http://iet.metastore.ingenta.com
1887

Performance evaluation of continuous authentication systems

Performance evaluation of continuous authentication systems

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the authors will describe how performance results for continuous authentication (CA) should be reported. Most research on alleged CA is in fact periodic authentication, and performance is then reported in false match and false non-match rates. Here the authors will describe average number of impostor or genuine actions as the performance indicators, and will describe a more detailed performance reporting method. The authors’ current results have been reported in continuous authentication, based on analysis performed on two different datasets, and compared those results to the best results in comparable research, where they show that their results outperform most other known results.

References

    1. 1)
    2. 2)
      • N. Zheng , A. Paloski , H. Wang .
        2. Zheng, N., Paloski, A., Wang, H.: ‘An efficient user verification system via mouse movements’. 18th ACM Conf. on Computer and Communications Security (CCS‘11), 2011, pp. 139150.
        . 18th ACM Conf. on Computer and Communications Security (CCS‘11) , 139 - 150
    3. 3)
      • C. Shen , Z. Cai , X. Guan .
        3. Shen, C., Cai, Z., Guan, X.: ‘Continuous authentication for mouse dynamics: a pattern-growth approach’. 42nd Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'12), June 2012, pp. 112.
        . 42nd Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'12) , 1 - 12
    4. 4)
    5. 5)
    6. 6)
      • J.V. Monaco , N. Bakelman , S.H. Cha .
        6. Monaco, J.V., Bakelman, N., Cha, S.H., et al: ‘Developing a keystroke biometric system for continual authentication of computer users’. Proc. European Intelligence and Security Informatics Conf. (EISIC), August 2012, pp. 210216.
        . Proc. European Intelligence and Security Informatics Conf. (EISIC) , 210 - 216
    7. 7)
      • A. Messerman , T. Mustafic , S.A. Camtepe .
        7. Messerman, A., Mustafic, T., Camtepe, S.A., et al: ‘Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics’. Int. Joint Conf. on Biometrics (IJCB'11), October 2011, pp. 18.
        . Int. Joint Conf. on Biometrics (IJCB'11) , 1 - 8
    8. 8)
      • P. Ordal , D. Ganzhorn , D.V. Lu .
        8. Ordal, P., Ganzhorn, D., Lu, D.V., et al: ‘Continuous identity verification through keyboard biometrics’, J. Undergrad. Res., 2005, 4, pp. 2024.
        . J. Undergrad. Res. , 20 - 24
    9. 9)
      • P.S. Dowland , S.M. Furnell .
        9. Dowland, P.S., Furnell, S.M.: ‘A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies’. Security and Protection in Information Processing Systems. The Int. Federation for Information Processing, IFIP, Volume 147, 2004, pp. 275289.
        . Security and Protection in Information Processing Systems. The Int. Federation for Information Processing , 275 - 289
    10. 10)
    11. 11)
      • J.L. Wayman , A. Jain , D. Maltoni . (2005)
        11. Wayman, J.L., Jain, A., Maltoni, D., et al (Eds.): ‘Biometric systems: technology, design and performance evaluation’ (Springer, 2005).
        .
    12. 12)
      • B. DeCann , A. Ross .
        12. DeCann, B., Ross, A.: ‘De-duplication errors in a biometric system: an investigative study’. 2013 IEEE Int. Workshop on Information Forensics and Security (WIFS'13), 2013, pp. 4348.
        . 2013 IEEE Int. Workshop on Information Forensics and Security (WIFS'13) , 43 - 48
    13. 13)
      • B. DeCann , A. Ross .
        13. DeCann, B., Ross, A.: ‘‘Has this person been encountered before?’: modeling an anonymous identification system’. 2012 IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW'12), 2012, pp. 8996.
        . 2012 IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW'12) , 89 - 96
    14. 14)
    15. 15)
    16. 16)
    17. 17)
      • P. Bours , H. Barghouthi .
        17. Bours, P., Barghouthi, H.: ‘Continuous authentication using biometric keystroke dynamics’. Norwegian Information Security Conf. (NISK), 2009, pp. 17.
        . Norwegian Information Security Conf. (NISK) , 1 - 7
    18. 18)
      • S. Mondal , P. Bours .
        18. Mondal, S., Bours, P.: ‘Continuous authentication using mouse dynamics’. Int. Conf. of the Biometrics Special Interest Group (BIOSIG'13), September 2013, pp. 112.
        . Int. Conf. of the Biometrics Special Interest Group (BIOSIG'13) , 1 - 12
    19. 19)
      • I.T. Nabney . (2002)
        19. Nabney, I.T.: ‘Netlab: algorithms for pattern recognition. Volume XVIII of advances in computer vision and pattern recognition’ (Springer, London, 2002).
        .
    20. 20)
    21. 21)
    22. 22)
    23. 23)
    24. 24)
      • I. Traore , I. Woungang , M. Obaidat .
        24. Traore, I., Woungang, I., Obaidat, M., et al: ‘Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments’. Fourth Int. Conf. on Digital Home, November 2012, pp. 138145.
        . Fourth Int. Conf. on Digital Home , 138 - 145
    25. 25)
    26. 26)
      • H. Jagadeesan , M. Hsiao .
        26. Jagadeesan, H., Hsiao, M.: ‘A novel approach to design of user re-authentication systems’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, (BTAS'09), September 2009, pp. 16.
        . IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, (BTAS'09) , 1 - 6
    27. 27)
      • S. Acharya , A. Fridman , P. Brennan .
        27. Acharya, S., Fridman, A., Brennan, P., et al: ‘User authentication through biometric sensors and decision fusion’. 47th Annual Conf. on Information Sciences and Systems, March 2013, pp. 16.
        . 47th Annual Conf. on Information Sciences and Systems , 1 - 6
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0070
Loading

Related content

content/journals/10.1049/iet-bmt.2014.0070
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address