Holistic and Procedural Features for Authenticating Users
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Various techniques are available that can provide some level of security. The problem of unintended side-effects of inconsistent experimental condition and environmental variables by restricting user’s mouse operation to a tightly-controlled environment has been addressed with the solution of mouse operations as dynamics. Mouse dynamics measures and assesses a user’s mouse-behavior characteristic for use as a biometric. For Each mouse operation task both holistic and procedural features are extracted. This type of authentication is very simple and efficient for the users. Then a Nearest Neighbor algorithm is employed for extracting the feature and anytime algorithm for the accuracy and speed. This approach achieves to improve the number of users with a false acceptance rate of 8.75% and a false rejection rate of 7.70%.This approach could lead to a performance boost both in authentication accuracy and authentication time.
Authors and Affiliations
D. Lakshmipriya
Big Data Mining using Map Reduce: A Survey Paper
Abstract: Big data is large volume, heterogeneous, distributed data. Big data applications where datacollection has grown continuously, it is expensive to manage, capture or extract and process data using existings...
Performance Issues on the Interoperability between IEEE 802.3 & IEEE 802.11 in Heterogeneous Network Environment
Abstract: This paper addresses network computing that seeks to utilize the aggregate resources of many networked computers that can be installed in heterogeneous environment to solve problems of resource allocation, and...
Version Control in Open Source Software
Abstract: open source software is software whose source code is freely available for anyone. The Open source software can be redistributed to others users and they can use it according to their own needs. Version C...
A Practical Approach Forparallel Image Processing
This review paper tries to solve the problem of processing big data of images on Apache Hadoop using Hadoop Image Processing Interface (HIPI) for storing and efficient distributed processing, combined with OpenCV, an ope...
A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional se...