Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
USER IDENTIFICATION THROUGH KEYSTROKE BIOMETRICS ppt
#1

USER IDENTIFICATION THROUGH KEYSTROKE BIOMETRICS

[attachment=376]

INTRODUCTION

This approach presented in this paper uses typing biometrics of the user for user validation.

Analysis of user s keystrokes patterns.

The main objective of this paper is to verify the user based on learned information from the different pattern of typing.

Keystroke features are:
Latency between keystrokes.
Duration of key presses.

LITERATURE SURVEY

To restrict the access of an invalid user , a number of approaches are present, which are:
* Pattern recognition techniques
* Face recognition equipments
* Magnetic card reader , etc.

Expensive

Require installation of additional hardware.

Require a very long string password string.

Uses machine dependent approach.

PROBLEM STATEMENT

An intruder gets the access if it gets the user name and password.

So, there is need to enhance the user verification techniques.

Inexpensive.

No additional hardware required.

Easy installation.

Machine independent.

CONCLUSION

Implementations and comparison of various combinations of statistical, neural and fuzzy methods for user authentication.

System uses inter-key delays of the password for user identification.

The increase in precision of the calculated delays may furthe refine the results.
Reply

#2
USER IDENTIFICATION THROUGH KEYSTROKE BIOMETRICS
[attachment=321]

INTRODUCTION

This approach presented in this paper uses typing biometrics of the user for user validation.

Analysis of user s keystrokes patterns.

The main objective of this paper is to verify the user based on learned information from the different pattern of typing.

Keystroke features are:
Latency between keystrokes.
Duration of key presses.

LITERATURE SURVEY

To restrict the access of an invalid user , a number of approaches are present, which are:
* Pattern recognition techniques
* Face recognition equipments
* Magnetic card reader , etc.

Expensive

Require installation of additional hardware.

Require a very long string password string.

Uses machine dependent approach.

PROBLEM STATEMENT

An intruder gets the access if it gets the user name and password.

So, there is need to enhance the user verification techniques.

Inexpensive.

No additional hardware required.

Easy installation.

Machine independent.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.