Skip to main content

2016 | OriginalPaper | Buchkapitel

Application of a Digraph for Behavioural Eye Tracking Biometrics

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Preliminary reports on the soon to be released Samsung note 7, suggests that the new device will incorporate an iris scanner to be used for biometric authentication. It is clear that over the past number of years, vendors of personal digital devices, consider biometric authentication of a human as a possible replacement for pin, password and pattern based authentication mechanisms currently in use.
Behavioural biometrics is often used to strengthen existing authentication mechanisms. A digraph is commonly associated with the behavioural biometric known as keystroke dynamics. A password is firstly tested for correctness against the reference password on file. This is followed by a second step, where the biometric behavioural aspect is tested. The unique rhythm that a user exhibits when the password is entered forms part of the authentication process by using a digraph approach.
This paper utilizes the EyeWriter to test if the digraph approach can be used in eye tracking to create a behavioural biometric to authenticate a person.
The test was performed on 20 candidates and the results from this test indicated clearly that the behavioural aspect can fundamentally be used for behavioural biometric authentication in a one-to-one biometric authentication approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 127–138. ACM, September 2014 Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 127–138. ACM, September 2014
Zurück zum Zitat Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef
Zurück zum Zitat Bang, Y., Lee, D.J., Bae, Y.S., Ahn, J.H.: Improving information security management: an analysis of ID–password usage and a new login vulnerability measure. Int. J. Inf. Manag. 32(5), 409–418 (2012)CrossRef Bang, Y., Lee, D.J., Bae, Y.S., Ahn, J.H.: Improving information security management: an analysis of ID–password usage and a new login vulnerability measure. Int. J. Inf. Manag. 32(5), 409–418 (2012)CrossRef
Zurück zum Zitat Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005). doi:10.1007/11499145_79 CrossRef Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005). doi:10.​1007/​11499145_​79 CrossRef
Zurück zum Zitat Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)CrossRef Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)CrossRef
Zurück zum Zitat Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer Science & Business Media, Heidelberg (2013) Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer Science & Business Media, Heidelberg (2013)
Zurück zum Zitat Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)CrossRef Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)CrossRef
Zurück zum Zitat Dhillon, G., Syed, R., Pedron, C.: Interpreting information security culture: an organizational transformation case study. Comput. Secur. 56, 63–69 (2016)CrossRef Dhillon, G., Syed, R., Pedron, C.: Interpreting information security culture: an organizational transformation case study. Comput. Secur. 56, 63–69 (2016)CrossRef
Zurück zum Zitat Goren, Y., Arie, E.: The authenticity of the Bullae of Berekhyahu son of Neriyahu the scribe. Bull. Am. Sch. Orient. Res. 372, 147–158 (2014)CrossRef Goren, Y., Arie, E.: The authenticity of the Bullae of Berekhyahu son of Neriyahu the scribe. Bull. Am. Sch. Orient. Res. 372, 147–158 (2014)CrossRef
Zurück zum Zitat Hamid, L.: Biometric technology: not a password replacement, but a complement. Biom. Technol. Today 2015(6), 7–10 (2015)MathSciNetCrossRef Hamid, L.: Biometric technology: not a password replacement, but a complement. Biom. Technol. Today 2015(6), 7–10 (2015)MathSciNetCrossRef
Zurück zum Zitat Holland, C., Komogortsev, O.: Eye tracking on unmodified common tablets: challenges and solutions. In: Proceedings of the Symposium on Eye Tracking Research and Applications, pp. 277–280. ACM, March 2012 Holland, C., Komogortsev, O.: Eye tracking on unmodified common tablets: challenges and solutions. In: Proceedings of the Symposium on Eye Tracking Research and Applications, pp. 277–280. ACM, March 2012
Zurück zum Zitat Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the internet of things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, pp. 37–42. ACM, April 2013 Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the internet of things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, pp. 37–42. ACM, April 2013
Zurück zum Zitat Liu, Z., Zhang, Z., Wu, Q., Wang, Y.: Enhancing person re-identification by integrating gait biometric. Neurocomputing 168, 1144–1156 (2015)CrossRef Liu, Z., Zhang, Z., Wu, Q., Wang, Y.: Enhancing person re-identification by integrating gait biometric. Neurocomputing 168, 1144–1156 (2015)CrossRef
Zurück zum Zitat Monaco, J.V., Stewart, J.C., Cha, S.H., Tappert, C.C.: Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8. IEEE, September 2013 Monaco, J.V., Stewart, J.C., Cha, S.H., Tappert, C.C.: Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8. IEEE, September 2013
Zurück zum Zitat Morgante, J.D., Zolfaghari, R., Johnson, S.P.: A critical test of temporal and spatial accuracy of the Tobii T60XL eye tracker. Infancy 17(1), 9–32 (2012)CrossRef Morgante, J.D., Zolfaghari, R., Johnson, S.P.: A critical test of temporal and spatial accuracy of the Tobii T60XL eye tracker. Infancy 17(1), 9–32 (2012)CrossRef
Zurück zum Zitat Murphy, B.L., Morrison, R.D. (eds.): Introduction to Environmental Forensics. Academic Press, Cambridge (2014) Murphy, B.L., Morrison, R.D. (eds.): Introduction to Environmental Forensics. Academic Press, Cambridge (2014)
Zurück zum Zitat Quinn, G.W., Grother, P.: The one-to-many multi-modal fusion challenge. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 408–412. IEEE, March 2012 Quinn, G.W., Grother, P.: The one-to-many multi-modal fusion challenge. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 408–412. IEEE, March 2012
Zurück zum Zitat Tait, B.L.: The biometric landscape–towards a sustainable biometric terminology framework 9. Int. J. Electron. Secur. Digit. Forensics 6(2), 147–156 (2014)CrossRef Tait, B.L.: The biometric landscape–towards a sustainable biometric terminology framework 9. Int. J. Electron. Secur. Digit. Forensics 6(2), 147–156 (2014)CrossRef
Zurück zum Zitat Tait, B.L.: Behavioural biometrics: utilizing eye-tracking to generate a behavioural pin using the eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A.G., Hosseinian-Far, A. (eds.) ICGS3 2015. CCIS, vol. 534, pp. 348–359. Springer, Heidelberg (2015). doi:10.1007/978-3-319-23276-8_31 CrossRef Tait, B.L.: Behavioural biometrics: utilizing eye-tracking to generate a behavioural pin using the eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A.G., Hosseinian-Far, A. (eds.) ICGS3 2015. CCIS, vol. 534, pp. 348–359. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-23276-8_​31 CrossRef
Zurück zum Zitat Sanchez-Reillo, R., Quiros-Sandoval, H.C., Liu-Jimenez, J., Goicoechea-Telleria, I.: Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. In: 2015 International Carnahan Conference on Security Technology (ICCST), pp. 373–378. IEEE, September 2015 Sanchez-Reillo, R., Quiros-Sandoval, H.C., Liu-Jimenez, J., Goicoechea-Telleria, I.: Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. In: 2015 International Carnahan Conference on Security Technology (ICCST), pp. 373–378. IEEE, September 2015
Zurück zum Zitat Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995 doi:10.1049/cp:19950480 Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995 doi:10.​1049/​cp:​19950480
Zurück zum Zitat Waits, M.R.: The indexical trace: a visual interpretation of the history of fingerprinting in colonial India. Vis. Cult. Br. 17(1), 18–46 (2016)CrossRef Waits, M.R.: The indexical trace: a visual interpretation of the history of fingerprinting in colonial India. Vis. Cult. Br. 17(1), 18–46 (2016)CrossRef
Zurück zum Zitat Weinberg, J.T.: Biometric identity. Commun. ACM 59(1), 30–32 (2015)CrossRef Weinberg, J.T.: Biometric identity. Commun. ACM 59(1), 30–32 (2015)CrossRef
Zurück zum Zitat Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). ElsevierCrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). ElsevierCrossRef
Metadaten
Titel
Application of a Digraph for Behavioural Eye Tracking Biometrics
verfasst von
Bobby L. Tait
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-51064-4_20