Inconspicuous Personal Computer Protection with Touch-Mouse

作者: Ming-Chun Huang , Wenyao Xu , Jason J. Liu , Yi Su , Lei He

DOI: 10.1007/978-3-642-39345-7_4

关键词:

摘要: We present a hassle-free personal information protection design that continuously monitors user identity with Microsoft touchmouse [1] under windows-based computer environment. This is the first which investigates relationship between time-indexed pressure map trajectories extracted from touch-mouse and behavior patterns categorized by common mouse action primitives. serves as an assistive method to enhance existing password biometric based security mechanisms, enabling continuous unobtrusive monitoring. Commercialized systems can be seamlessly integrated proposed system this offer convenient lightweight solution for physical intrusion detection.

参考文章(15)
Olga Kouropteva, Matti Pietikäinen, Oleg Okun, Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine the european symposium on artificial neural networks. pp. 229- 234 ,(2003)
S. Liu, M. Silverman, A practical guide to biometric security technology IT Professional. ,vol. 3, pp. 27- 32 ,(2001) , 10.1109/6294.899930
Maja Pusara, Carla E. Brodley, User re-authentication via mouse movements visualization for computer security. pp. 1- 8 ,(2004) , 10.1145/1029208.1029210
J. J. Liu, Wenyao Xu, Ming-Chun Huang, N. Alshurafa, M. Sarrafzadeh, N. Raut, B. Yadegar, A dense pressure sensitive bedsheet design for unobtrusive sleep posture monitoring ieee international conference on pervasive computing and communications. pp. 207- 215 ,(2013) , 10.1109/PERCOM.2013.6526734
Lawrence K Saul, Sam T Roweis, Think globally, fit locally: unsupervised learning of low dimensional manifolds Journal of Machine Learning Research. ,vol. 4, pp. 119- 155 ,(2003) , 10.1162/153244304322972667
Fabian Monrose, Aviel Rubin, Authentication via keystroke dynamics computer and communications security. pp. 48- 56 ,(1997) , 10.1145/266420.266434
Ahmed Awad E. Ahmed, Issa Traore, A New Biometric Technology Based on Mouse Dynamics IEEE Transactions on Dependable and Secure Computing. ,vol. 4, pp. 165- 179 ,(2007) , 10.1109/TDSC.2007.70207
K. Ilgun, R.A. Kemmerer, P.A. Porras, State transition analysis: a rule-based intrusion detection approach IEEE Transactions on Software Engineering. ,vol. 21, pp. 181- 199 ,(1995) , 10.1109/32.372146
A Lanitis, CJ Taylor, TF Cootes, Automatic face identification system using flexible appearance models Image and Vision Computing. ,vol. 13, pp. 393- 401 ,(1995) , 10.1016/0262-8856(95)99726-H
D.K. Isenor, S.G. Zaky, Fingerprint identification using graph matching Pattern Recognition. ,vol. 19, pp. 113- 122 ,(1986) , 10.1016/0031-3203(86)90017-8