FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT

@inproceedings{Teh2012FEATUREFA,
  title={FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT},
  author={Pin Shen Teh and Andrew Yue},
  year={2012}
}
In this paper we study the performance and effect of diverse keystroke feature combinations on keystroke dynamics authentication system by using fusion approach. First of all, four types of keystroke features are acquired from our collected dataset, later then transformed into similarity scores by using Gaussian Probability Density Function (GPD) and Direction Similarity Measure (DSM). Next, three fusion approaches are introduced to merge the scores pairing with different combinations of fusion… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Authenticate User by Keystroke Dynamics

VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Keystroke Dynamics for Continuous Authentication

  • 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence

  • 2017 International Conference on Networking and Network Applications (NaNA)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices

  • 2015 20th International Conference on Control Systems and Computer Science
  • 2015
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

A hamming distance-like filtering in keystroke dynamics

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust
  • 2011
VIEW 1 EXCERPT

Key Classification: A New Approach in Free Text Keystroke Authentication System

  • 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS)
  • 2011
VIEW 1 EXCERPT

Generating training data for SART-2 keystroke analysis module

  • 2010 2nd International Conference on Information Technology, (2010 ICIT)
  • 2010
VIEW 1 EXCERPT