GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR

Ahmed Al-Khazzar, Nick Savage

2010

Abstract

In this paper the feasibility of having an authentication system based on user’s behaviour is studied. The approach used is based on psychological mechanisms of authentication which are a subset of a broader class of biometric mechanisms. This project implemented a 3D graphical maze that a user has to navigate through. The user is authenticated based on information collected from their behaviour in reaction to the maze. Results obtained from the experiments revealed that this authentication system has a mean accuracy of 88.33% in identifying different users from each other.

References

  1. Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. , 5 (4), 367-397.
  2. Buthan, I., & Hartel, P. (2005). The state of the art in abuse of biometrics. Technical Report, Centre for Telematics and Information Technology, Enschede.
  3. Gamboa, H., & Fred, A. (2004). A Behavioural Biometric System Based on Human Computer Interaction. Proc. SPIE - Int. Soc. Opt. Eng. (pp. 381-92). Orlando, USA: SPIE-Int. Soc. Opt. Eng.
  4. Jin, Z., Teoh, A. B., Thian, S. O., & Tee, C. (2008). Typing dynamics biometric authentication through fuzzy logic. Proc. - Int. Symp. Inf. Technol., ITSim (pp. 1 - 6). Kuala Lumpur, Malaysia: IEEE.
  5. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal , 40 (3), 614-34.
  6. Yampolskiy, R. (2008). Behavioral modeling: an overview. American Journal of Applied Sciences , 5 (5), 496--503.
  7. Yampolskiy, R., & Govindaraju, V. (2009). Strategybased behavioural biometrics: a novel approach to automated identification. International Journal of Computer Applications in Technology , 35 (1), 29-41.
Download


Paper Citation


in Harvard Style

Al-Khazzar A. and Savage N. (2010). GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 86-89. DOI: 10.5220/0002961700860089


in Bibtex Style

@conference{secrypt10,
author={Ahmed Al-Khazzar and Nick Savage},
title={GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={86-89},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002961700860089},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
SN - 978-989-8425-18-8
AU - Al-Khazzar A.
AU - Savage N.
PY - 2010
SP - 86
EP - 89
DO - 10.5220/0002961700860089