Skip to main content

Application of a Digraph for Behavioural Eye Tracking Biometrics

  • Conference paper
  • First Online:
Global Security, Safety and Sustainability - The Security Challenges of the Connected World (ICGS3 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 630))

  • 1659 Accesses

Abstract

Preliminary reports on the soon to be released Samsung note 7, suggests that the new device will incorporate an iris scanner to be used for biometric authentication. It is clear that over the past number of years, vendors of personal digital devices, consider biometric authentication of a human as a possible replacement for pin, password and pattern based authentication mechanisms currently in use.

Behavioural biometrics is often used to strengthen existing authentication mechanisms. A digraph is commonly associated with the behavioural biometric known as keystroke dynamics. A password is firstly tested for correctness against the reference password on file. This is followed by a second step, where the biometric behavioural aspect is tested. The unique rhythm that a user exhibits when the password is entered forms part of the authentication process by using a digraph approach.

This paper utilizes the EyeWriter to test if the digraph approach can be used in eye tracking to create a behavioural biometric to authenticate a person.

The test was performed on 20 candidates and the results from this test indicated clearly that the behavioural aspect can fundamentally be used for behavioural biometric authentication in a one-to-one biometric authentication approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 127–138. ACM, September 2014

    Google Scholar 

  • Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)

    Article  Google Scholar 

  • Bang, Y., Lee, D.J., Bae, Y.S., Ahn, J.H.: Improving information security management: an analysis of ID–password usage and a new login vulnerability measure. Int. J. Inf. Manag. 32(5), 409–418 (2012)

    Article  Google Scholar 

  • Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005). doi:10.1007/11499145_79

    Chapter  Google Scholar 

  • Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)

    Article  Google Scholar 

  • Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer Science & Business Media, Heidelberg (2013)

    Google Scholar 

  • Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)

    Article  Google Scholar 

  • Dhillon, G., Syed, R., Pedron, C.: Interpreting information security culture: an organizational transformation case study. Comput. Secur. 56, 63–69 (2016)

    Article  Google Scholar 

  • EyeWriter (2016). www.eyewriter.org. Accessed 1 Aug 2016

  • Goren, Y., Arie, E.: The authenticity of the Bullae of Berekhyahu son of Neriyahu the scribe. Bull. Am. Sch. Orient. Res. 372, 147–158 (2014)

    Article  Google Scholar 

  • Hamid, L.: Biometric technology: not a password replacement, but a complement. Biom. Technol. Today 2015(6), 7–10 (2015)

    Article  MathSciNet  Google Scholar 

  • Holland, C., Komogortsev, O.: Eye tracking on unmodified common tablets: challenges and solutions. In: Proceedings of the Symposium on Eye Tracking Research and Applications, pp. 277–280. ACM, March 2012

    Google Scholar 

  • Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the internet of things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, pp. 37–42. ACM, April 2013

    Google Scholar 

  • Liu, Z., Zhang, Z., Wu, Q., Wang, Y.: Enhancing person re-identification by integrating gait biometric. Neurocomputing 168, 1144–1156 (2015)

    Article  Google Scholar 

  • Monaco, J.V., Stewart, J.C., Cha, S.H., Tappert, C.C.: Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8. IEEE, September 2013

    Google Scholar 

  • Morgante, J.D., Zolfaghari, R., Johnson, S.P.: A critical test of temporal and spatial accuracy of the Tobii T60XL eye tracker. Infancy 17(1), 9–32 (2012)

    Article  Google Scholar 

  • Murphy, B.L., Morrison, R.D. (eds.): Introduction to Environmental Forensics. Academic Press, Cambridge (2014)

    Google Scholar 

  • Quinn, G.W., Grother, P.: The one-to-many multi-modal fusion challenge. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 408–412. IEEE, March 2012

    Google Scholar 

  • Tait, B.L.: The biometric landscape–towards a sustainable biometric terminology framework 9. Int. J. Electron. Secur. Digit. Forensics 6(2), 147–156 (2014)

    Article  Google Scholar 

  • Tait, B.L.: Behavioural biometrics: utilizing eye-tracking to generate a behavioural pin using the eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A.G., Hosseinian-Far, A. (eds.) ICGS3 2015. CCIS, vol. 534, pp. 348–359. Springer, Heidelberg (2015). doi:10.1007/978-3-319-23276-8_31

    Chapter  Google Scholar 

  • Tobii Eye tracking technologies (2016). www.tobii.com. Accessed 1 Aug 2016

  • Sanchez-Reillo, R., Quiros-Sandoval, H.C., Liu-Jimenez, J., Goicoechea-Telleria, I.: Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. In: 2015 International Carnahan Conference on Security Technology (ICCST), pp. 373–378. IEEE, September 2015

    Google Scholar 

  • Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995 doi:10.1049/cp:19950480

  • Waits, M.R.: The indexical trace: a visual interpretation of the history of fingerprinting in colonial India. Vis. Cult. Br. 17(1), 18–46 (2016)

    Article  Google Scholar 

  • Weinberg, J.T.: Biometric identity. Commun. ACM 59(1), 30–32 (2015)

    Article  Google Scholar 

  • Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). Elsevier

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bobby L. Tait .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Tait, B.L. (2016). Application of a Digraph for Behavioural Eye Tracking Biometrics. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51064-4_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51063-7

  • Online ISBN: 978-3-319-51064-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics