+

Tural et al., 2024 - Google Patents

Artificial Intelligence and Keystroke Dynamics: The Mysterious World of Personal Signatures

Tural et al., 2024

Document ID
2849857974242244832
Author
Tural B
Örpek Z
Özmen S
Publication year
Publication venue
2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

External Links

Snippet

Today, authentication has become an important issue in the digital world. Protecting personal data and sensitive information through online transactions requires a more secure authentication process. Since traditional password-based authentication methods are …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00154Reading or verifying signatures; Writer recognition

Similar Documents

Publication Publication Date Title
Ahmed et al. Biometric recognition based on free-text keystroke dynamics
Karnan et al. Biometric personal authentication using keystroke dynamics: A review
Bhatt et al. Keystroke dynamics for biometric authentication—A survey
Raul et al. A comprehensive review of keystroke dynamics-based authentication mechanism
Zhong et al. A survey on keystroke dynamics biometrics: approaches, advances, and evaluations
Bailey et al. User identification and authentication using multi-modal behavioral biometrics
Almalki et al. Continuous authentication using mouse clickstream data analysis
de Mendizabal-Vazquez et al. Supervised classification methods applied to keystroke dynamics through mobile devices
Bhatnagar et al. A survey on behavioral biometric techniques: mouse vs keyboard dynamics
Pahuja et al. Biometric authentication & identification through behavioral biometrics: A survey
Ahmad et al. Keystroke dynamics in the pre-touchscreen era
Yang et al. Unsupervised sensor-based continuous authentication with low-rank transformer using learning-to-rank algorithms
Roy et al. User authentication: Keystroke dynamics with soft biometric features
Kaur et al. An intrinsic authorship verification technique for compromised account detection in social networks
Kochegurova et al. On continuous user authentication via hidden free-text based monitoring
Baynath et al. Keystroke recognition using neural network
Haque et al. Authentication through keystrokes: What you type and how you type
Tural et al. Artificial Intelligence and Keystroke Dynamics: The Mysterious World of Personal Signatures
Alieksieiev et al. Studying of keystroke dynamics statistical properties for biometrie user authentication
Roy et al. Enhanced knowledge-based user authentication technique via keystroke dynamics
Baynath et al. Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics.
Venkatachalam et al. Optimizing dynamic keystroke pattern recognition with hybrid deep learning technique and multiple soft biometric factors
Harun et al. Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN)
Zareen et al. An authentication system using keystroke dynamics
Baynath et al. Implementation of a Secure Keystroke Dynamics using Ant colony optimisation
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载