Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 6, pp 6679–6700 | Cite as

Biometric re-authentication: an approach towards achieving transparency in user authentication

  • NehaEmail author
  • Kakali Chatterjee
Article
  • 120 Downloads

Abstract

Providing fixed re-authentication attempts to the user in case of password mismatch is a very old concept. But as password based authentication mechanisms are prone to many security attacks, user’s biometric properties along with passwords are highly in use for user authentication these days. It will be more secure and convenient if re-authentication influenced by the biometric behavior of the user is applied in the authentication system. It is a challenging task to identify a genuine user using behavioral biometric due to its low repeatability and wide variation. So, to increase the efficiency and robustness of the authentication system in case of score mismatch, the clustering of user’s behavior and assigning different re-authentication attempt to different cluster is needed. In this paper, we have proposed a transparent fixed text, keystroke based user authentication framework, which will enhance the security of traditional password based authentication mechanism. A new classification algorithm and dynamic attempt allocation algorithm have been proposed which will make the authentication system smart enough to provide the genuine user a fare authentication attempt.

Keywords

Authentication Keystroke dynamics Behavioral biometrics Security 

Notes

References

  1. 1.
    Ahmed A, Traore I (2007) A new biometric technology based on mouse dynamics. IEEE Trans Dependable Secure Comput 4:165e79CrossRefGoogle Scholar
  2. 2.
    Azevedo GLFBG, Cavalcanti GDC, Edson CB, Filho C (2007) An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In: Evolutionary Computation, 2007. CEC IEEE Congress on, pp 3577-3584. IEEEGoogle Scholar
  3. 3.
    Balagani KS, Phoha VIRV, Ray A, Phoha S (2011) On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recogn Lett 32(7):1070–1080CrossRefGoogle Scholar
  4. 4.
    Bhattacharyya D, Ranjan R, Alisherov F, Choi M (2009) Biometric authentic: a review. Int J Serv Sci Technol 2:13e28Google Scholar
  5. 5.
    Chandrasekar V, Suresh Kumar S, Maheswari T (2016) Authentication based on keystroke dynamics using stochastic diffusion algorithm. Stoch Anal Appl 34(1):155–164MathSciNetCrossRefGoogle Scholar
  6. 6.
    Cho S, Hwang S (2006) Artificial rhythms and cues for keystroke dynamics based authentication. In: International conference on biometrics. Springer, Berlin, pp 626–632CrossRefGoogle Scholar
  7. 7.
    Danielsson P-E (1980) Euclidean distance mapping. Comput Graphics Image Process 14(3):227–248CrossRefGoogle Scholar
  8. 8.
    Davoudi H, Kabir E (2009) A new distance measure for free text keystroke authentication. In: Computer Conference CSICC 2009. 14th International CSI, pp. 570–575. IEEEGoogle Scholar
  9. 9.
    Garcia JD (1986) Personal identification apparatus. U.S. Patent 4,621,334 issued November 4Google Scholar
  10. 10.
    Giot R, El-Abed M, Hemery B, Rosenberger C (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Secur 30(6):427–445CrossRefGoogle Scholar
  11. 11.
    Gong L, Pan J, Liu B, Zhao S (2013) A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. J Comput Syst Sci 79(1):122–130MathSciNetCrossRefGoogle Scholar
  12. 12.
    Hartigan JA, Wong MA (1979) Algorithm AS 136: A k-means clustering algorithm. J R Stat Soc Ser C Appl Stat 28(1):100–108zbMATHGoogle Scholar
  13. 13.
    Hempstalk K, Frank E, Witten IH (2008) One-class classification by combining density and class probability estimation. In: Joint european conference on machine learning and knowledge discovery in databases. Springer, Berlin, pp 505–519Google Scholar
  14. 14.
    Ho J, Kang D-K (2018) One-class nave Bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl Intell 48(6):1547–1564CrossRefGoogle Scholar
  15. 15.
    Hocquet S, Ramel J-Y, Cardot H (2005) Fusion of methods for keystroke dynamic authentication. In: IEEE workshop on automatic identification advanced technologies 4th, pp 224-229. IEEEGoogle Scholar
  16. 16.
    Hocquet S, Ramel J-Y, Cardot H (2007) User classification for keystroke dynamics authentication. Advances in biometrics, pp 531–539Google Scholar
  17. 17.
    Hong L, Jain AK (1998) Integrating faces and fingerprints for personal identification. IEEE Trans Pattern Anal Mach Intell 20(12):1295–1307CrossRefGoogle Scholar
  18. 18.
    Huang Y, Huang Z, Zhao H, Lai X (2013) A new one-time password method. IERI Procedia 4:32–37CrossRefGoogle Scholar
  19. 19.
    Im S, Park H, Kim Y, Han S, Kim S, Kang C, Chung C (2001) A biometric identification system by extracting hand vein patterns, journal of the korean physical society. Korean Publ 38(3):268–272Google Scholar
  20. 20.
    Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20CrossRefGoogle Scholar
  21. 21.
    Koakowska A (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Human-Computer Systems Interaction. Springer, Cham, pp 42–52Google Scholar
  22. 22.
    Kukula E, Elliott S (2001) Implementation of Hand Geometry at Purdue University’s Recreational Center: An Analysis of User Perspectives and System Performance. In: Proc. of 35th annual international carnahan conference on security technology, UK, pp 83–88Google Scholar
  23. 23.
    Kumar A, Wong DC, Shen HC, Jain AK (2003) Personal Verification using Palmprint and Hand Geometry Biometric. In: Proc. of 4th international conference on audio- and video-based biometric person authentication, Guildford, UK, pp 668–678Google Scholar
  24. 24.
    Lee N-Y, Chiu Y-C (2005) Improved remote authentication scheme with smart card. Computer Standards and Interfaces 27(2):177–180CrossRefGoogle Scholar
  25. 25.
    Liew K-M, Shen H, See S, Cai W, Fan P, Horiguchi S (eds) (2004) Parallel and distributed computing: Applications and technologies: 5th international conference, PDCAT 2004, vol 3320. Springer, Singapore. ProceedingsGoogle Scholar
  26. 26.
    Marcolin F, Vezzetti E (2017) Novel descriptors for geometrical 3D face analysis. Multimed Tools Appl 76(12):13805–13834CrossRefGoogle Scholar
  27. 27.
    Mariño C, Penedo MG, Penas M, Carreira MJ, Gonzalez F (2006) Personal authentication using digital retinal images. Pattern Anal Applic 9(1):21MathSciNetCrossRefGoogle Scholar
  28. 28.
    Matsumoto T, Hoshino H, Yamada K, Hasino S (2002) Impact of artificial gummy fingers on fingerprint systems. In Proc SPIE 4677:275–289CrossRefGoogle Scholar
  29. 29.
    Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Futur Gener Comput Syst 16(4):351–359CrossRefGoogle Scholar
  30. 30.
    Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Secur Priv 99(2):33–42CrossRefGoogle Scholar
  31. 31.
    Prakash M, Viju P, Infant A, Shobana J (2010) Eliminating vulnerable attacks using one time password and passtext analytical study of blended schema. Universal J Comput Sci Eng Technol 1(2):133–140Google Scholar
  32. 32.
    Revett K (2009) A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control Autom Syst 7(1):7–15CrossRefGoogle Scholar
  33. 33.
    Rybnik M, Tabedzki M, Saeed K (2008) A keystroke dynamics based system for user identification. In: Computer information systems and industrial management applications CISIM’08. 7th, pp 225–230. IEEEGoogle Scholar
  34. 34.
    Sanchez-Reillo R, Sanchez-Avila C, Gonzales-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22(10):1168–1171CrossRefGoogle Scholar
  35. 35.
    Shen C, Guan X, Cai J (2010) A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring, pp 349e53 [IEEE International Conference on Information Theory and Information Security]Google Scholar
  36. 36.
    Shimshon T, Moskovitch R, Rokach L, Elovici Y (2010) Clustering di-graphs for continuously verifying users according to their typing patterns. In: Electrical and Electronics Engineers in Israel (IEEEI) IEEE 26th Convention of, pp. 000445-000449. IEEEGoogle Scholar
  37. 37.
    Singh S, Arya KV (2011) Key classification: a new approach in free text keystroke authentication system. In: 2011 3rd pacific-asia conference on circuits, communications and system (PACCS), pp 1–5. IEEEGoogle Scholar
  38. 38.
    Song R (2010) Advanced smart card based password authentication protocol. Computer Standards and Interfaces 32(5):321–325CrossRefGoogle Scholar
  39. 39.
    Stockton GR, Lisowski W, Press JS, Shapiro N (1980) Authentication by keystroke timing: Stockton Some preliminary results. No. RAND-R-2526-NSF RAND CORP SANTA MONICA CAGoogle Scholar
  40. 40.
    Vezzetti E, Marcolin F, Tornincasa S, Ulrich L, Dagnes N (2017) 3D geometry-based automatic landmark localization in presence of facial occlusions. Multimed Tools Appl 77:1–29Google Scholar
  41. 41.
    Visumathi J, Jayarin JP (2015) “C”. J Appl Secur Res 10(3):375–384CrossRefGoogle Scholar
  42. 42.
    Wan M, Lai Z, Yang G, Yang Z, Zhang F, Zheng H (2017) Local graph embedding based on maximum margin criterion via fuzzy set. Fuzzy Set Syst 318:120–131MathSciNetCrossRefGoogle Scholar
  43. 43.
    Wan M, Li M, Yang G, Gai S, Jin Z (2014) Feature extraction using two-dimensional maximum embedding difference. Inform Sci 274:55–69CrossRefGoogle Scholar
  44. 44.
    Wan M, Yang G, Gai S, Yang Z (2017) Two-dimensional discriminant locality preserving projections (2DDLPP) and its application to feature extraction via fuzzy set. Multimed Tools Appl 76(1):355–371CrossRefGoogle Scholar
  45. 45.
    Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password Authentication scheme with provable security. Computer Standards and Interfaces 31 (4):723–728CrossRefGoogle Scholar
  46. 46.
    Yu E, Cho S (2003) Novelty detection approach for keystroke dynamics identity verification. In: International conference on intelligent data engineering and automated learning, pp 1016–1023. Springer, BerlinCrossRefGoogle Scholar
  47. 47.
    Zheng N, Paloski A, Wang H (2011) An efficient user verification system via mouse movements, pp 1e12 [ACM Conference on Computer and Communications Security]Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of TechnologyPatnaIndia

Personalised recommendations