Holistic and Procedural Features for Authenticating Users
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Various techniques are available that can provide some level of security. The problem of unintended side-effects of inconsistent experimental condition and environmental variables by restricting user’s mouse operation to a tightly-controlled environment has been addressed with the solution of mouse operations as dynamics. Mouse dynamics measures and assesses a user’s mouse-behavior characteristic for use as a biometric. For Each mouse operation task both holistic and procedural features are extracted. This type of authentication is very simple and efficient for the users. Then a Nearest Neighbor algorithm is employed for extracting the feature and anytime algorithm for the accuracy and speed. This approach achieves to improve the number of users with a false acceptance rate of 8.75% and a false rejection rate of 7.70%.This approach could lead to a performance boost both in authentication accuracy and authentication time.
Authors and Affiliations
D. Lakshmipriya
Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control o...
Methods Migration from On-premise to Cloud
Abstract: Cloud computing is evolving as a key computing platform for sharing resources that includeinfrastructures, software, applications, and business. An increasing number of companies are expected tomigrate th...
Mining Weakly Labeled Web Facial Images For Search-BasedFace Annotation
Abstract: This paper investigates a framework of search-based face annotation (SBFA) by mining weaklylabeled facial images that are freely available on the World Wide Web (WWW). One challenging problem forsearch-based fa...
A Comparitative Survey on Malicious Nodes and Their Attacks in MANET
Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or n...
Wireless Controlling Of Remote Electrical Device Using Android Smartphone
Abstract: Controlling the home appliances and electronics gadgets wirelessly through SmartPhone technology can be more easy. That is, through this paper, we target to control a light emitting device (LED) from any...