Skip to main content
Top

2015 | OriginalPaper | Chapter

Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biometric technology allows a computer system to identify and authenticate a person directly based on physical or behavioural traits. A human body is absolutely unique. Each human body on earth, if measured by composition on molecular level, is so unique, that the particular composition has never existed before. When that human cease to exist, that unique composition will never exist again. However the ability to measure a human to a molecular level of accuracy is not currently possible with existing technology. Biometrics refers to the science and technology that measure and statistically analyse human body characteristics and biological data. DNA, fingerprints, eye retinas and irises, facial patterns and hand geometry are used for biometric for authentication purposes. Apart from having unique physical traits, all human also exhibit unique behavioural traits. The way that a person talks, or the way that a person walks (a person’s gait) can all assist in the identification of the person. Various research projects focused on the way that a person types a password. This behavioural trait can then be used to strengthen the security of a supplied password. This paper reports on research that investigates the uniqueness of eye movement. The way a person creates a pin, using his or her eyes are used as a behavioural biometric to strengthen the pin that is supplied. Eye tracking technology usually involves costly equipment such as the Tobii eye tracking system. For this research the Eyewriter system is used due to the affordability and the open source nature of the Eyewriter hardware and software. Earlier research concluded that the movement of a human eye is unique. Behavioural eye biometrics can be used to authenticate a human in a one to one match environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005)CrossRef Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005)CrossRef
2.
go back to reference Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)CrossRef Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)CrossRef
3.
go back to reference Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)CrossRef Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)CrossRef
4.
go back to reference Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentication: a review. Int. J. u-and e-Serv. Sci. Technol. 2(3), 13–28 (2009) Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentication: a review. Int. J. u-and e-Serv. Sci. Technol. 2(3), 13–28 (2009)
5.
go back to reference Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multimodal 2D + 3D face biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 27(4), 619–624 (2005)CrossRef Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multimodal 2D + 3D face biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 27(4), 619–624 (2005)CrossRef
6.
go back to reference Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP WG. IFIP, vol. 147, pp. 275–289. Springer, Heidelberg (2014) Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP WG. IFIP, vol. 147, pp. 275–289. Springer, Heidelberg (2014)
10.
go back to reference Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381–392. International Society for Optics and Photonics, August 2004 Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381–392. International Society for Optics and Photonics, August 2004
11.
go back to reference He, Z., Tan, T., Sun, Z., Qiu, X.: Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 31(9), 1670–1684 (2009)CrossRef He, Z., Tan, T., Sun, Z., Qiu, X.: Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 31(9), 1670–1684 (2009)CrossRef
12.
go back to reference Higgins, P.T.: Introduction to biometrics. In: The Proceeding of Biometrics Consortium Conference (2006) Higgins, P.T.: Introduction to biometrics. In: The Proceeding of Biometrics Consortium Conference (2006)
13.
go back to reference Kim, D.J., Hong, K.S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electron. 54(4), 1790–1797 (2008)MathSciNetCrossRef Kim, D.J., Hong, K.S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electron. 54(4), 1790–1797 (2008)MathSciNetCrossRef
14.
go back to reference Kumar, A., Wang, D.C., Shen, H.C., Jain, A.K.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) Audio- and Video-Based Biometric Person Authentication. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)CrossRef Kumar, A., Wang, D.C., Shen, H.C., Jain, A.K.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) Audio- and Video-Based Biometric Person Authentication. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)CrossRef
15.
go back to reference Lee, H.C., Ramotowski, R., Gaensslen, R.E. (eds.): Advances in Fingerprint Technology. CRC Press, Boca Raton (2001) Lee, H.C., Ramotowski, R., Gaensslen, R.E. (eds.): Advances in Fingerprint Technology. CRC Press, Boca Raton (2001)
16.
go back to reference Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Proceedings (ICASSP 2005), vol. 2, pp. ii-973. IEEE, March, 2005 Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Proceedings (ICASSP 2005), vol. 2, pp. ii-973. IEEE, March, 2005
17.
go back to reference Miller, B.: Vital signs of identity [biometrics]. IEEE Spectr. 31(2), 22–30 (1994)CrossRef Miller, B.: Vital signs of identity [biometrics]. IEEE Spectr. 31(2), 22–30 (1994)CrossRef
18.
go back to reference Monrose, F., & Rubin, A. (1997, April). Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security (pp. 48-56). ACM Monrose, F., & Rubin, A. (1997, April). Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security (pp. 48-56). ACM
19.
go back to reference Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995. doi:10.1049/cp:19950480 Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995. doi:10.​1049/​cp:​19950480
20.
go back to reference Stern, D.P.: A Short history of nearly everything. Eos Trans. Am. Geophys. Union 86(20), 198 (2005)CrossRef Stern, D.P.: A Short history of nearly everything. Eos Trans. Am. Geophys. Union 86(20), 198 (2005)CrossRef
21.
go back to reference Thalheim, L., Krissler, J., Ziegler, P.M.: Body check. C’t Mag. 11, 114 (2002) Thalheim, L., Krissler, J., Ziegler, P.M.: Body check. C’t Mag. 11, 114 (2002)
22.
go back to reference Usher, D., Tosa, Y., Friedman, M.: Ocular biometrics: simultaneous capture and analysis of the retina and iris. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 133–155. Springer, London (2008)CrossRef Usher, D., Tosa, Y., Friedman, M.: Ocular biometrics: simultaneous capture and analysis of the retina and iris. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 133–155. Springer, London (2008)CrossRef
24.
go back to reference Wang, L. (ed.): Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications. IGI Global, Hershey (2009) Wang, L. (ed.): Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications. IGI Global, Hershey (2009)
Metadata
Title
Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter
Author
Bobby L. Tait
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-23276-8_31

Premium Partner