© The Institution of Engineering and Technology
In this study, the authors will describe how performance results for continuous authentication (CA) should be reported. Most research on alleged CA is in fact periodic authentication, and performance is then reported in false match and false non-match rates. Here the authors will describe average number of impostor or genuine actions as the performance indicators, and will describe a more detailed performance reporting method. The authors’ current results have been reported in continuous authentication, based on analysis performed on two different datasets, and compared those results to the best results in comparable research, where they show that their results outperform most other known results.
References
-
-
1)
-
20. Ballabio, D., Vasighi, M.: ‘A Matlab toolbox for self organizing maps and supervised neural network learning strategies’, Chemometr. Intell. Lab. Syst., 2012, 118, pp. 24–32 (doi: 10.1016/j.chemolab.2012.07.005).
-
2)
-
2. Zheng, N., Paloski, A., Wang, H.: ‘An efficient user verification system via mouse movements’. 18th ACM Conf. on Computer and Communications Security (CCS‘11), 2011, pp. 139–150.
-
3)
-
5. Feher, C., Elovici, Y., Moskovitch, R., et al: ‘User identity verification via mouse dynamics’, Inf. Sci., 2012, 201, pp. 19–36 (doi: 10.1016/j.ins.2012.02.066).
-
4)
-
12. DeCann, B., Ross, A.: ‘De-duplication errors in a biometric system: an investigative study’. 2013 IEEE Int. Workshop on Information Forensics and Security (WIFS'13), 2013, pp. 43–48.
-
5)
-
18. Mondal, S., Bours, P.: ‘Continuous authentication using mouse dynamics’. Int. Conf. of the Biometrics Special Interest Group (BIOSIG'13), September 2013, pp. 1–12.
-
6)
-
16. Bergner, R.M.: ‘What is behavior? and so what?’, New Ideas Psychol., 2011, 29, pp. 147–155 (doi: 10.1016/j.newideapsych.2010.08.001).
-
7)
-
3. Shen, C., Cai, Z., Guan, X.: ‘Continuous authentication for mouse dynamics: a pattern-growth approach’. 42nd Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'12), June 2012, pp. 1–12.
-
8)
-
27. Acharya, S., Fridman, A., Brennan, P., et al: ‘User authentication through biometric sensors and decision fusion’. 47th Annual Conf. on Information Sciences and Systems, March 2013, pp. 1–6.
-
9)
-
14. Bolle, R.M., Ratha, N.K., Pankanti, S.: ‘Error analysis of pattern recognition systems the subsets bootstrap’, Comput. Vis. Image Underst., 2004, 93, pp. 1–33 (doi: 10.1016/j.cviu.2003.08.002).
-
10)
-
23. Mondal, S., Bours, P.: ‘A computational approach to the continuous authentication biometric system’, Inf. Sci., 2015, 304, pp. 28–53 (doi: 10.1016/j.ins.2014.12.045).
-
11)
-
22. Araujo, L., Sucupira, L.H.R.J., Lizarraga, M., et al: ‘User authentication through typing biometrics features’, IEEE Trans. Signal Process., 2005, 53, pp. 851–855 (doi: 10.1109/TSP.2004.839903).
-
12)
-
4. Nakkabi, Y., Traoré, I., Ahmed, A.: ‘Improving mouse dynamics biometric performance using variance reduction via extractors with separate features’, IEEE Trans. Syst., Man Cybern. A: Syst. Humans, 2010, 40, pp. 1345–1353 (doi: 10.1109/TSMCA.2010.2052602).
-
13)
-
19. Nabney, I.T.: ‘Netlab: algorithms for pattern recognition. Volume XVIII of advances in computer vision and pattern recognition’ (Springer, London, 2002).
-
14)
-
9. Dowland, P.S., Furnell, S.M.: ‘A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies’. Security and Protection in Information Processing Systems. The Int. Federation for Information Processing, IFIP, Volume 147, 2004, pp. 275–289.
-
15)
-
7. Messerman, A., Mustafic, T., Camtepe, S.A., et al: ‘Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics’. Int. Joint Conf. on Biometrics (IJCB'11), October 2011, pp. 1–8.
-
16)
-
24. Traore, I., Woungang, I., Obaidat, M., et al: ‘Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments’. Fourth Int. Conf. on Digital Home, November 2012, pp. 138–145.
-
17)
-
16. Chang, C.-C., Lin, C.-J.: ‘LIBSVM: a library for support vector machines’, ACM Trans. Intell. Syst. Technol. (TIST), 2011, 2, (3), pp. 1–27 (doi: 10.1145/1961189.1961199).
-
18)
-
25. Bailey, K.O., Okolica, J.S., Peterson, G.L.: ‘User identification and authentication using multi-modal behavioral biometrics’, Comput. Secur., 2014, 43, pp. 77–89 (doi: 10.1016/j.cose.2014.03.005).
-
19)
-
15. Poh, N., Martin, A., Bengio, S.: ‘Performance generalization in biometric authentication using joint user-specific and sample bootstraps’, IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, pp. 492–498 (doi: 10.1109/TPAMI.2007.55).
-
20)
-
11. Wayman, J.L., Jain, A., Maltoni, D., et al (Eds.): ‘Biometric systems: technology, design and performance evaluation’ (Springer, 2005).
-
21)
-
10. Ahmed, A.A., Traore, I.: ‘Biometric recognition based on free-text keystroke dynamics’, IEEE Trans. Cybern., 2014, 44, pp. 458–472 (doi: 10.1109/TCYB.2013.2257745).
-
22)
-
8. Ordal, P., Ganzhorn, D., Lu, D.V., et al: ‘Continuous identity verification through keyboard biometrics’, J. Undergrad. Res., 2005, 4, pp. 20–24.
-
23)
-
6. Monaco, J.V., Bakelman, N., Cha, S.H., et al: ‘Developing a keystroke biometric system for continual authentication of computer users’. Proc. European Intelligence and Security Informatics Conf. (EISIC), August 2012, pp. 210–216.
-
24)
-
1. Bours, P.: ‘Continuous keystroke dynamics: a different perspective towards biometric evaluation’, Inf. Secur. Tech. Rep., 2012, 17, pp. 36–43 (doi: 10.1016/j.istr.2012.02.001).
-
25)
-
17. Bours, P., Barghouthi, H.: ‘Continuous authentication using biometric keystroke dynamics’. Norwegian Information Security Conf. (NISK), 2009, pp. 1–7.
-
26)
-
26. Jagadeesan, H., Hsiao, M.: ‘A novel approach to design of user re-authentication systems’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, (BTAS'09), September 2009, pp. 1–6.
-
27)
-
13. DeCann, B., Ross, A.: ‘‘Has this person been encountered before?’: modeling an anonymous identification system’. 2012 IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW'12), 2012, pp. 89–96.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0070
Related content
content/journals/10.1049/iet-bmt.2014.0070
pub_keyword,iet_inspecKeyword,pub_concept
6
6