Applying Keystroke Dynamics for Personal Authentication

With the establishment of the information society, security had become the greatest concern for Institutions transacting business over the Internet. Home banking and on-line brokerage applications currently, use basic software-only security functions for the internet such as server authentications and Secure Sockets layer. Higher levels of protections are being achieved with Smart card based authentication schemes and transaction protocols. Password based security identifies users based on what they know – the password or PIN, which can be guessed, hacked, found or stolen. Smart Cards, tokens and badges identify users based on what they have which can also be lost, loaned or stolen.The objective of the thesis was to design and implement a biometric authentication scheme by means of keystroke dynamics to secure web applications. The scheme illustrates the effect of the template size and the number of biometric features used to improve performance of FAR, FRR and EER…

Contents

INTRODUCTION TO BIOMETRICS
1.1 WHAT IS BIOMETRICS
1.2 BIOMETRIC AUTHENTICATION / IDENTIFICATION TECHNIQUES
1.2.1 Biometric Identification
1.2.2 Biometric Authentication
1.2.3 Limitations of Identification and Authentication
1.3 GENERAL DESCRIPTION OF BIOMETRIC TECHNOLOGIES
1.3.1 Fingerprints
1.3.2 Hand Geometry
1.3.3 Face recognition
1.3.4 Voice recognition
1.3.5 Retina scanning
1.3.6 Iris scanning
1.3.7 Hand Signature
1.3.8 Keystroke Dynamics
1.3.9 Multimodal Biometric Systems
DEFINITIONS
2.1 PERFORMANCE CRITERION
2.1.1 Environment
2.1.2 Population
2.1.3 Device
2.2 STATISTICAL TOOLS
2.2.1 Notation
2.2.2 Features
2.2.3 Target String
2.2.4 Amount of Samples
2.2.5 Filtering Factor
2.2.6 Matching Error Rates
2.2.7 General and Impostor Distribution
2.2.8 Decision Error Rates
SYSTEM CONCEPTUAL MODEL
3.1 ENROLMENT MODULE
3.1.1 Pre-Processor module
3.2 LOGIN MODULE
3.2.1 Classifier Module
3.2.2 Adaptation Module
3.2.3 Survey Module
SYSTEM DESIGN AND IMPLEMENTATION
4.1 SYSTEM ARCHITECTURE
4.1.1 Web Clients and Server Authentication
4.1.2 Software Development
4.1.3 Off-line Login Module
SCENARIO TESTING AND MEASUREMENTS
5.1 PLANNING
5.1.1 On-line Mode
5.1.2 Off-line Mode
5.2 SCENARIO EVALUATION
5.2.1 Evaluation on Choice of Character String
5.2.2 Impostor and Legitimate User
5.2.3 FAR and FRR
CONCLUSION
APPENDIX
REFERENCES

Author: George Kofi Gagbla

Source: Blekinge Institute of Technology

Download URL 2: Visit Now

Leave a Comment