM workshop on Digital identity management, 2011 Tarik Mustafi´c, Arik Messerman, Seyit Ahmet Camtepe, Aubrey-Derrick Schmidt, Sahin Albayrak, “Behavioral Biometrics for Persistent Single Sign-On”, Proceedings of the 7th ACM workshop on Digital identity management, 2011
5.
Zurück zum Zitat K P Tripathi, “A Comparative Study of Biometric Technologies with Reference to Human Interface”, International Journal of Computer Applications (0975 – 8887) Volume 14– No.5, January 2011 K P Tripathi, “A Comparative Study of Biometric Technologies with Reference to Human Interface”, International Journal of Computer Applications (0975 – 8887) Volume 14– No.5, January 2011
6.
Zurück zum Zitat Wolff, Matt. Behavioral Biometric Identification on Mobile Devices. Foundations of Augmented Cognition. Springer Berlin Heidelberg, 783–791, 2013 Wolff, Matt. Behavioral Biometric Identification on Mobile Devices. Foundations of Augmented Cognition. Springer Berlin Heidelberg, 783–791, 2013
7.
Zurück zum Zitat Yampolskiy, R.V. and Govindaraju, V. (2008) ‘Behavioural biometrics: a survey and classification’, Int. J. Biometrics, Vol. 1, No. 1, pp. 81–113 Yampolskiy, R.V. and Govindaraju, V. (2008) ‘Behavioural biometrics: a survey and classification’, Int. J. Biometrics, Vol. 1, No. 1, pp. 81–113
8.
Zurück zum Zitat Ioannis C. Stylios, Olga Thanou, Iosif Androulidakis, Elena Zaitseva, “A Review of Continuous Authentication Using Behavioral Biometrics”, Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference 2016 Ioannis C. Stylios, Olga Thanou, Iosif Androulidakis, Elena Zaitseva, “A Review of Continuous Authentication Using Behavioral Biometrics”, Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference 2016
9.
Zurück zum Zitat Esther Vasiete, Vishal Patel, Yan Chen, Larry Davis, Ian Char, Rama Chellappa, Tom Yeh, “Toward a Non-Intrusive, PhysioBehavioral Biometric for Smartphones”, MobileHCI 2014, Sept. 23–26, 2014, Toronto, ON, CA Esther Vasiete, Vishal Patel, Yan Chen, Larry Davis, Ian Char, Rama Chellappa, Tom Yeh, “Toward a Non-Intrusive, PhysioBehavioral Biometric for Smartphones”, MobileHCI 2014, Sept. 23–26, 2014, Toronto, ON, CA
10.
Zurück zum Zitat Monika Bhatnagar, Raina K Jain, Nilam S Khairnar, “A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics”, Proceedings of the International Conference on Recent Trends in engineering & Technology - 2013(ICRTET’2013) Monika Bhatnagar, Raina K Jain, Nilam S Khairnar, “A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics”, Proceedings of the International Conference on Recent Trends in engineering & Technology - 2013(ICRTET’2013)
11.
Zurück zum Zitat Juho Leinonen, Krista Longi, Arto Klami, Arto Vihavainen, “Automatic Inference of Programming Performance and Experience from Typing Patterns”, Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016 Juho Leinonen, Krista Longi, Arto Klami, Arto Vihavainen, “Automatic Inference of Programming Performance and Experience from Typing Patterns”, Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
12.
Zurück zum Zitat Kyle R. Corpus, Ralph Joseph DL. Gonzales, Alvin Scott Morada, Larry A. Vea, “Mobile User Identification through Authentication using Keystroke Dynamics and Accelerometer Biometrics”, Proceedings of the IEEE International Conference on Mobile Software Engineering and Systems, 2016 Kyle R. Corpus, Ralph Joseph DL. Gonzales, Alvin Scott Morada, Larry A. Vea, “Mobile User Identification through Authentication using Keystroke Dynamics and Accelerometer Biometrics”, Proceedings of the IEEE International Conference on Mobile Software Engineering and Systems, 2016
13.
Zurück zum Zitat Zach Jorgensen, Ting Yu, “On mouse dynamics as a behavioral biometric for authentication”, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011 Zach Jorgensen, Ting Yu, “On mouse dynamics as a behavioral biometric for authentication”, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
14.
Zurück zum Zitat Nan Zheng, Aaron Paloski, Haining Wang, “An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics”, ACM Transactions on Information and System Security, Vol 18, Issue 3 Nan Zheng, Aaron Paloski, Haining Wang, “An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics”, ACM Transactions on Information and System Security, Vol 18, Issue 3
15.
Zurück zum Zitat Andrea Kanneh, Ziad Sakr, “Biometric user verification using haptics and fuzzy logic”, Proceedings of the 16th ACM international conference on Multimedia, 2008 Andrea Kanneh, Ziad Sakr, “Biometric user verification using haptics and fuzzy logic”, Proceedings of the 16th ACM international conference on Multimedia, 2008
16.
Zurück zum Zitat Saevanee H., Bhatarakosol, P., (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. International Conference on Computer and Electrical Engineering, 2008. Page(s): 82–86 Saevanee H., Bhatarakosol, P., (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. International Conference on Computer and Electrical Engineering, 2008. Page(s): 82–86
17.
Zurück zum Zitat Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D., (2012). Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security. 2012. (Volume:8, Issue: 1). Page(s): 136–148 Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D., (2012). Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security. 2012. (Volume:8, Issue: 1). Page(s): 136–148
18.
Zurück zum Zitat Daniel Buschek, Alexander De Luca, Florian Alt, “Evaluating the influence of Targets and Hand Postures on Touch-based behavioural biometrics”, Proceedings of the ACM Conference on Human Factors in Computing Systems, 2016 Daniel Buschek, Alexander De Luca, Florian Alt, “Evaluating the influence of Targets and Hand Postures on Touch-based behavioural biometrics”, Proceedings of the ACM Conference on Human Factors in Computing Systems, 2016
19.
Zurück zum Zitat Benabdelkader, C., Cutler, R., and Davis, L. ‘Person identification using automatic height and stride estimation’, IEEE International Conference on Pattern Recognition 2002 Benabdelkader, C., Cutler, R., and Davis, L. ‘Person identification using automatic height and stride estimation’, IEEE International Conference on Pattern Recognition 2002
20.
Zurück zum Zitat S Laxmi, Tata A S K Ishwarya, S Sreeja, “Exploring Behavioural Type Biometrics: Typing Rhythm, Gait, Voice”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 10, October 2016 S Laxmi, Tata A S K Ishwarya, S Sreeja, “Exploring Behavioural Type Biometrics: Typing Rhythm, Gait, Voice”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 10, October 2016
21.
Zurück zum Zitat Mantyjarvi, J., Lindholm, M., Vildjiounaite E., Makela, S.M., Ailisto, H. A. (2005). Identifying users of portable devices from gait pattern with accelerometers. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. (Volume:2). Page(s): ii/973–ii/976 Vol. 2 Mantyjarvi, J., Lindholm, M., Vildjiounaite E., Makela, S.M., Ailisto, H. A. (2005). Identifying users of portable devices from gait pattern with accelerometers. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. (Volume:2). Page(s): ii/973–ii/976 Vol. 2
22.
Zurück zum Zitat Yan Li, Ting Zhu, “Gait-Based WiFi signatures for Privacy-Preserving”, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016 Yan Li, Ting Zhu, “Gait-Based WiFi signatures for Privacy-Preserving”, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
23.
Zurück zum Zitat Gugliemlo Cola, Marco Awenuti, Fabio Musso, Alessio Vecchio, “Gait-based Authentication using a wrist-worn device”, Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2016 Gugliemlo Cola, Marco Awenuti, Fabio Musso, Alessio Vecchio, “Gait-based Authentication using a wrist-worn device”, Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2016
24.
Zurück zum Zitat Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner, “Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools”, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016 Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner, “Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools”, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
25.
Zurück zum Zitat Animesh Nandi, Atri Mandal, Shubham Atreja, Gargi B. Dasgupta, Subhrajit Bhattacharya, “Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs”, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016 Animesh Nandi, Atri Mandal, Shubham Atreja, Gargi B. Dasgupta, Subhrajit Bhattacharya, “Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs”, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016
Metadaten
Titel
A Literature Survey on Authentication Using Behavioural Biometric Techniques
verfasst von
Rajvardhan Oak
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7245-1_18

Premium Partner