Encyclopedia of Biometrics

Living Edition
| Editors: Stan Z. Li, Anil K. Jain

Pointer-Based Recognition

  • Zahid Syed
  • Sean Banerjee
  • Bojan Cukic
Living reference work entry
DOI: https://doi.org/10.1007/978-3-642-27733-7_9211-2


Behavioralbiometrics; Mousedynamics; Mousedynamics-basedclassification


Pointer-based recognition is a behavioral biometric that analyzes the usage pattern of a computer’s pointing device to verify the identity of an individual. A pointing device is used to move the cursor within the graphical user interface of a computer or another display device. It can also be used to select interface elements or perform actions based on the control elements available. Computer pointing devices have been investigated as a form of behavioral biometric only recently. The advantage of this modality is the widespread applicability, as it only requires the hardware present in most computing systems.

In the literature, the most common examples of pointer-based recognition refer to mouse dynamics. Extensions to touch-sensitive devices lead to touch dynamics. Touch dynamics research is quickly gaining popularity due to the increase in the use of mobile smart devices.

The development of...

This is a preview of subscription content, log in to check access.


  1. 1.
    A.A.E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secur. Comput. 4(3), 165–179 (2007)CrossRefGoogle Scholar
  2. 2.
    C. Bo, L. Zhang, X.-Y. Li, SilentSense: silent user identification via dynamics of touch and movement behavioral biometrics, Cornell University Library [cs.CR], 2013Google Scholar
  3. 3.
    P. Bours, C.J. Fullu, A login system using mouse dynamics, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto (IEEE, 2009), pp. 1072–1077Google Scholar
  4. 4.
    A. De Luca, A. Hang, F. Brudy, C. Lindner, H. Hussmann, Touch me once and I know it’s you: implicit authentication based on touch screen patterns, in Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, Austin. ACM Digital Library, 2012, pp. 987–996Google Scholar
  5. 5.
    M. Frank, R. Biedert, E. Ma, I. Martinovic, D. Song, Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)CrossRefGoogle Scholar
  6. 6.
    H. Gamboa, A. Fred, A behavioral biometric system based on human computer interaction, in Proceedings of the Society of Photo-Optical Instrumentation Engineers (SPIE) Biometric Technology for Human Identification. SPIE Digital Library, 2004, pp. 381–392Google Scholar
  7. 7.
    Z. Jorgensen, T. Yu, On mouse dynamics as a behavioral biometric for authentication, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong. ACM Digital Library, 2011, pp. 476–482Google Scholar
  8. 8.
    C.-C. Lin, C.-C. Chang, D. Liang, A new non-intrusive authentication approach for data protection based on mouse dynamics, in International Symposium on Biometrics and Security Technologies, Taipei (IEEE, 2012), pp. 9–14Google Scholar
  9. 9.
    Y. Nakkabi, I. Traore, A.A.E. Ahmed, Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(6), 1345–1353 (2010)CrossRefGoogle Scholar
  10. 10.
    B. Sayed, I. Traore, I. Woungang, M.S. Obaidat, Biometric authentication using mouse gesture dynamics. IEEE Syst. J. 7(2), 262–274 (2013)CrossRefGoogle Scholar
  11. 11.
    D.A. Schulz, Mouse curve biometrics, in IEEE Biometric Consortium Conference, Baltimore (IEEE, 2006), pp. 1–6Google Scholar
  12. 12.
    C. Shen, Z. Cai, X. Guan, Continuous authentication for mouse dynamics: a pattern-growth approach, in IEEE/IFIP International Conference on Dependable Systems and Networks, Boston (IEEE, 2012), pp. 1–12Google Scholar
  13. 13.
    C. Shen, Z. Cai, R.A. Maxion, G. Xiang, X. Guan, Comparing classification algorithm for mouse dynamics based user identification, in IEEE International Conference on Biometrics: Theory, Application and Systems, Virginia (IEEE, 2012), pp. 61–66Google Scholar
  14. 14.
    Z. Syed, S. Banerjee, Q. Cheng, B. Cukic, Effects of user habituation in keystroke dynamics on password security policy, in IEEE International Symposium on High-Assurance Systems Engineering, Miami (IEEE, 2011), pp. 352–359Google Scholar
  15. 15.
    I. Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, I. Lai, Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments, in IEEE International Conference on Digital Home, Guangzhou (IEEE, 2012), pp. 138–145Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Lane Department of Computer Science and Electrical EngineeringWest Virginia UniversityMorgantown, WVUSA