期刊文献+

基于差别子空间的用户击键特征识别 被引量:3

Recognition of User’s Keystroke Features Based on Difference Subspace
下载PDF
导出
摘要 根据用户的击键行为特征,提出了一种基于差别子空间的识别算法,该算法仅依据用户前几次成功登录的击键特征计算出能够代表用户击键的共性特征向量,进而利用当前用户击键特征向量与共性特征向量的欧几里德距离作为判别依据来判定用户的身份。该算法主要进行内积运算,实现简单且识别速度快,实验结果表明该算法误报率较低,鲁棒性较强。 A new user recognition approach using keystroke features based on difference subspace is proposed. The proposed approach calculates the common feature vector to depict a user's keystroke pattern according to keystroke features of the user's several recent successful authentications, and then utilizes Euclid distances between current keystroke pattern vectors and common feature vectors to identify users. The performance of the proposed approach is evaluated and experimental results show the computational simplicity, high efficiency and low false recognition rates of the proposed approach compared with some existing methods, it is also shown that the approach is robust.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第11期204-205,221,共3页 Computer Engineering
关键词 差别子空间 击键特征 共性特征向量 Difference subspace Keystroke feature Common feature vector
  • 相关文献

参考文献11

  • 1Jain A K,Hong L,Bolle R M.On-line Fingerprint Verification[J].IEEE Trans.on Patten Analysis and Machine Intelligence,1997,19(4):302-313. 被引量:1
  • 2Daugman J.How Iris Recognition Works[J].IEEE Trans.on CSVT,2004,14(1):21-30. 被引量:1
  • 3Gaines R,Lisowski W,Press S.Authentication by Keystroke Timing:Some Preliminary Results[R].Rand Corporation:Rand Report R-2560-NSF,1980. 被引量:1
  • 4Saleh B,Charles S,Bassam E.Computer-access Security Systems Using Keystroke Dynamics[J].IEEE Transaction on Pattern Analysis and Machine Intelligence,1990,12(12):1217-1222. 被引量:1
  • 5Leggett J,Williams G,Usnick J.Dynamic Identity Verification via Keystroke Characteristics.International Journal of Man-machine Studies,1991,(35):859-870 被引量:1
  • 6De Ru D G,Eloff J H P.Enhanced Password Authentication Through Fuzzy Logic[J].IEEE Expert,1997,12(6):38-45. 被引量:1
  • 7Tapiador M.Fuzzy Keystroke Biometrics on Web Security[C]// Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies.1999:133-136. 被引量:1
  • 8Obaidat M S,Sadoun B.Verification of Computer Users Using Keystroke Dynamics[J].IEEE Trans.on Systems,Man and Cybernetics,1997,27(2):261-269. 被引量:1
  • 9Guven A,Sogukpinar.Understanding Users' Keystroke Patterns for Computer Access Security[J].Computer & Security,2003,22(8):695. 被引量:1
  • 10史扬,曹立明.基于击键特征的用户身份校验[J].计算机工程,2005,31(6):120-122. 被引量:8

二级参考文献8

  • 1Dunn A. Biometric Authentication--Real Identities tor a Virtual World. MIDAS. Project Development Final Report, 2002. 被引量:1
  • 2Monrose F, Rubin A. Authentication via Keystroke Dynamics. Fourth ACM Conference on Computer and Communications Security, 19973. 被引量:1
  • 3Kacholia V, Pandit S. Biometric Authentication Using Random Distributions [A]. Proceedings of the 15th Canadian IT Security Symposium [C]. Ottawa, Canada, 2003-05:1-8. 被引量:1
  • 4de Ru w G, Eloff J.Enhanced Password Authentication Through Fuzzy Logic. IEEE Expert, 1997, 12(6): 38-45. 被引量:1
  • 5Tapiador M, Sigienza J A. Fuzzy Keystroke Biometrics on Web Security. AutolD'99 Proceedings, Workshop on Automatic Identification Advanced Technologies, IEEE, 1999:133-136. 被引量:1
  • 6Monrose F, Reiter M K, Wetzel S. Password Hardening Based on Keystroke Dynamics [A]. Proceedings of the 6th ACM Conference on Computer and Communication Security[C]. NY, USA: ACM Press, 1999:73-82. 被引量:1
  • 7朱明,尹大成,陈亿霖.缓冲区溢出攻击及检测方法研究[J].计算机工程,2002,28(7):152-152. 被引量:8
  • 8曲维光,宋如顺.基于用户击键特征识别的用户认证系统[J].计算机工程与应用,2002,38(16):69-70. 被引量:8

共引文献7

同被引文献30

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部