Tural et al., 2024 - Google Patents
Artificial Intelligence and Keystroke Dynamics: The Mysterious World of Personal SignaturesTural et al., 2024
- Document ID
- 2849857974242244832
- Author
- Tural B
- Örpek Z
- Özmen S
- Publication year
- Publication venue
- 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
External Links
Snippet
Today, authentication has become an important issue in the digital world. Protecting personal data and sensitive information through online transactions requires a more secure authentication process. Since traditional password-based authentication methods are …
- 238000013473 artificial intelligence 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00154—Reading or verifying signatures; Writer recognition
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ahmed et al. | Biometric recognition based on free-text keystroke dynamics | |
| Karnan et al. | Biometric personal authentication using keystroke dynamics: A review | |
| Bhatt et al. | Keystroke dynamics for biometric authentication—A survey | |
| Raul et al. | A comprehensive review of keystroke dynamics-based authentication mechanism | |
| Zhong et al. | A survey on keystroke dynamics biometrics: approaches, advances, and evaluations | |
| Bailey et al. | User identification and authentication using multi-modal behavioral biometrics | |
| Almalki et al. | Continuous authentication using mouse clickstream data analysis | |
| de Mendizabal-Vazquez et al. | Supervised classification methods applied to keystroke dynamics through mobile devices | |
| Bhatnagar et al. | A survey on behavioral biometric techniques: mouse vs keyboard dynamics | |
| Pahuja et al. | Biometric authentication & identification through behavioral biometrics: A survey | |
| Ahmad et al. | Keystroke dynamics in the pre-touchscreen era | |
| Yang et al. | Unsupervised sensor-based continuous authentication with low-rank transformer using learning-to-rank algorithms | |
| Roy et al. | User authentication: Keystroke dynamics with soft biometric features | |
| Kaur et al. | An intrinsic authorship verification technique for compromised account detection in social networks | |
| Kochegurova et al. | On continuous user authentication via hidden free-text based monitoring | |
| Baynath et al. | Keystroke recognition using neural network | |
| Haque et al. | Authentication through keystrokes: What you type and how you type | |
| Tural et al. | Artificial Intelligence and Keystroke Dynamics: The Mysterious World of Personal Signatures | |
| Alieksieiev et al. | Studying of keystroke dynamics statistical properties for biometrie user authentication | |
| Roy et al. | Enhanced knowledge-based user authentication technique via keystroke dynamics | |
| Baynath et al. | Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics. | |
| Venkatachalam et al. | Optimizing dynamic keystroke pattern recognition with hybrid deep learning technique and multiple soft biometric factors | |
| Harun et al. | Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN) | |
| Zareen et al. | An authentication system using keystroke dynamics | |
| Baynath et al. | Implementation of a Secure Keystroke Dynamics using Ant colony optimisation |