Return to search

A Comparison of Three Verification Methods for Keystroke Dynamic

In login systems, a user is asked to enter his correct account and password
in order to be allowed to enter to the system. The safety of systems is at the
risk of leaking out the information, hence, the single mechanism of identity
verification has not filled the bill at present. We study the personal typing
behavior to get one¡¦s own specific features.
In our thesis , we compare three methods and anlysis the advantages and
shortcomings of those three. First one is to sort the twenty study data, and
distribute the weights into the proper region. If the total weights is less than
the threshold then this test data will be accepted, otherwise, it will be rejected.
The second and third method are similar. Both of them are trying to rescale
the data. The spirit of them is that the typing rate of a person will be faster
when they type frequently and will be sloer when they are out of practice.
However the relative positions of those keys, the lengths of ons¡¦s fingers, and
the time that people making pauses in reading unpunctuated are unique.
Those factors can be one¡¦s typing rhythm.
There are twenty two individuals involved in this experiment. Each one
choose his own proficient account and password to type and set up his typing
model. The imposters are randomly choose legal user to imitate.

Identiferoai:union.ndltd.org:NSYSU/oai:NSYSU:etd-0211109-214139
Date11 February 2009
CreatorsChen, Hsiao-ying
ContributorsChun-I Fan, Chia-Mei Chen, D. J. Guan
PublisherNSYSU
Source SetsNSYSU Electronic Thesis and Dissertation Archive
LanguageCholon
Detected LanguageEnglish
Typetext
Formatapplication/pdf
Sourcehttp://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139
Rightsunrestricted, Copyright information available at source archive

Page generated in 0.0019 seconds