Abstract
Preliminary reports on the soon to be released Samsung note 7, suggests that the new device will incorporate an iris scanner to be used for biometric authentication. It is clear that over the past number of years, vendors of personal digital devices, consider biometric authentication of a human as a possible replacement for pin, password and pattern based authentication mechanisms currently in use.
Behavioural biometrics is often used to strengthen existing authentication mechanisms. A digraph is commonly associated with the behavioural biometric known as keystroke dynamics. A password is firstly tested for correctness against the reference password on file. This is followed by a second step, where the biometric behavioural aspect is tested. The unique rhythm that a user exhibits when the password is entered forms part of the authentication process by using a digraph approach.
This paper utilizes the EyeWriter to test if the digraph approach can be used in eye tracking to create a behavioural biometric to authenticate a person.
The test was performed on 20 candidates and the results from this test indicated clearly that the behavioural aspect can fundamentally be used for behavioural biometric authentication in a one-to-one biometric authentication approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 127–138. ACM, September 2014
Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)
Bang, Y., Lee, D.J., Bae, Y.S., Ahn, J.H.: Improving information security management: an analysis of ID–password usage and a new login vulnerability measure. Int. J. Inf. Manag. 32(5), 409–418 (2012)
Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005). doi:10.1007/11499145_79
Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)
Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer Science & Business Media, Heidelberg (2013)
Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)
Dhillon, G., Syed, R., Pedron, C.: Interpreting information security culture: an organizational transformation case study. Comput. Secur. 56, 63–69 (2016)
EyeWriter (2016). www.eyewriter.org. Accessed 1 Aug 2016
Goren, Y., Arie, E.: The authenticity of the Bullae of Berekhyahu son of Neriyahu the scribe. Bull. Am. Sch. Orient. Res. 372, 147–158 (2014)
Hamid, L.: Biometric technology: not a password replacement, but a complement. Biom. Technol. Today 2015(6), 7–10 (2015)
Holland, C., Komogortsev, O.: Eye tracking on unmodified common tablets: challenges and solutions. In: Proceedings of the Symposium on Eye Tracking Research and Applications, pp. 277–280. ACM, March 2012
Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the internet of things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, pp. 37–42. ACM, April 2013
Liu, Z., Zhang, Z., Wu, Q., Wang, Y.: Enhancing person re-identification by integrating gait biometric. Neurocomputing 168, 1144–1156 (2015)
Monaco, J.V., Stewart, J.C., Cha, S.H., Tappert, C.C.: Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–8. IEEE, September 2013
Morgante, J.D., Zolfaghari, R., Johnson, S.P.: A critical test of temporal and spatial accuracy of the Tobii T60XL eye tracker. Infancy 17(1), 9–32 (2012)
Murphy, B.L., Morrison, R.D. (eds.): Introduction to Environmental Forensics. Academic Press, Cambridge (2014)
Quinn, G.W., Grother, P.: The one-to-many multi-modal fusion challenge. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 408–412. IEEE, March 2012
Tait, B.L.: The biometric landscape–towards a sustainable biometric terminology framework 9. Int. J. Electron. Secur. Digit. Forensics 6(2), 147–156 (2014)
Tait, B.L.: Behavioural biometrics: utilizing eye-tracking to generate a behavioural pin using the eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A.G., Hosseinian-Far, A. (eds.) ICGS3 2015. CCIS, vol. 534, pp. 348–359. Springer, Heidelberg (2015). doi:10.1007/978-3-319-23276-8_31
Tobii Eye tracking technologies (2016). www.tobii.com. Accessed 1 Aug 2016
Sanchez-Reillo, R., Quiros-Sandoval, H.C., Liu-Jimenez, J., Goicoechea-Telleria, I.: Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. In: 2015 International Carnahan Conference on Security Technology (ICCST), pp. 373–378. IEEE, September 2015
Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995 doi:10.1049/cp:19950480
Waits, M.R.: The indexical trace: a visual interpretation of the history of fingerprinting in colonial India. Vis. Cult. Br. 17(1), 18–46 (2016)
Weinberg, J.T.: Biometric identity. Commun. ACM 59(1), 30–32 (2015)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). Elsevier
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Tait, B.L. (2016). Application of a Digraph for Behavioural Eye Tracking Biometrics. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-51064-4_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51063-7
Online ISBN: 978-3-319-51064-4
eBook Packages: Computer ScienceComputer Science (R0)