Skip to main content

A Literature Survey on Authentication Using Behavioural Biometric Techniques

  • Conference paper
  • First Online:
Intelligent Computing and Information and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 673))

Abstract

With technological advancements and the increasing use of computers and internet in our day to day lives, the issue of security has become paramount. The rate of cybercrime has increased tremendously in the internet era. Out of the numerous crimes, identity theft is perhaps the one that poses the most dangers to an individual. More and more voices strongly declare that the password is no longer a reliable IT security measure and must be replaced by more efficient systems for protecting the computer contents. Behavioural biometrics is an emerging technology that resolves some of the major flaws of the previous scheme. This paper is the first stage of a project which aims to develop a novel authentication system using behavioural biometrics. It presents a comprehensive survey of various techniques and recent works in the respective fields.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L. Wang, X. Geng, L. Wang, and X. Geng. Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference—Imprint of: IGI Publishing, Hershey, PA, 2009

    Google Scholar 

  2. Michelle Boatwright, Xin Luo, “What Do We Know About Biometrics Authentication?”, InfoSecCD ‘07: Proceedings of the 4th annual conference on Information security curriculum development 2007

    Google Scholar 

  3. James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,” Biometric Systems: Technology, Design and Performance Evaluation”, Springer, ISBN: 1852335963

    Google Scholar 

  4. Tarik Mustafi´c, Arik Messerman, Seyit Ahmet Camtepe, Aubrey-Derrick Schmidt, Sahin Albayrak, “Behavioral Biometrics for Persistent Single Sign-On”, Proceedings of the 7th ACM workshop on Digital identity management, 2011

    Google Scholar 

  5. K P Tripathi, “A Comparative Study of Biometric Technologies with Reference to Human Interface”, International Journal of Computer Applications (0975 – 8887) Volume 14– No.5, January 2011

    Google Scholar 

  6. Wolff, Matt. Behavioral Biometric Identification on Mobile Devices. Foundations of Augmented Cognition. Springer Berlin Heidelberg, 783–791, 2013

    Google Scholar 

  7. Yampolskiy, R.V. and Govindaraju, V. (2008) ‘Behavioural biometrics: a survey and classification’, Int. J. Biometrics, Vol. 1, No. 1, pp. 81–113

    Google Scholar 

  8. Ioannis C. Stylios, Olga Thanou, Iosif Androulidakis, Elena Zaitseva, “A Review of Continuous Authentication Using Behavioral Biometrics”, Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference 2016

    Google Scholar 

  9. Esther Vasiete, Vishal Patel, Yan Chen, Larry Davis, Ian Char, Rama Chellappa, Tom Yeh, “Toward a Non-Intrusive, PhysioBehavioral Biometric for Smartphones”, MobileHCI 2014, Sept. 23–26, 2014, Toronto, ON, CA

    Google Scholar 

  10. Monika Bhatnagar, Raina K Jain, Nilam S Khairnar, “A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics”, Proceedings of the International Conference on Recent Trends in engineering & Technology - 2013(ICRTET’2013)

    Google Scholar 

  11. Juho Leinonen, Krista Longi, Arto Klami, Arto Vihavainen, “Automatic Inference of Programming Performance and Experience from Typing Patterns”, Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

    Google Scholar 

  12. Kyle R. Corpus, Ralph Joseph DL. Gonzales, Alvin Scott Morada, Larry A. Vea, “Mobile User Identification through Authentication using Keystroke Dynamics and Accelerometer Biometrics”, Proceedings of the IEEE International Conference on Mobile Software Engineering and Systems, 2016

    Google Scholar 

  13. Zach Jorgensen, Ting Yu, “On mouse dynamics as a behavioral biometric for authentication”, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

    Google Scholar 

  14. Nan Zheng, Aaron Paloski, Haining Wang, “An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics”, ACM Transactions on Information and System Security, Vol 18, Issue 3

    Google Scholar 

  15. Andrea Kanneh, Ziad Sakr, “Biometric user verification using haptics and fuzzy logic”, Proceedings of the 16th ACM international conference on Multimedia, 2008

    Google Scholar 

  16. Saevanee H., Bhatarakosol, P., (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. International Conference on Computer and Electrical Engineering, 2008. Page(s): 82–86

    Google Scholar 

  17. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D., (2012). Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security. 2012. (Volume:8, Issue: 1). Page(s): 136–148

    Google Scholar 

  18. Daniel Buschek, Alexander De Luca, Florian Alt, “Evaluating the influence of Targets and Hand Postures on Touch-based behavioural biometrics”, Proceedings of the ACM Conference on Human Factors in Computing Systems, 2016

    Google Scholar 

  19. Benabdelkader, C., Cutler, R., and Davis, L. ‘Person identification using automatic height and stride estimation’, IEEE International Conference on Pattern Recognition 2002

    Google Scholar 

  20. S Laxmi, Tata A S K Ishwarya, S Sreeja, “Exploring Behavioural Type Biometrics: Typing Rhythm, Gait, Voice”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 10, October 2016

    Google Scholar 

  21. Mantyjarvi, J., Lindholm, M., Vildjiounaite E., Makela, S.M., Ailisto, H. A. (2005). Identifying users of portable devices from gait pattern with accelerometers. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. (Volume:2). Page(s): ii/973–ii/976 Vol. 2

    Google Scholar 

  22. Yan Li, Ting Zhu, “Gait-Based WiFi signatures for Privacy-Preserving”, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

    Google Scholar 

  23. Gugliemlo Cola, Marco Awenuti, Fabio Musso, Alessio Vecchio, “Gait-based Authentication using a wrist-worn device”, Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2016

    Google Scholar 

  24. Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner, “Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools”, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

    Google Scholar 

  25. Animesh Nandi, Atri Mandal, Shubham Atreja, Gargi B. Dasgupta, Subhrajit Bhattacharya, “Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs”, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajvardhan Oak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Oak, R. (2018). A Literature Survey on Authentication Using Behavioural Biometric Techniques. In: Bhalla, S., Bhateja, V., Chandavale, A., Hiwale, A., Satapathy, S. (eds) Intelligent Computing and Information and Communication. Advances in Intelligent Systems and Computing, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-10-7245-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7245-1_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7244-4

  • Online ISBN: 978-981-10-7245-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics