Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques

The need to secure sensitive data and computer systems from intruders, while allowing ease of access for authenticate user is one of the main problems in computer security. Traditionally, passwords have been the usual method for controlling access to computer systems but this approach has many inher...

Full description

Saved in:
Bibliographic Details
Published in2010 Second International Conference on Communication Software and Networks pp. 334 - 338
Main Authors Karnan, M., Akila, M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2010
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The need to secure sensitive data and computer systems from intruders, while allowing ease of access for authenticate user is one of the main problems in computer security. Traditionally, passwords have been the usual method for controlling access to computer systems but this approach has many inherent flaws. Keystroke dynamics is a promising biometric technique to recognize an individual based on an analysis of his/her typing patterns. In the experiment, we measure mean, standard deviation and median values of keystroke features such as latency, duration, digraph and their combinations and compare their performance. Particle swarm optimization (PSO), genetic algorithm (GA) and the proposed ant colony optimization (ACO) are used for feature subset selection. Back propagation neural network (BPNN) is used for classification. ACO gives better performance than PSO and GA with regard to feature reduction rate and classification accuracy. Using digraph as the feature for feature subset selection is novel and show good classification performance.
ISBN:1424457262
9781424457267
DOI:10.1109/ICCSN.2010.50