Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method

N. Harun*, W. L. Woo, S. S. Dlay

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Citations (Scopus)

Abstract

Having a secure information system depends on successful authentication of legitimate users so as to prevent attacks from fraudulent persons. Traditional information security systems use a password or personal identification number (PIN). This means they can be easily accessed by unauthorized persons without access being noticed. This paper addresses the issue of enhancing such systems using keystroke biometrics as a translucent level of user authentication. The paper focuses on using the time interval (key down-down) between keystrokes as a feature of individuals' typing patterns to recognize authentic users and reject imposters. A Multilayer Perceptron (MLP) neural network with a Back Propagation (BP) learning algorithm is used to train and validate the features. The results are compared with a Radial Basis Function (RBF) neural network and several distance classifier method used in literature based on Equal Error Rate (EER).

Original languageEnglish
Title of host publicationInternational Conference on Computer and Communication Engineering, ICCCE'10
PublisherIEEE
Number of pages6
ISBN (Electronic)9781424462353
ISBN (Print)9781424462339
DOIs
Publication statusPublished - 23 Aug 2010
EventInternational Conference on Computer and Communication Engineering, ICCCE'10 - Kuala Lumpur, Malaysia
Duration: 11 May 201012 May 2010

Conference

ConferenceInternational Conference on Computer and Communication Engineering, ICCCE'10
CountryMalaysia
CityKuala Lumpur
Period11/05/1012/05/10

Fingerprint

Dive into the research topics of 'Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method'. Together they form a unique fingerprint.

Cite this