Abstract
With technological advancements and the increasing use of computers and internet in our day to day lives, the issue of security has become paramount. The rate of cybercrime has increased tremendously in the internet era. Out of the numerous crimes, identity theft is perhaps the one that poses the most dangers to an individual. More and more voices strongly declare that the password is no longer a reliable IT security measure and must be replaced by more efficient systems for protecting the computer contents. Behavioural biometrics is an emerging technology that resolves some of the major flaws of the previous scheme. This paper is the first stage of a project which aims to develop a novel authentication system using behavioural biometrics. It presents a comprehensive survey of various techniques and recent works in the respective fields.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Wang, X. Geng, L. Wang, and X. Geng. Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference—Imprint of: IGI Publishing, Hershey, PA, 2009
Michelle Boatwright, Xin Luo, “What Do We Know About Biometrics Authentication?”, InfoSecCD ‘07: Proceedings of the 4th annual conference on Information security curriculum development 2007
James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,” Biometric Systems: Technology, Design and Performance Evaluation”, Springer, ISBN: 1852335963
Tarik Mustafi´c, Arik Messerman, Seyit Ahmet Camtepe, Aubrey-Derrick Schmidt, Sahin Albayrak, “Behavioral Biometrics for Persistent Single Sign-On”, Proceedings of the 7th ACM workshop on Digital identity management, 2011
K P Tripathi, “A Comparative Study of Biometric Technologies with Reference to Human Interface”, International Journal of Computer Applications (0975 – 8887) Volume 14– No.5, January 2011
Wolff, Matt. Behavioral Biometric Identification on Mobile Devices. Foundations of Augmented Cognition. Springer Berlin Heidelberg, 783–791, 2013
Yampolskiy, R.V. and Govindaraju, V. (2008) ‘Behavioural biometrics: a survey and classification’, Int. J. Biometrics, Vol. 1, No. 1, pp. 81–113
Ioannis C. Stylios, Olga Thanou, Iosif Androulidakis, Elena Zaitseva, “A Review of Continuous Authentication Using Behavioral Biometrics”, Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference 2016
Esther Vasiete, Vishal Patel, Yan Chen, Larry Davis, Ian Char, Rama Chellappa, Tom Yeh, “Toward a Non-Intrusive, PhysioBehavioral Biometric for Smartphones”, MobileHCI 2014, Sept. 23–26, 2014, Toronto, ON, CA
Monika Bhatnagar, Raina K Jain, Nilam S Khairnar, “A Survey on Behavioral Biometric Techniques: Mouse vs Keyboard Dynamics”, Proceedings of the International Conference on Recent Trends in engineering & Technology - 2013(ICRTET’2013)
Juho Leinonen, Krista Longi, Arto Klami, Arto Vihavainen, “Automatic Inference of Programming Performance and Experience from Typing Patterns”, Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Kyle R. Corpus, Ralph Joseph DL. Gonzales, Alvin Scott Morada, Larry A. Vea, “Mobile User Identification through Authentication using Keystroke Dynamics and Accelerometer Biometrics”, Proceedings of the IEEE International Conference on Mobile Software Engineering and Systems, 2016
Zach Jorgensen, Ting Yu, “On mouse dynamics as a behavioral biometric for authentication”, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Nan Zheng, Aaron Paloski, Haining Wang, “An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics”, ACM Transactions on Information and System Security, Vol 18, Issue 3
Andrea Kanneh, Ziad Sakr, “Biometric user verification using haptics and fuzzy logic”, Proceedings of the 16th ACM international conference on Multimedia, 2008
Saevanee H., Bhatarakosol, P., (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. International Conference on Computer and Electrical Engineering, 2008. Page(s): 82–86
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D., (2012). Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security. 2012. (Volume:8, Issue: 1). Page(s): 136–148
Daniel Buschek, Alexander De Luca, Florian Alt, “Evaluating the influence of Targets and Hand Postures on Touch-based behavioural biometrics”, Proceedings of the ACM Conference on Human Factors in Computing Systems, 2016
Benabdelkader, C., Cutler, R., and Davis, L. ‘Person identification using automatic height and stride estimation’, IEEE International Conference on Pattern Recognition 2002
S Laxmi, Tata A S K Ishwarya, S Sreeja, “Exploring Behavioural Type Biometrics: Typing Rhythm, Gait, Voice”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, Issue 10, October 2016
Mantyjarvi, J., Lindholm, M., Vildjiounaite E., Makela, S.M., Ailisto, H. A. (2005). Identifying users of portable devices from gait pattern with accelerometers. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. (Volume:2). Page(s): ii/973–ii/976 Vol. 2
Yan Li, Ting Zhu, “Gait-Based WiFi signatures for Privacy-Preserving”, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Gugliemlo Cola, Marco Awenuti, Fabio Musso, Alessio Vecchio, “Gait-based Authentication using a wrist-worn device”, Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2016
Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner, “Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools”, Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Animesh Nandi, Atri Mandal, Shubham Atreja, Gargi B. Dasgupta, Subhrajit Bhattacharya, “Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs”, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Oak, R. (2018). A Literature Survey on Authentication Using Behavioural Biometric Techniques. In: Bhalla, S., Bhateja, V., Chandavale, A., Hiwale, A., Satapathy, S. (eds) Intelligent Computing and Information and Communication. Advances in Intelligent Systems and Computing, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-10-7245-1_18
Download citation
DOI: https://doi.org/10.1007/978-981-10-7245-1_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7244-4
Online ISBN: 978-981-10-7245-1
eBook Packages: EngineeringEngineering (R0)