Dynamic User Authentication Based on Mouse Movements Curves

  • Zaher Hinbarji
  • Rami Albatal
  • Cathal Gurrin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8936)


In this paper we describe a behavioural biometric approach to authenticate users dynamically based on mouse movements only and using regular mouse devices. Unlike most of the previous approaches in this domain, we focus here on the properties of the curves generated from the consecutive mouse positions during typical mouse movements. Our underlying hypothesis is that these curves have enough discriminative information to recognize users. We conducted an experiment to test and validate our model in which ten participants are involved. A back propagation neural network is used as a classifier. Our experimental results show that behavioural information with discriminating features is revealed during normal mouse usage, which can be employed for user modeling for various reasons, such as information asset protection.


multimedia security user modeling human-computer interaction mouse dynamics 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Todorov, D. (ed.): Mechanics of User Identification and Authentication:Fundamentals of Identity Management. Auerbach Publications (2007)Google Scholar
  2. 2.
    Pusara, M., Brodley, C.E.: User Re-authentication via Mouse Movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM, USA (2004)Google Scholar
  3. 3.
    Ahmed, A.A.E., Traore, I.: A New Biometric Technology Based on Mouse Dynamics. IEEE Trans. Dependable Sec. Comput. 4(3), 165–179 (2007)CrossRefGoogle Scholar
  4. 4.
    Nakkabi, Y., Traore, I., Ahmed, A.A.E.: Improving Mouse Dynamics Biometric Performance Using Variance Reduction via ExtractorsWith Separate Features. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40(6), 1345–1353 (2010)CrossRefGoogle Scholar
  5. 5.
    Schulz, D.A.: Mouse Curve Biometrics. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1–6 (September 2006)Google Scholar
  6. 6.
    Denning, D.E.: An Intrusion-Detection Model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)CrossRefGoogle Scholar
  7. 7.
    Hayashi, K., Okamoto, E., Mambo, M.: Proposal of User Identification Scheme Using Mouse. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 144–148. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  8. 8.
    Jorgensen, Z., Yu, T.: On Mouse Dynamics As a Behavioral Biometric for Authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 476–482. ACM, New York (2011)Google Scholar
  9. 9.
    Kotsiantis, S., Kanellopoulos, D.: Discretization Techniques: A recent survey (2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Zaher Hinbarji
    • 1
  • Rami Albatal
    • 1
  • Cathal Gurrin
    • 1
  1. 1.Insight Centre for Data AnalyticsDublin City UniversityIreland

Personalised recommendations