Proposing Model for Recognizing User Position

  • Biky Bikas TirkeyEmail author
  • Baljit Singh Saini
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1045)


In the progressive world of Internet, online banking or any other transaction is not secure because of methods such as brute force technique, dictionary attacks, and spoofing. It is because traditional methods of authentication require either password or pin which is not secure because it can be cracked easily using the methods mentioned above. Therefore, biometric authentication can be a viable option which can be used for identification of a genuine user. In this paper, we propose a model for identifying the user’s position that plays a vital role in identifying the genuinity of any user. This paper revolves around the effects on verification of genuine user if the data collected from user is done in both controlled and uncontrolled environment.


Physical biometrics Behavioral biometrics Keystroke dynamics False acceptance rate (FAR) False rejection rate (FRR) Equal error rate (EER) Random forest algorithm J48 Reduced error pruning 


  1. 1.
    Burger, M.P.: Biometric authentication system. Google Patents, vol. 17 (2001)Google Scholar
  2. 2.
    Mizrah, L.L.: Method of one time authentication response to a session-specific challenge indicating a random subset of password or pin character positions, Mar. 16, 2010, uS Patent 7,681,228Google Scholar
  3. 3.
    Karawash, A.: Brute force attackGoogle Scholar
  4. 4.
    Deo, V., Seidensticker, R.B., Simon, D.R.: Authentication system and method for smart card transactions, Feb. 24, 1998, uS Patent 5,721,781Google Scholar
  5. 5.
    Berislav Kucan, Z.Z., Mirko Zorz: Biometric preference (1998)Google Scholar
  6. 6.
    Das, R.: An introduction to biometrics. Mil. Technol. 29(7), 20–27 (2005)Google Scholar
  7. 7.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer Science & Business Media (2009)Google Scholar
  8. 8.
    Daugman, J.: How iris recognition works. In The Essential Guide to Image Processing, pp. 715–739. Elsevier, Amsterdam (2009)Google Scholar
  9. 9.
    Saeed, K., Werdoni, M.: A new approach for hand-palm recognition. Enhanced Methods in Computer Security. Biometric and Artificial Intelligence Systems, pp. 185–194. Springer, Berlin (2005)Google Scholar
  10. 10.
    Zhao, W., Krishnaswamy, A., Chellappa, R., Swets, D. L., Weng, J.: Discriminant analysis of principal components for face recognition. In Face Recognition. Springer, pp. 73–85 (1998)Google Scholar
  11. 11.
    Monrose, F., Rubin, D.A.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)CrossRefGoogle Scholar
  12. 12.
    Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565–1573 (2011)CrossRefGoogle Scholar
  13. 13.
    Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Tech. Rep, Rand Corp Santa Monica CA (1980)Google Scholar
  14. 14.
    Garcia, J.D.: Personal identification apparatus, Nov. 4, 1986, uS Patent 4,621,334Google Scholar
  15. 15.
    Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)CrossRefGoogle Scholar
  16. 16.
    Young, R.J., Hammon, W.R.: Method and apparatus for verifying an individual’s identity. Google Patents vol. 14 (1989)Google Scholar
  17. 17.
    Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man. Cybern. Part B (Cybernetics) 20(2), 261–269 (1997)Google Scholar
  18. 18.
    Revett, K.: A bioinformatics based approach to behavioural biometrics. In 2007 Frontiers in the Convergence of Bioscience and Information Technologies, pp. 665–670 (2007)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Lovely Professional UniversityJalandharIndia

Personalised recommendations