USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION
#5

Keystroke authentication is a new access control system to identify legitimate users via their typing behavior. Here, the machine learning techniques have been adapted for the purpose of authentication. The differnt keystroke patterns of the user are created using seven different models and is used to differentiate between the users. Decision Tree, Naive Bayesian, Instance Based Learning, Decision Table, One Rule, Random Tree and K-star etc are the learning methods used for this purpose.
access request, information extraction and authenticating are the three processes involved in the authenticating of a user. The dominant form of authentication nowadays is the Textual based authentication system. But this is a weak system with a high risk of information leak. The Biometric authentication systems is expected to have a better scalability. “physiological biometric” and “behavioral biometrics" are the two different types of biometric technologies used, of which the behavioral biometrics is more flexible. The typical behavioral biometric characteristics include the voice tune and typing pattern.
The authentication using the typing pattern detection is based on the fact that individuals type in a characteristic way on a keyboard.

For more details see:
http://wasetjournals/ijmcs/v1/v1-3-27.pdf
http://bibliotecadigital.sbc.org.br/down...?paper=319
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dtmf based typing r, user authentication through typing biometrics features source code, pattern recognition conference, modular verification of security protocol code by typing, a typing game final year project, biosafety in ipr**eliance trends ppt, gujrat scincne far,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION - by summer project pal - 21-01-2011, 12:28 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,487 06-10-2016, 10:27 AM
Last Post: ijasti
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 83,670 03-04-2014, 11:39 PM
Last Post: seminar report asees
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,439 22-07-2013, 11:44 AM
Last Post: computer topic
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  FACE RECOGNITION USING NEURAL NETWORKS (Download Seminar Report) Computer Science Clay 70 32,993 01-02-2013, 09:28 PM
Last Post: Guest
  FACE RECOGNITION TECHNOLOGY A SEMINAR REPORT Computer Science Clay 25 36,166 14-01-2013, 01:07 PM
Last Post: seminar details
  Iris Recognition Prototype project report helper 1 1,349 22-11-2012, 12:03 PM
Last Post: seminar details
  A Hand Gesture Recognition System Based on Local Linear Embedding seminar class 1 4,343 22-11-2012, 12:00 PM
Last Post: seminar details
  DNA BASED EMPLOYEE RECOGNITION full report project topics 1 2,790 15-11-2012, 12:17 PM
Last Post: seminar details
  An Off-Line Unconstrained Handwriting Recognition System seminar projects crazy 1 2,777 09-11-2012, 12:27 PM
Last Post: seminar details

Forum Jump: