Abstract
This paper proposes an algorithm to use mouse gestures as an optional login facility which can be integrated into existing systems that require an additional level of security. The aim of this facility is to eliminate the problem of login using the traditional keyboard in public systems by incorporating a real time user signature. The main advantage of this facility is that no additional hardware component or device is required apart from a standard mouse. This implies that this algorithm will make existing systems more secure at no additional cost. This system works by accepting mouse gestures as inputs from the user. The gestures are then interpreted as patterns of mouse motions and are converted to strings based on change of directions. These strings can be further improved in complexity and fed as password to the system authentication module via a pluggable authentication module (PAM).
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Freeman, W.T., Roth, M.: Orientation histograms for hand gesture recognition. In: Intl. Workshop on Automatic Face- and Gesture- Recognition, pp. 296–301. IEEE Computer Society, Zurich (1995)
Hong, P., Turk, M., Huang, T.S.: Gesture Modelling and Recognition Using Finite State Machines. In: Proceedings of the IEEE conference on Face and Gesture Recognition (March 2000)
Lee, H.-K., Kim, J.-H.: A HMM Based threshold model approach for gesture recognition. IEEE Transactions on Pattern Anaylsis and Machine Intelligence 21(10), 961–973 (1999)
Shilbayeh, N.F., Raho, G., Alkhateeb, M.: An efficient Structural Mouse Gesture approach for recognizing Hindi digits. Journal of Applied Sciences (2009)
Erickson, K.: Different methods of interpreting mouse gestures, www.cs.mtu.edu/~rpastel/Research/Code/KyleEricksen/gestures.pdf
Shilbayeh, N.F., Iskadaran, M.Z.: An intelligent multilingual mouse gesture recognistion system. Journal of Computer Science 1(3), 346–350, doi:10.3844/jcssp.2005.346.350
Gafurov, D., Snekkkenes, E.: Arm Swing as a Weak Biometric for Unobtrusive User Authentication. Intelligent Information Hiding and Multimedia Signal Processing, 1080–1087 (2008)
Conklin, A., Dietrich, G., Walz, D.: Password-based authentication: a system perspective. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 10 (2004)
Gandossi, A.J., Liu, W., Tjahyadi, R.: A Biometric Approach to Linux Login Access Control. In: 9th International Conference on Control, Automation, Robotics and Vision, ICARCV 2006, December 5-8 (2006)
Harn, L., Lin, H.-Y.: Integration of user authentication and access control” Computers and Digital Techniques. IEE Proceedings 139(2), 139–144 (1992)
Hofman, P.: Selected Issues of Artificial Intelligence in the Construction of User Interface to a CASE System. MSc Thesis, Wroclaw Uniwersity of Technology (2005)
Newman, W., Lamming, M.: Interactive System Design. Addison-Wesley, Publisher (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banerjee, U., Swaminathan, A. (2011). An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_67
Download citation
DOI: https://doi.org/10.1007/978-3-642-22714-1_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22713-4
Online ISBN: 978-3-642-22714-1
eBook Packages: Computer ScienceComputer Science (R0)