Abstract
This chapter presents an overview and classification of security approaches based on computer analysis of human behavior. Overview of different methodologies is followed by an analysis of achieved accuracy rates, required equipment and prospects for future improvements. In particular the following broad categories of behavior-based authentication mechanisms are examined: Behavioral Biometrics (Authorship based, Human–Computer Interaction based, Motor Skill, and Purely Behavioral), Behavioral Passwords (syntactic, semantic, one-time methods and visual memory based), Biosignals (cognitive and semi-controllable biometrics) and Virtual Biometrics (representations of users in virtual worlds).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Angle, S., Bhagtani, R., Chheda, H.: Biometrics: a further echelon of security. In: First UAE International Conference on Biological and Medical Physics (2005)
Dugelay, J.-L., et al.: Recent advances in biometric person authentication. In: IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), Special Session on Biometrics, Orlando, Florida (2002)
Lee, K., Park, H.: A new similarity measure based on intraclass statistics for biometric systems. ETRI J. 25(5), 401–406 (2003)
Cappelli, R., et al.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3–18 (2006)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. In: IEEE Trans. Circuits Syst. Video Technol. (2004)
Bolle, R., et al.: Guide to Biometrics. Springer, Berlin (2003)
Jain, A.K., et al.: Biometrics: a grand challenge. In: International Conference on Pattern Recognition, Cambridge, UK (2004)
Uludag, U., et al.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6) (2004)
Delac, K., Grgic, M.: A survey of biometric recognition methods. In: 46th International Symposium Electronics in Marine, ELMAR-2004, Zadar, Croatia (2004)
Ruggles, T.: Comparison of biometric techniques (2007). Available at: http://www.bio-tech-inc.com/bio.htm
Solayappan, N., Latifi, S.: A survey of unimodal biometric methods. In: Security and Management, Las Vegas, Nevada, USA (2006)
Bioprivacy.org: FAQ. BioPrivacy Initiative (2005). July 22, 2005. Available from: http://www.bioprivacy.org/faqmain.htm
Bromme, A.: A classification of biometric signatures. In: International Conference on Multimedia and Expo (ICME ’03) (2003)
Yampolskiy, R.V.: Human computer interaction based intrusion detection. In: 4th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, Nevada, USA (2007)
Bioprivacy.org. FAQ’s and Definitions. International Biometric Group, LLC (2005). October 2, 2005. Available from: http://www.bioprivacy.org/bioprivacy_text.htm
Yampolskiy, R.V.: Indirect human–computer interaction-based biometrics for intrusion detection systems. In: The 41st Annual IEEE International Carnahan Conference on Security Technology (ICCST 2007), Ottawa, Canada (2007)
Denning, D.E.: An intrusion-detection model. In: IEEE Transactions on Software Engineering (1987)
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. In: Software Engineering (1995)
Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior proles for intrusion detection. In: First USENIX Workshop on Intrusion Detection and Network Monitoring (1999)
Apap, F., et al.: Detecting malicious software by monitoring anomalous windows registry accesses. In: Fifth International Symposium on Recent Advances in Intrusion Detection, pp. 16–18 (2002)
Pennington, A.G., et al.: Storage-based intrusion detection: Watching storage activity for suspicious behavior. Carnegie Mellon University (2002)
Feng, H.H., et al.: Anomaly detection using call stack information. In: Proceedings of IEEE Symposium on Security and Privacy (2003)
Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: VizSEC/DMSEC ’04: Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security. ACM, Washington (2004)
Garg, A., et al.: Profiling users in GUI based systems for masquerade detection. In: The 7th IEEE Information Assurance Workshop (IAWorkshop 2006), West Point, New York, USA (2006)
Yampolskiy, R.V.: Motor-skill based biometrics. In: Dhillon, G. (ed.) Assuring Business Processes, Proceedings of the 6th Annual Security Conference. Global Publishing, Las Vegas (2007)
Caslon.com.au: Caslon-Analytics. October 2, 2005. Available from: http://www.caslon.com.au/biometricsnote8.htm
Jain, A.K., Bolle, R., Pankanti, S.: BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic, Dordrecht (1999)
Adler, A., Youmaran, R., Loyka, S.: Towards a measure of biometric information (2006). Available at: http://www.sce.carleton.ca/faculty/adler/publications/2006/youmaran-ccece2006-biometric-entropy.pdf
Koychev, I., Schwab, I.: Adaptation to drifting user’s interests. In: Proceedings of ECML2000 Workshop: Machine Learning in New Information Age, Barcelona, Spain (2000)
Tsymbal, A.: The problem of concept drift: definitions and related work. Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland (2004)
Schuckers, S.A.C.: Spoofing and anti-spoofing measures. Information Security Technical Report (2002)
Yampolskiy, R.V., Govindaraju, V.: Behavioral biometrics: a survey and classification. Int. J. Biom. 1(1), 81–113 (2008)
Oursler, J.N., Price, M., Yampolskiy, R.V.: Parameterized generation of Avatar face dataset. In: 14th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games, Louisville, KY (2009)
Yampolskiy, R., Gavrilova, M.: Applying biometric principles to avatar recognition. In: International Conference on Cyberworlds (CW2010), Singapore, October 20–22 (2010)
Ajinal, S., Yampolskiy, R.V., Amara, N.E.B.: Authentification de Visages D’Avatar. In: Confere 2010 Symposium, Sousse, Tunisia, July 1–2 (2010)
Yampolskiy, R.V., Govindaraju, V.: Behavioral biometrics for verification and recognition of malicious software agents. In: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII. SPIE Defense and Security Symposium, Orlando, Florida, March 16–20 (2008)
D’Souza, D., Yampolskiy, R.V.: Avatar face detection analysis using an extended set of Haar-like features. In: Kentucky Academy of Science, Annual Meeting, Bowling Green, Kentucky, November 12–13 (2010)
Lyons, M., et al.: Avatar creation using automatic face recognition. In: ACM Multimedia 98, Bristol, England, Sept. 1998, pp. 427–434 (1998)
Yanushkevich, S., et al.: Image Pattern Recognition: Synthesis and Analysis in Biometrics. Machine Perception and Artificial Intelligence, vol. 67. World Scientific, Singapore (2007)
Brömme, A., Al-Zubi, S.: Multifactor biometric sketch authentication. In: BIOSIG, Darmstadt, Germany (2003)
Al-Zubi, S., Brömme, A., Tönnies, K.: Using an active shape structural model for biometric sketch recognition. In: DAGM, Magdeburg, Germany (2003)
Renaud, K.: Quantifying the quality of web authentication mechanisms. A usability perspective. J. Web Eng. (2003). Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf
Westeyn, T., et al.: Biometric identification using song-based eye blink patterns. In: Human Computer Interaction International (HCII), Las Vegas, NV (2005)
Westeyn, T., Starner, T.: Recognizing song-based blink patterns: applications for restricted and universal access. In: Sixth IEEE International Conference on Automatic Face and Gesture Recognition (2004)
Hilas, C., Sahalos, J.: User profiling for fraud detection in telecommunication networks. In: 5th International Conference on Technology and Automation (ICTA 2005), Thessaloniki, Greece (2005)
Grosser, H., Britos, H., GarcĂa-MartĂnez, R.: Detecting Fraud in Mobile Telephony Using Neural Networks. Lecture Notes in Artificial Intelligence. Springer, Berlin (2005)
Fawcett, T., Provost, F.: Adaptive fraud detection. In: Data Mining and Knowledge Discovery. Kluwer Academic, Dordrecht (1997)
Erzin, E., et al.: Multimodal person recognition for human-vehicle interaction. In: IEEE MultiMedia (April 2006)
Liu, A., Salvucci, D.: Modeling and prediction of human driver behavior. In: 9th HCI International Conference, New Orleans, LA (2001)
Oliver, N., Pentland, A.P.: Graphical models for driver behavior recognition in a SmartCar. In: Proceedings of the IEEE Intelligent Vehicles Symposium (2000)
Kuge, N., Yamamura, T., Shimoyama, O.: A driver behavior recognition method based on driver model framework. In: Society of Automotive Engineers Publication (1998)
Porwik, P., et al.: Biometric recognition system based on the motion of the human body gravity centre analysis. J. Med. Inform. Technol. 15 (2010)
Schonlau, M., et al.: Computer intrusion: detecting masquerades. Stat. Sci. 16(1), 1–17 (2001)
Maxion, R.A., Townsend, T.N.: Masquerade detection using truncated command lines. In: International Conference on Dependable Systems and Networks (DNS-02). IEEE Comput. Soc., Los Alamitos (2002)
Dao, V., Vemuri, V.: Profiling users in the UNIX OS environment. In: International ICSC Conference on Intelligent Systems and Applications, University of Wollongong, Australia (2000)
Brause, R., Langsdorf, T., Hepp, M.: Neural data mining for credit card fraud detection. In: Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence (1999)
Pamudurthy, S., et al.: Dynamic approach for face recognition using digital image skin correlation. In: Audio- and Video-based Biometric Person Authentication (AVBPA), New York (2005)
Mainguet, J.-F.: Biometrics (2006). Available at: http://perso.orange.fr/fingerchip/biometrics/biometrics.htm
Ito, A., et al.: Smile and laughter recognition using speech processing and face recognition from conversation video. In: Proceedings of the International Conference on Cyberworlds (2005)
Tsai, P., Hintz, T., Jan, T.: Facial behavior as behavior biometric? An empirical study. In: IEEE International Conference on Systems, Man and Cybernetics, Montreal, Quebec, October 7–10, pp. 3917–3922 (2007)
Benedikt, L., et al.: Assessing the uniqueness and permanence of facial actions for use in biometric applications. IEEE Trans. Syst. Man Cybern., Part A, Syst. Hum. 40(3), 449–460 (2010)
Stolfo, S.J., et al.: A behavior-based approach to securing email systems. In: Mathematical Methods, Models and Architectures for Computer Networks Security. LNCS, vol. 2776, pp. 57–81 (2003)
Stolfo, S.J., et al.: Combining behavior models to secure email systems. CU Tech Report (2003). Available at: www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf
Vel, O.D., et al.: Mining email content for author identification forensics. SIGMOD Rec. 30(4), 55–64 (2001). Special Section on Data Mining for Intrusion Detection and Threat Analysis
Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: 6th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, January 10–13, pp. 1–2 (2009)
Qian, G., Zhang, J., Kidane, A.: People identification using gait via floor pressure analysis IEEE Sens. J. 10(9), 1447–1460 (2010)
Addlesee, M., et al.: The ORL active floor. IEEE Pers. Commun. 35–41 (1997)
Jung, J., et al.: Dynamic-footprint based person identification using mat-type pressure sensor. In: International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2937–2940 (2003)
Pirttikangas, S., et al.: Footstep identification from pressure signals using hidden Markov models. In: Finnish Signal Processing Symposium, pp. 124–128 (2003)
Middleton, L., et al.: A floor sensor system for gait recognition. In: IEEE Workshop on Automatic Identification Advanced Technologies, pp. 171–176 (2005)
Yun, J., et al.: The user identification system using walking pattern over the ubiFloor. In: International Conference on Control, Automation, and Systems, pp. 1046–1050 (2003)
Orr, R.J., Abowd, G.D.: The smart floor: a mechanism for natural user identification and tracking. In: Conference on Human Factors in Computing Systems, pp. 275–276 (2000)
Yoon, J., Ryu, J., Woo, W.: User identification using user’s walking pattern over the ubiFloorII. In: International Conference on Computational Intelligence and Security, pp. 949–956 (2005)
Suutala, J., Röning, J.: Methods for person identification on a pressure-sensitive floor: Experiments with multiple classifiers and reject option. Inf. Fusion 9(1), 21–40 (2008)
Maeder, A.J., Fookes, C.B.: A visual attention approach to personal identification. In: Eighth Australian and New Zealand Intelligent Information Systems Conference, December 10–12 (2003)
Maeder, A.J., Fookes, C.B., Sridharan, S.: Gaze based user authentication for personal computer applications. In: International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, China, October 20–22 (2004)
Kale, A., et al.: Identification of humans using gait. IEEE Trans. Image Proc. 13(9) (2004)
BenAbdelkader, C., Cutler, R., Davis, L.: Person identification using automatic height and stride estimation. In: IEEE International Conference on Pattern Recognition (2002)
Nixon, M.S., Carter, J.N.: On gait as a biometric: progress and prospects. In: EUSIPCO, Vienna (2004)
Kalyanaraman, S.: Biometric authentication systems. AÂ report. 2006. Available at: http://netlab.cs.iitm.ernet.in/cs650/2006/TermPapers/sriramk.pdf
Yampolskiy, R.V.: Behavior based identification of network intruders. In: 19th Annual CSE Graduate Conference (Grad-Conf2006), Buffalo, NY (2006)
Yampolskiy, R.V., Govindaraju, V.: Use of behavioral biometrics in intrusion detection and online gaming. In: Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, Florida (2006)
Yampolskiy, R.V., Govindaraju, V.: Dissimilarity functions for behavior-based biometrics. In: Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, Florida (2007)
poker-edge.com: Stats and analysis (2006). June 7, 2006. Available from: http://www.poker-edge.com/stats.php
Ramon, J., Jacobs, N.: Opponent modeling by analysing play. In: Proceedings of the Computers and Games workshop on Agents in Computer Games, Edmonton, Alberta, Canada (2002)
Jansen, A.R., Dowe, D.L., Farr, G.E.: Inductive inference of chess player strategy. In: Proceedings of the 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI’2000) (2000)
Kauffman, J.A., et al.: Grip-pattern recognition for smart guns. In: 14th Annual Workshop on Circuits, Systems and Signal Processing (ProRISC), Veldhoven, The Netherlands (2003)
Veldhuis, R.N.J., et al.: Biometric verification based on grip-pattern recognition. In: Security, Steganography, and Watermarking of Multimedia Contents (2004)
Orozco, M., et al.: Automatic identification of participants in haptic systems. In: IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada (2005)
Orozco, M., et al.: Haptic-based biometrics: a feasibility study. In: IEEE Virtual Reality Conference, Alexandria, Virginia, USA (2006)
Trujillo, M.O., Shakra, I., Saddik, A.E.: Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns. In: MULTIMEDIA ’05: Proceedings of the 13th Annual ACM International Conference on Multimedia, Hilton, Singapore. ACM, New York (2005)
Stoica, A.: Towards recognition of humans and their behaviors from space and airborne platforms: extracting the information in the dynamics of human shadows. In: Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS ’08), Edinburgh, August 4–6, pp. 125–128 (2008)
Iwashita, Y., Stoica, A., Kurazume, R.: Person identification using shadow analysis. In: British Machine Vision Conference, September, pp. 35.1–35.10 (2010)
Ilonen, J.: Keystroke dynamics (2006). Available at: www.it.lut.fi/kurssit/03-04/010970000/seminars/Ilonen.pdf
Bella, S.D., Palmer, C.: Personal identifiers in musicians’ finger movement dynamics. J. Cogn. Neurosci. 18 (2006)
Gamboa, H., Fred, A.L.N., Jain, A.K.: Webbiometrics: User verification via web interaction. In: Biometrics Symposium, Baltimore, MD, September 11–13, pp. 1–6 (2007).
Shipilova, O.: Person recognition based on lip movements (2006). Available at: http://www.it.lut.fi/kurssit/03-04/010970000/seminars/Shipilova.pdf
Broun, C.C., et al.: Automatic speechreading with applications to speaker verification. In: Eurasip Journal on Applied Signal Processing, Special Issue on Joint Audio-Visual Speech Processing (2002)
Luettin, J., Thacker, N.A., Beet, S.W.: Speaker identification by lipreading. In: Proceedings of the 4th International Conference on Spoken Language Processing (ICSLP’96) (1996)
Wark, T., Thambiratnam, D., Sridharan, S.: Person authentication using lip information. In: Proceedings of IEEE 10th Annual Conference. Speech and Image Technologies for Computing and Telecommunications (1997)
Mason, J.S.D., et al.: Lip signatures for automatic person recognition. In: IEEE Workshop, MMSP (1999)
Jourlin, P., et al.: Acoustic-labial speaker verification. In: Pattern Recognition Letters (1997)
Mok, L., et al.: Person authentication using ASM based lip shape and intensity information. In: International Conference on Image Processing (2004)
Ahmed, A.A.E., Traore, I.: Detecting computer intrusions using behavioral biometrics. In: Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada (2005)
Ahmed, A.A.E., Traore, I.: Anomaly intrusion detection based on biometrics. In: Workshop on Information Assurance, United States Military Academy, West Point, NY (2005)
Gamboa, H., Fred, V.-A.: A behavioral biometric system based on human–computer interaction. In: Proceedings of SPIE (2004)
Gamboa, H., Fred, A.: An identity authentication system based on human–computer interaction behaviour. In: Proc. of the 3rd Intl. Workshop on Pattern Recognition in Information Systems (2003)
Nishiuchi, N., Komatsu, S., Yamanaka, K.: A biometric identification using the motion of fingers. In: International Conference on Biometrics and Kansei Engineering, Cieszyn, Poland, June 25–28, pp. 22–27 (2009)
Lyu, S., Rockmore, D., Farid, H.: A digital technique for art authentication. In: Proceedings of the National Academy of Sciences (2004)
Spafford, E.H., Weeber, S.A.: Software forensics: can we track code to its authors? In: 15th National Computer Security Conference (1992)
Jain, A., Griess, F., Connell, S.: On-line signature verification. Pattern Recognit. 35, 2963–2972 (2002)
Nalwa, V.S.: Automatic on-line signature verification. Proc. IEEE 85, 215–239 (1997)
Herbst, B., Coetzer, H.: On an offline signature verification system. In: Proceedings of the 9th Annual South African Workshop on Pattern Recognition (1998)
Lei, H., Palla, S., Govindaraju, V.: ER2: an intuitive similarity measure for on-line signature verification. In: IWFHR ’04: Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition (IWFHR’04). IEEE Comput. Soc., Los Alamitos (2004)
Riha, Z., Matyas, V.: Biometric authentication systems. In: FI MU Report Series (2000)
Muralidharan, N., Wunnava, S.: Signature verification: a popular biometric technology. In: Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI’2004), Miami, Florida, USA (2004)
Plamondon, R., Lorette, G.: Automatic signature verification and writer identification: the state of the art. Pattern Recognit. 22(2), 107–131 (1989)
Ballard, L., Monrose, F., Lopresti, D.P.: Biometric authentication revisited: understanding the impact of wolves in sheep’s clothing. In: Fifteenth USENIX Security Symposium, Vancouver, BC, Canada (2006)
Ramann, F., Vielhauer, C., Steinmetz, R.: Biometric applications based on handwriting. In: IEEE International Conference on Multimedia and Expo (ICME ’02) (2002)
Ballard, L., Lopresti, D., Monrose, F.: Evaluating the security of handwriting biometrics. In: The 10th International Workshop on Frontiers in Handwriting Recognition (IWFHR06), La Baule, France (2006)
Zhu, Y., Tan, T., Wang, Y.: Biometric personal identification based on handwriting. In: 15th International Conference on Pattern Recognition (ICPR’00) (2000)
Hamdy, O., Traoré, I.: Cognitive-based biometrics system for static user authentication. In: Fourth International Conference on Internet Monitoring and Protection, Venice/Mestre, Italy, May 24–28, pp. 90–97 (2009)
Hamdy, O., Traoré, I.: New physiological biometrics based on human cognitive factors. In: International Conference on Complex, Intelligent and Software Intensive Systems, Fukuoka, Japan, March 16–19, pp. 910–917 (2009)
Jain, A.K., Dass, S.C., Nandakumar, K.: Can soft biometric traits assist user recognition. In: SPIE Defense and Security Symposium, Orlando, FL (2004)
Jain, A.K., Dass, S.C., Nandakumar, K.: Soft biometric traits for personal recognition systems. In: International Conference on Biometric Authentication (ICBA), Hong Kong (2004)
Jacob, B.A., Levitt, S.D.: To catch a cheat. In: Education Next. Available at: www.educationnext.org (2004)
Henderson, N.Y., et al.: Polymer thick-film sensors: possibilities for smartcard biometrics. In: Proceedings of Sensors and Their Applications XI (2001)
Henderson, N.J., et al.: Sensing pressure for authentication. In: 3rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium (2002)
Halteren, H.V.: Linguistic profiling for author recognition and verification. In: Proceedings of ACL-2004 (2004)
Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Automatic authorship attribution. In: Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway (1999)
Juola, P., Sofko, J.: Proving and improving authorship attribution. In: Proceedings of CaSTA-04. The Face of Text (2004)
Koppel, M., Schler, J.: Authorship verification as a one-class classification problem. In: 21st International Conference on Machine Learning, Banff, Canada (2004)
Koppel, M., Schler, J., Mughaz, D.: Text categorization for authorship verification. In: Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, Florida (2004)
Ciota, Z.: Speaker verification for multimedia application. In: IEEE International Conference on Systems, Man and Cybernetics (2004)
Sanderson, C., Paliwal, K.K.: Information fusion for robust speaker verification. In: Proc. 7th European Conference on Speech Communication and Technology (EUROSPEECH’01), Aalborg (2001)
Campbell, J.P.: Speaker recognition: a tutorial. Proc. IEEE 85(9), 1437–1462 (1997)
Ratha, N.K., Senior, A., Bolle, R.M.: Automated biometrics. In: International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil (2001)
Deshpande, S., Chikkerur, S., Govindaraju, V.: Accent classification in speech. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (2005)
Lin, X., Simske, S.: Phoneme-less hierarchical accent classification. In: Thirty-Eighth Asilomar Conference on Signals, Systems and Computers (2004)
Tsai, W.-H., Wang, H.-M.: Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. IEEE Trans. Audio Speech Lang. Process. 14(1), 330–341 (2006)
Revett, K.: Behavioral Biometrics: A Remote Access Approach. Wiley, Chichester (2008)
Marcel, S., Millan, J.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743–752 (2007)
Thorpe, J., Oorschot, P.C.V., Somayaji, A.: Pass-thoughts: authenticating with our minds. In: Workshop on New Security Paradigms, Lake Arrowhead, California (2011)
Lawson, W.: The new wave (“Biometric access & neural control”) (2002). November 24, 2008. Available from: http://www.icdri.org/biometrics/new_wave.htm
Mohammadi, G., et al.: Person identification by using AR model for EEG signals. In: World Academy of Science, Engineering and Technology (2006)
Gahi, Y., et al.: In: New Technologies, Mobility and Security (NTMS’08), Tangier, Virginia, November 5–7, pp. 1–5 (2008)
Shye, A., et al.: Power to the people: leveraging human physiological traits to control microprocessor frequency. In: 41st IEEE/ACM International Symposium on Microarchitecture, Como, Italy, November 8–12 (2008)
Korotkaya, Z.: Biometrics person authentication: odor (2003). October 12, 2008. Available from: http://www.it.lut.fi/kurssit/03-04/010970000/seminars/Korotkaya.pdf
Beritelli, F., Serrano, S.: Biometric identification based on frequency analysis of cardiac sounds. IEEE Trans. Inf. Forensics Secur. 2(3), 596–604 (2007)
Phua, K., et al.: Human identification using heart sound. In: Second International Workshop on Multimodal User Authentication, Toulouse, France (2006)
Preez, J., Soms, S.H.: Person identification and authentication by using “the way the heart beats”. In: ISSA 2005 New Knowledge Today Conference, Sandton, South Africa (2005)
Scotti, S., et al.: Quantitative evaluation of distant student psychophysical responses during the e-learning processes. In: 27th IEEE Annual Conference on Engineering in Medicine and Biology, Shanghai, China, September 1–4 (2005)
Yampolskiy, R.V.: Action based user authentication. Int. J. Electron. Secur. Digit. Forensics 1(3), 281–300 (2008)
Bekkering, E., Warkentin, M., Davis, K.: A longitudinal comparison of four password procedures. In: Proceedings of the Hawaii International Conference on Business, Honolulu, HI, June (2003)
Podd, J., Bunnell, J., Henderson, R.: Cost-effective computer security: cognitive and associative passwords. In: Sixth Australian Conference on Computer-Human Interaction, Hamilton, New Zealand, November 24–27, pp. 304–305 (1996)
Brostoff, A.: Improving password system effectivness. PhD Dissertation, Department of Computer Science University College London, September 30, 2004
Brostoff, A.: The science behind passfaces. In: Real User Corporation, June 2004. Available at: http://www.realuser.com/
Dhamija, R., Perrig, A.: Deja vu: a user study. Using images for authentication. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, August (2000)
Angeli, A.D., et al.: Usability and user authentication: Pictorial passwords vs. PIN. In: Contemporary Ergonomics, pp. 253–258. Taylor & Francis, London (2003)
Jansen, W., et al.: Picture password: a visual login technique for mobile devices. Retrieved October 24, 2005. Available at: http://csrc.nist.gov/publications/nistir/nistir-7030.pdf
Pointsec. PicturePINs. November, 2002. Available at: http://www.pointsec.com/news/download/Pointsec_PPC_2.0_POP_PA1.pdf
Gibson, M., et al.: Musipass: authenticating me softly with my song. In: New Security Paradigms Workshop (NSPW’09), Oxford, UK, September 8–11 (2009)
Wiedenbeck, S., et al.: Authentication using graphical passwords: basic results. Retrieved October 23, 2005. Available at: http://clam.rutgers.edu/~birget/grPssw/susan3.pdf
Wiedenbeck, S., et al.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Human-Comput. Stud. 63(1–2) (2005)
Blonder, G.E.: Graphical passwords. United States Patent 5559961 (1996)
Varenhorst, C.: Passdoodles; a lightweight authentication method. July 27, 2004. Available at: http://people.csail.mit.edu/emax/papers/varenhorst.pdf
Jermyn, I., et al.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23–36 (1999)
Thorpe, J., v. Oorschot, P.: Towards secure design choices for implementing graphical passwords. In: 20th Annual Computer Security Applications Conference, Tucson, Arizona, December 6–10 (2004)
Ross, S.: Is it just my imagination? Retrieved November 4, 2005. Available at: http://research.microsoft.com/displayArticle.aspx?id=417
Renaud, K., McBryan, T.: How viable are Stubblefield and Simon’s inkblots as password cues? In: PUMP 2010, University of Abertay, Dundee, 6 September (2010)
Renaud, K., McBryan, T., Siebert, P.: Password cueing with cue(ink)blots. In: IADIS Computer Graphics and Visualization 2008 (CGV 2008), Amsterdam, The Netherlands (2008)
Stubblefield, A., Simon, D.: Inkblot authentication. Microsoft TechReport# MSR-TR-2004-85 (August 2004). Available at: http://research.microsoft.com/pubs/70086/tr-2004-85.pdf
Porter, S.: Stronger passwords through visual authentication: handwing. University of Glasgow. Retrieved November 4, 2005. Available at: http://www.dcs.gla.ac.uk/~porters/thesis.pdf
Standring, S.: Gray’s Anatomy: The Anatomical Basis of Medicine and Surgery. Churchill Livingstone, Oxford (2004)
Erdogan, H., et al.: Multi-modal person recognition for vehicular applications. Lect. Notes Comput. Sci. 3541, 366–375 (2005)
Marin, J., Ragsdale, D., Surdu, J.: A hybrid approach to the profile creation and intrusion detection. In: DARPA Information Survivability Conference and Exposition (DISCEX II’01) (2001)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)
Frantzeskou, G., Gritzalis, S., MacDonell, S.: Source code authorship analysis for supporting the cybercrime investigation process. In: 1st International Conference on eBusiness and Telecommunication Networks—Security and Reliability in Information Systems and Networks Track, Setubal, Portugal. Kluwer Academic, Dordrecht (2004)
Colombi, J., et al.: Cohort selection and word grammer effects for speaker recognition. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA (1996)
Tsai, W.-H., Wang, H.-M.: Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. In: IEEE Transactions on Audio, Speech and Language Processing, January 2006
Crompton, M.: Biometrics and privacy: the end of the world as we know it or the white knight of privacy? In: 1st Biometrics Institute Conference (2003)
Prassas, G., Pramataris, K.C., Papaemmanouil, O.: Dynamic recommendations in internet retailing. In: 9th European Conference on Information Systems (ECIS 2001) (2001)
Liang, T.P., Lai, H.-J.: Discovering user interests from web browsing behavior. In: Proceedings of the Hawaii International Conference on Systems Sciences, Hawaii, USA (2002)
Fu, Y., Shih, M.: A framework for personal web usage mining. In: International Conference on Internet Computing (IC’2002), Las Vegas, NV (2002)
Goecks, J., Shavlik, J.: Learning users’ interests by unobtrusively observing their normal behavior. In: Proceedings of the International Conference on Intelligent User Interfaces, New Orleans, LA (2000)
Democraticmedia.org: TV that watches you: the prying eyes of interactive television. A report by the center for digital democracy, June 2001. Available from: www.democraticmedia.org/privacyreport.pdf
Jain, K., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. In: Pattern Recognition (2005)
Dahel, S.K., Xiao, Q.: Accuracy performance analysis of multimodal biometrics. In: IEEE Information Assurance Workshop on Systems, Man and Cybernetics Society (2003)
Humm, A., Hennebert, J., Ingold, R.: Scenario and survey of combined handwriting and speech modalities for user authentication. In: 6th International Conference on Recent Advances in Soft Computing (RASC’06), Canterbury, UK (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Yampolskiy, R.V. (2011). Behavioral, Cognitive and Virtual Biometrics. In: Salah, A., Gevers, T. (eds) Computer Analysis of Human Behavior. Springer, London. https://doi.org/10.1007/978-0-85729-994-9_13
Download citation
DOI: https://doi.org/10.1007/978-0-85729-994-9_13
Publisher Name: Springer, London
Print ISBN: 978-0-85729-993-2
Online ISBN: 978-0-85729-994-9
eBook Packages: Computer ScienceComputer Science (R0)