期刊文献+

基于击键韵律的身份认证模型设计与实现 被引量:8

Design and implementation of identity authentication model based on keystroke rhythm
在线阅读 下载PDF
导出
摘要 击键韵律是以人的行为特征为基础的身份认证技术。对PR-RP算法模型进行分析,参照PR-RP模型中四个关键的数据集,重新构建P-P时延数据集和R-R时延数据集,并且只选取密码的击键特征进行处理。然后建立特征模板,并在此模型的基础上对特征模板进行实时更新,保证特征模板中数据为用户的最新特征,来达到提高认证的识别率。实验结果表明,该方法能取得较好的认证效果。 Keystroke rhythm is an identity authentication technique which takes persons behaviour characteristics as the basis. The PR-RP model were analyzed, in which four critical datasets were chosen, P-P and R-R relay dataset were rebuilt, and only the keystroke characteristics of password were processed. And then, a new characteristics template was buih and real- time updated, which made the data in template always be the latest characteristics, so as to improve the recognition rate of authentication. Satisfied verification effects were achieved from the experimental data.
出处 《计算机应用》 CSCD 北大核心 2009年第10期2799-2801,共3页 journal of Computer Applications
关键词 击键韵律 PR—RP模型 特征模板 生物认证 keystroke rhythm PR-RP model characteristics template biometric authentication
  • 相关文献

参考文献6

  • 1冯全,苏菲,位继伟.开放网络中的一种生物认证应用框架[J].计算机应用,2008,28(5):1149-1151. 被引量:2
  • 2WOOD J D.生物认证[M].陈菊明,邓启威,等译.北京:清华大学出版社,2004.
  • 3ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: Issues and challenges[ C]// Proceedings of IEEE Conference on Multimedia Information Retrieval. [ S. l. ]: IEEE Press, 2004:948 - 960.
  • 4桑应朋,范平志,郝莉.基于Levenberg-Marquardt算法的用户击键特征鉴别[J].计算机应用,2004,24(7):108-109. 被引量:7
  • 5SUTCU Y, QIMING L, MEMON N. Protecting biometric templates with sketch: Theory and practice[ J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3) : 503 - 512.
  • 6KACHOLIA V, PANDIT S. Biometric authentication using random distributions[ C/OL]. [ 2009 - 01 -01 ]. http://shashankpandit. com/papers/bioart/paper. pdf.

二级参考文献10

  • 1Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication[ J]. Future Generation Computing System, 2000, 16(4): 351 -359.
  • 2Haider S, Abbas A, Zaidi AK. A multi-technique approach for user identification through keystroke dynamics[ A]. Proc of IEEE International Conf on Systems, Man, and Cybernetics[ C], 2000, Vol 2.1336 - 1341.
  • 3Obaidat MS, Macchairolo DT. A multilayer neural network system for computer access security[ J]. IEEE Trans on Systems, Man and Cybernetics, 1994, 24(5): 806 -813.
  • 4Obaidat MS , Sadoun B . Keystroke dynamics based authentication [ A]. Jain A, Bolle R, Pankanti S, ed. Biometrics Personal Identification in Networked Society[ C]. Kluwer Academic Publishers,1998. 213 - 225.
  • 5Lin DT. Computer-access authentication with neural network based keystroke identity verification[ A]. Proc of IEEE International Conf on Neural Networks[ C], 1997, Vol1. 174 - 178.
  • 6Haykin S. Neural networks: a comprehensive foundation[ M]. 2nd Edition. Beijing: Tsinghua University Press, Prentice Hall, 2001.
  • 7ITU-T SG17.Proposed draft Recommendation for X.tsm[S].Geneva:2005.
  • 8ITU-T SG17.Revised draft Recommendation X.tai:Telebiometrics Authentication Infrastructure(TAI)[S].Seoul:2007.
  • 9ISO/IEC 1st CD 24761.Information technology-Security techniques-Authentication context for biometrics[S].Berlin:2006.
  • 10ISO/IEC 19785-1.Information Technology-Common Biometric Exchange Formats Framework-Part 1:Data Element Specification[S].2006.

共引文献6

同被引文献46

  • 1游海鸿,刘丽娜,徐大伟.医院网络安全系统的设计与实现[J].武警医学,2021,32(9):827-828. 被引量:5
  • 2史扬,曹立明.基于击键特征的用户身份校验[J].计算机工程,2005,31(6):120-122. 被引量:8
  • 3姜华,赵洁.虹膜识别的网络身份认证系统研究与实现[J].计算机工程与科学,2006,28(6):50-51. 被引量:3
  • 4王晅,陈伟伟,马建峰.基于遗传算法和灰色关联分析的击键特征识别算法[J].计算机应用,2007,27(5):1054-1057. 被引量:3
  • 5SARAVANAN V, SINDHUJA R. Iris authentication through gabor filter using DSP processor[ C]//Proceedings of the 2013 IEEE Con- ference on Information and Communication Technologies. Piscat- away: IEEE, 2013:568-571.
  • 6BARRA S, De MARSICO M, GALDI C, et al. FAME: face au- thentication for mobile encounter[ C] // Proceedings of the 2013 4th IEEE Workshop on Biometric Measurement and Systems for Security and Medical Applications. Piscataway: IEEE, 2013:1-7.
  • 7CHONG M K, MARSDEN G, GELLERSEN H. GesturePIN: using discrete gestures for associating mobile devices[ C]// Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. New York: ACM, 2010:261 - 264.
  • 8OKUMURA F, KUBOTA A, HATORI Y, et al. A study on biomet- ric authentication based on arm sweep action with acceleration[ C]// Proceedings of the 2006 International Symposium on Intelligent Sig- nal Processing and Communications. Piscataway: IEEE, 2007:219 - 222.
  • 9MATSUO K, OKUMURA F, HASHIMOTA M, et al. Arm swing i- dentification method with template update for long term stability [ C]/! Proceedings of the 2007 International Conference on Ad- vances in Biometrics. Heidelberg: Springer-Verlag, 2007:211 - 221.
  • 10LIU J Y. User evaluation of lightweight user authentication with a single tri-axis accelerometer[ C]// Proceedings of the 1 lth Interna- tional Conference on Human-Computer Interaction with Mobile De- vices and Services. New York: ACM, 2009:15 - 18.

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部