Downloads: 139 | Views: 245
Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018 | Popularity: 6.8 / 10
Keystroke Authentication with Back Propagation Neural Network
Qaswaa K. Aboud
Abstract: Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior. This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy
Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication
Edition: Volume 7 Issue 1, January 2018
Pages: 809 - 813
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
New Innovation and Idea, Computer Science & Engineering, India, Volume 11 Issue 10, October 2022
Pages: 1009 - 1012Twin Pairing Algorithm for Longest Common Subsequence
Sathya Narayanan P S
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 408 - 412Age And Gender Prediction using Machine Learning
Kakumani Manasa
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2730 - 2738A Novel Face Detection and Recognition System Using Machine Learning Approaches
Nitalaksheswara Rao K, Mahalakshmi A, Rajendra Prasad K
Downloads: 68
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga