Behavioralbiometrics; Mousedynamics; Mousedynamics-basedclassification
Pointer-based recognition is a behavioral biometric that analyzes the usage pattern of a computer’s pointing device to verify the identity of an individual. A pointing device is used to move the cursor within the graphical user interface of a computer or another display device. It can also be used to select interface elements or perform actions based on the control elements available. Computer pointing devices have been investigated as a form of behavioral biometric only recently. The advantage of this modality is the widespread applicability, as it only requires the hardware present in most computing systems.
In the literature, the most common examples of pointer-based recognition refer to mouse dynamics. Extensions to touch-sensitive devices lead to touch dynamics. Touch dynamics research is quickly gaining popularity due to the increase in the use of mobile smart devices.
The development of...
- 2.C. Bo, L. Zhang, X.-Y. Li, SilentSense: silent user identification via dynamics of touch and movement behavioral biometrics, Cornell University Library [cs.CR], 2013Google Scholar
- 3.P. Bours, C.J. Fullu, A login system using mouse dynamics, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto (IEEE, 2009), pp. 1072–1077Google Scholar
- 4.A. De Luca, A. Hang, F. Brudy, C. Lindner, H. Hussmann, Touch me once and I know it’s you: implicit authentication based on touch screen patterns, in Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, Austin. ACM Digital Library, 2012, pp. 987–996Google Scholar
- 6.H. Gamboa, A. Fred, A behavioral biometric system based on human computer interaction, in Proceedings of the Society of Photo-Optical Instrumentation Engineers (SPIE) Biometric Technology for Human Identification. SPIE Digital Library, 2004, pp. 381–392Google Scholar
- 7.Z. Jorgensen, T. Yu, On mouse dynamics as a behavioral biometric for authentication, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong. ACM Digital Library, 2011, pp. 476–482Google Scholar
- 8.C.-C. Lin, C.-C. Chang, D. Liang, A new non-intrusive authentication approach for data protection based on mouse dynamics, in International Symposium on Biometrics and Security Technologies, Taipei (IEEE, 2012), pp. 9–14Google Scholar
- 11.D.A. Schulz, Mouse curve biometrics, in IEEE Biometric Consortium Conference, Baltimore (IEEE, 2006), pp. 1–6Google Scholar
- 12.C. Shen, Z. Cai, X. Guan, Continuous authentication for mouse dynamics: a pattern-growth approach, in IEEE/IFIP International Conference on Dependable Systems and Networks, Boston (IEEE, 2012), pp. 1–12Google Scholar
- 13.C. Shen, Z. Cai, R.A. Maxion, G. Xiang, X. Guan, Comparing classification algorithm for mouse dynamics based user identification, in IEEE International Conference on Biometrics: Theory, Application and Systems, Virginia (IEEE, 2012), pp. 61–66Google Scholar
- 14.Z. Syed, S. Banerjee, Q. Cheng, B. Cukic, Effects of user habituation in keystroke dynamics on password security policy, in IEEE International Symposium on High-Assurance Systems Engineering, Miami (IEEE, 2011), pp. 352–359Google Scholar
- 15.I. Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, I. Lai, Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments, in IEEE International Conference on Digital Home, Guangzhou (IEEE, 2012), pp. 138–145Google Scholar