SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 33-36
www.iosrjournals.org
www.iosrjournals.org 33 | Page
User Identity Verification Using Mouse Signature
B J Gorad, D.V Kodavade
1
(Computer Science & Engineering, Sharad Institute of Technology College of Engineering, Ichalkaranji,
Maharashtra, India)
(Computer Science & Engineering, D.K.T.E Society’s Textile & Engineering Institute, Ichalkaranji,
Maharashtra, India)
Abstract : Stealing Identity of the user is a crime in which hackers does the unauthorized activity under the
stolen identity by using credentials such as passwords, usernames etc. User verification system provides
security layer in addition to username and password by continuously validating the identity of the logged-on
user based on their behavioral and physiological characteristics. We introduced a novel method that
continuously verifies the user according to characteristics of their interaction with the mouse. The research
contribution is in two parts. First, user signature is created according to the user’s interaction with mouse while
he is doing some predefined activity such as, drawing any alphabet or his signature on canvas application and it
gets stored in a database and used for verification purpose. In the second part design hierarchy, to generate a
user signature for the current session is discussed. The paper also discusses a decision making system to take
decision about to continue the log in or log out from the system based on matching of his current signature and
previously created signature. The system developed gives better verification accuracy by reducing the response
time of the system.
Index Terms— LC – Left click, RC – Right Click, DC- Double Click, MM- Mouse Move etc
I. INTRODUCTION
Currently most computer Systems and online websites, identifies users by means of user names and
passwords/ PINS. But normally hackers can easily steal the password with the help of so many techniques.
Some of the techniques are phishing attacks, key logger and so on. Also sometimes a user‟s computer remains
unlocked at that time hackers can install the key logger in user‟s computer or by sending some links to that
computer, Ex. Greetings or some images etc. if user clicks on that link key logger installs on that computer, it
records every keystroke including passwords, usernames, screen shots after 5-5 minutes. Also they can send that
hacked data to hackers without knowing to user.
The drawback of normal identification methods that only based on credentials lead to the introduction
of user authentication and verification techniques that are based on behavioral and physiological biometrics
which are assumed to be unique to each other and hard to steal. Authentication is performed once during the
login while verification is performed continuously throughout the session. Identity Verification can be achieved
by using one of the two techniques, either by Behavioral biometric system or Physiological Biometric system.
The behavioral biometric feature includes characteristics of interaction of user and input devices such as mouse
and keyboard. And physiological biometric use the human feature that is unique to individuals. For Examples:
fingerprints, iris patterns, face, blinking patterns, lip movement, gait/stride, voice/speech, signature/handwriting
etc.
Thus, systems utilizing biometric user verification require a hacker who wants to infiltrate the system not
only to steal the credentials of the user but also to mimic the user‟s behavioral and/or physiological biometrics
making identity thefts much harder. We are focused to implement a behavioral biometric system because it does
not require dedicated hardware‟s as in physiological it requires. Obviously cost to implement this system is not
more than physiological system
II. RELEVANT LITERATURE
Most common behavioral biometric verification techniques are based on: (a) mouse
dynamics[1][2][3][4], which are derived from the user-mouse interaction and are the focus of this paper; (b)
keystroke dynamics[6][7][8], which are derived from the keyboard activity; and (c) software interaction,
which rely on features extracted from the interaction of a user with a specific software tool (somewhat our
system falls in this category also).
Submitted date 22 June 2013 Accepted Date: 27 June 2013
User Identity Verification using Mouse Signature
www.iosrjournals.org 34 | Page
Behavioral methods can also be characterized according to the learning approach that they employ.
Explicit learning methods monitor user activity while performing a predefined task such as playing a memory
game, this method falls in this category. Implicit learning techniques, on the other hand, monitor the user
during general day-to-day computer activity rather than during the performance of a specific task –Explicit and
implicit methods are also referred to as static and dynamic methods [1], respectively. Implicit learning is
considered more challenging due to high inconsistency owed to the variety of the performed tasks, mood
changes and other influential factors. Nevertheless, it is the best way to learn unique user behavior
characteristics such as frequently performed actions. Since biometric-based verification systems are a special
case of classifiers, their performance is evaluated using similar measurements.
III. PROPOSED MODEL
We propose a novel verification method which verifies a user based on each individual mouse action.
This method requires the aggregation of dozens of mouse coordinates and its activities before accurate
verification can be performed. Verification of each individual mouse action increases the accuracy while
reducing the time that is needed to verify the identity of the user since the fewer actions are required to achieve a
specific accuracy level, as compared to the histogram- based approach which is explained in [1].
The general block diagram of the proposed system is shown in fig. 1
Event
Acquisition
Feature
Extraction
Classifier
(Similarity
match)
Signatures
db
Fig.1 General Block diagram of proposed system
A biometric-based user verification system is essentially a pattern recognition system that acquires biometric
data from an individual, extracts a feature set to establish a unique user signature and constructs a verification
model to classify (Similarity Match) between the user signature‟s.
In above diagram no 1 -
Green Signal- Authorized user
Red Signal – Unauthorized user/ Hacker
3.1. General architecture
Fig. 1 depicts the architecture of a behavioral biometric user verification system. Such systems include the
following components:
-Event acquisition – captures the events generated by the various input devices used for the interaction (e.g.
Keyboard, mouse) via their drivers, Events can be mouse move (MM), left down (LD), left up (LU), right down
(RD), right up (RU), silence (S) etc.
-Feature extraction – High level features [1]can be extracted from that events and the signature will be
constructed which characterizes the behavioral biometrics of the user, The features may include Mouse Move
Sequence (MMS), Left Click (LC), Right Click (RC) etc.
-Classifier – Consists of an inducer (e.g. Support Vector Machines, ANN, Random Forest Classifier etc.) that is
used to build the user verification model to classify the signatures. During verification, the induced model is
used to classify new samples acquired from the user. Any classifiers can be used depend on its availability and
its knowledge [1].
-Signature database – A database is used to store the signature of user. If multiple users exist for system, then
upon the entry of a username, signature of that user will retrieve for verification process [1].
In the database, the signature will consist number of mouse moves; number of left clicks, number of
right clicks, number of silence along with time intervals and aggregation of mouse Co-ordinates.
Same type of signature will be created for every session.
User Identity Verification using Mouse Signature
www.iosrjournals.org 35 | Page
Data Flow Diagrams for proposed model:
Fig. 2 User Registration Process(Admin)
Fig. 3 User Verification Process (Admin/ User)
In this proposed system, users have to register first. Registration is done at the start by opening the
canvas and drawing an alphabet or sequence of alphabets, after saving it, it will be the signature for that
respective user. Next time when user will start the system, obviously first he has to login into the system using
credentials such as username and password. As usually users will enter his username and password which is
already assigned to him, and he will do his daily activity. During his daily activity after some interval canvas will
pop up, and it will ask to draw his signature and he has to draw the signature, so a temporary signature is created
for that session. Finally the verification model compares the current sessions signature and initially created
signature. In all the times both signature will not match exactly but we can give some range (matching is in
between 80% to 100% etc), the user will be authenticated else the system will log out.
We are recommending Random forest Classifier to build the verification model. During the pop up of canvas all
other features of computer system will be locked, the user should not be able to do anything than drawing his
signature.
If the user is drawing wrong signature continuously three times then the system will identify the logged in user is
a hacker, he has stolen the credentials and the entire system will lock so he will not use the entire system at all.
The login continuation of computer system or discontinuation will totally depend on percentage of matching of
signatures.
User Identity Verification using Mouse Signature
www.iosrjournals.org 36 | Page
Final Decision = {Yes /No}
IV. CONCLUSION
Hence we can conclude that, User Verification System using mouse signature will give one more
additional security layer in addition to the normal security layer. Obviously to infiltrate the computer system will
be harder using this method because the hacker has not only to steal the credentials of authorized user but also he
has to mimic the user‟s behavior, and it‟s normally impossible.
V. FUTURE SCOPE
In future, this system can be implemented for an implicit behavioral biometric system. Also some
extension can be done to this system to give better security, as after logout of the system due to more than three
times not matching of signature, random password can be generated and it will send to the registered user‟s
mobile number, so hackers can't login again by using old username and password.
References
[1]. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar, “User identity verification via mouse dynamics”,
Information Sciences 201 (2012) 19–36.
[2]. Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, and Roy A. Maxion, User Authentication Through Mouse Dynamics.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYVOL. 8, NO. 1, Jan 2013
[3]. Zach Jorgensen and Ting Yu, On Mouse Dynamics as a Behavioral Biometric for Authentication. ACM 978-1-4503-0564-8/March
2011.
[4]. Z. Jorgensen, T. Yu, “On mouse dynamics as a behavioral biometric for authentication, in: Proceedings of the Sixth ACM
Symposium on Information, Computer, and Communications Security” (AsiaCCS), March 2011
[5]. Saurabh Singh, Dr K V Arya, “Mouse Interaction based Authentication System by Classifying the Distance Traveled by the Mouse”
International Journal of Computer Applications (0975 – 8887) Volume 17– No.1, March 2011
[6]. Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárraga, Lee L. Ling, andJoão B. T. Yabu-Uti, “User Authentication
through Typing Biometrics Features, IEEE Transactions on Signal Processing”, Vol. 53, No. 2, February 2005
[7]. S. Cho, C. Han, D.H. Han, H.I. Kim, “Web-based keystroke dynamics identity verification using neural network, Journal of
Organizational Computing and Electronic Commerce” 10 (4) (2000) 295–307.
[8]. L. Ballard, D. Lopresti, F. Monrose, “Evaluating the security of handwriting biometrics, in: The 10th International Workshop on
Frontiers in Handwriting Recognition” (IWFHR „06), La Baule, France, 2006.
[9]. H. Gamboa, A. Fred, “An identity authentication system based on human computer interaction behavior, in: 3rd International
Workshop on Pattern Recognition on Information Systems”, 2003, pp. 46–55.

Weitere ähnliche Inhalte

Was ist angesagt?

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesIJNSA Journal
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsOuzza Brahim
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTPIRJET Journal
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 

Was ist angesagt? (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Class paper final
Class paper finalClass paper final
Class paper final
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
C045016020
C045016020C045016020
C045016020
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
H364752
H364752H364752
H364752
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
R01754129132
R01754129132R01754129132
R01754129132
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 

Andere mochten auch

DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMDESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMIOSR Journals
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lanphihoanhbmt
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluationTemibaybee
 
Two household items
Two household itemsTwo household items
Two household itemsmharish9
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
FicointerviewquestionsandanswersSatyaranjan Swain
 
Grouping animals that have legs
Grouping animals that have  legs Grouping animals that have  legs
Grouping animals that have legs phooiyinloi
 
Media pitch
Media pitchMedia pitch
Media pitchHMonan
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на днеNatalya Dyrda
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speakerinvestnewwest
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2lucaminetti
 
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...IOSR Journals
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина ЗемлиNatalya Dyrda
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...IOSR Journals
 
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...Anastasia Lanina
 

Andere mochten auch (19)

DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMDESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lan
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
 
Two household items
Two household itemsTwo household items
Two household items
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
Transport1
Transport1Transport1
Transport1
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
Ficointerviewquestionsandanswers
 
Grouping animals that have legs
Grouping animals that have  legs Grouping animals that have  legs
Grouping animals that have legs
 
Media pitch
Media pitchMedia pitch
Media pitch
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на дне
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2
 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1
 
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Designing Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual WorldDesigning Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual World
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
 
OFIPA
OFIPAOFIPA
OFIPA
 

Ähnlich wie User Identity Verification Using Mouse Signature

Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivityIRJET Journal
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Dynamic Behavior Authentication System
Dynamic Behavior Authentication SystemDynamic Behavior Authentication System
Dynamic Behavior Authentication SystemMuhammed Roshan
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET Journal
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsIJCSIS Research Publications
 
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docxRunning head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docxsusanschei
 

Ähnlich wie User Identity Verification Using Mouse Signature (20)

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Dynamic Behavior Authentication System
Dynamic Behavior Authentication SystemDynamic Behavior Authentication System
Dynamic Behavior Authentication System
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docxRunning head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
 
J1802035460
J1802035460J1802035460
J1802035460
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Kürzlich hochgeladen (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

User Identity Verification Using Mouse Signature

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 33-36 www.iosrjournals.org www.iosrjournals.org 33 | Page User Identity Verification Using Mouse Signature B J Gorad, D.V Kodavade 1 (Computer Science & Engineering, Sharad Institute of Technology College of Engineering, Ichalkaranji, Maharashtra, India) (Computer Science & Engineering, D.K.T.E Society’s Textile & Engineering Institute, Ichalkaranji, Maharashtra, India) Abstract : Stealing Identity of the user is a crime in which hackers does the unauthorized activity under the stolen identity by using credentials such as passwords, usernames etc. User verification system provides security layer in addition to username and password by continuously validating the identity of the logged-on user based on their behavioral and physiological characteristics. We introduced a novel method that continuously verifies the user according to characteristics of their interaction with the mouse. The research contribution is in two parts. First, user signature is created according to the user’s interaction with mouse while he is doing some predefined activity such as, drawing any alphabet or his signature on canvas application and it gets stored in a database and used for verification purpose. In the second part design hierarchy, to generate a user signature for the current session is discussed. The paper also discusses a decision making system to take decision about to continue the log in or log out from the system based on matching of his current signature and previously created signature. The system developed gives better verification accuracy by reducing the response time of the system. Index Terms— LC – Left click, RC – Right Click, DC- Double Click, MM- Mouse Move etc I. INTRODUCTION Currently most computer Systems and online websites, identifies users by means of user names and passwords/ PINS. But normally hackers can easily steal the password with the help of so many techniques. Some of the techniques are phishing attacks, key logger and so on. Also sometimes a user‟s computer remains unlocked at that time hackers can install the key logger in user‟s computer or by sending some links to that computer, Ex. Greetings or some images etc. if user clicks on that link key logger installs on that computer, it records every keystroke including passwords, usernames, screen shots after 5-5 minutes. Also they can send that hacked data to hackers without knowing to user. The drawback of normal identification methods that only based on credentials lead to the introduction of user authentication and verification techniques that are based on behavioral and physiological biometrics which are assumed to be unique to each other and hard to steal. Authentication is performed once during the login while verification is performed continuously throughout the session. Identity Verification can be achieved by using one of the two techniques, either by Behavioral biometric system or Physiological Biometric system. The behavioral biometric feature includes characteristics of interaction of user and input devices such as mouse and keyboard. And physiological biometric use the human feature that is unique to individuals. For Examples: fingerprints, iris patterns, face, blinking patterns, lip movement, gait/stride, voice/speech, signature/handwriting etc. Thus, systems utilizing biometric user verification require a hacker who wants to infiltrate the system not only to steal the credentials of the user but also to mimic the user‟s behavioral and/or physiological biometrics making identity thefts much harder. We are focused to implement a behavioral biometric system because it does not require dedicated hardware‟s as in physiological it requires. Obviously cost to implement this system is not more than physiological system II. RELEVANT LITERATURE Most common behavioral biometric verification techniques are based on: (a) mouse dynamics[1][2][3][4], which are derived from the user-mouse interaction and are the focus of this paper; (b) keystroke dynamics[6][7][8], which are derived from the keyboard activity; and (c) software interaction, which rely on features extracted from the interaction of a user with a specific software tool (somewhat our system falls in this category also). Submitted date 22 June 2013 Accepted Date: 27 June 2013
  • 2. User Identity Verification using Mouse Signature www.iosrjournals.org 34 | Page Behavioral methods can also be characterized according to the learning approach that they employ. Explicit learning methods monitor user activity while performing a predefined task such as playing a memory game, this method falls in this category. Implicit learning techniques, on the other hand, monitor the user during general day-to-day computer activity rather than during the performance of a specific task –Explicit and implicit methods are also referred to as static and dynamic methods [1], respectively. Implicit learning is considered more challenging due to high inconsistency owed to the variety of the performed tasks, mood changes and other influential factors. Nevertheless, it is the best way to learn unique user behavior characteristics such as frequently performed actions. Since biometric-based verification systems are a special case of classifiers, their performance is evaluated using similar measurements. III. PROPOSED MODEL We propose a novel verification method which verifies a user based on each individual mouse action. This method requires the aggregation of dozens of mouse coordinates and its activities before accurate verification can be performed. Verification of each individual mouse action increases the accuracy while reducing the time that is needed to verify the identity of the user since the fewer actions are required to achieve a specific accuracy level, as compared to the histogram- based approach which is explained in [1]. The general block diagram of the proposed system is shown in fig. 1 Event Acquisition Feature Extraction Classifier (Similarity match) Signatures db Fig.1 General Block diagram of proposed system A biometric-based user verification system is essentially a pattern recognition system that acquires biometric data from an individual, extracts a feature set to establish a unique user signature and constructs a verification model to classify (Similarity Match) between the user signature‟s. In above diagram no 1 - Green Signal- Authorized user Red Signal – Unauthorized user/ Hacker 3.1. General architecture Fig. 1 depicts the architecture of a behavioral biometric user verification system. Such systems include the following components: -Event acquisition – captures the events generated by the various input devices used for the interaction (e.g. Keyboard, mouse) via their drivers, Events can be mouse move (MM), left down (LD), left up (LU), right down (RD), right up (RU), silence (S) etc. -Feature extraction – High level features [1]can be extracted from that events and the signature will be constructed which characterizes the behavioral biometrics of the user, The features may include Mouse Move Sequence (MMS), Left Click (LC), Right Click (RC) etc. -Classifier – Consists of an inducer (e.g. Support Vector Machines, ANN, Random Forest Classifier etc.) that is used to build the user verification model to classify the signatures. During verification, the induced model is used to classify new samples acquired from the user. Any classifiers can be used depend on its availability and its knowledge [1]. -Signature database – A database is used to store the signature of user. If multiple users exist for system, then upon the entry of a username, signature of that user will retrieve for verification process [1]. In the database, the signature will consist number of mouse moves; number of left clicks, number of right clicks, number of silence along with time intervals and aggregation of mouse Co-ordinates. Same type of signature will be created for every session.
  • 3. User Identity Verification using Mouse Signature www.iosrjournals.org 35 | Page Data Flow Diagrams for proposed model: Fig. 2 User Registration Process(Admin) Fig. 3 User Verification Process (Admin/ User) In this proposed system, users have to register first. Registration is done at the start by opening the canvas and drawing an alphabet or sequence of alphabets, after saving it, it will be the signature for that respective user. Next time when user will start the system, obviously first he has to login into the system using credentials such as username and password. As usually users will enter his username and password which is already assigned to him, and he will do his daily activity. During his daily activity after some interval canvas will pop up, and it will ask to draw his signature and he has to draw the signature, so a temporary signature is created for that session. Finally the verification model compares the current sessions signature and initially created signature. In all the times both signature will not match exactly but we can give some range (matching is in between 80% to 100% etc), the user will be authenticated else the system will log out. We are recommending Random forest Classifier to build the verification model. During the pop up of canvas all other features of computer system will be locked, the user should not be able to do anything than drawing his signature. If the user is drawing wrong signature continuously three times then the system will identify the logged in user is a hacker, he has stolen the credentials and the entire system will lock so he will not use the entire system at all. The login continuation of computer system or discontinuation will totally depend on percentage of matching of signatures.
  • 4. User Identity Verification using Mouse Signature www.iosrjournals.org 36 | Page Final Decision = {Yes /No} IV. CONCLUSION Hence we can conclude that, User Verification System using mouse signature will give one more additional security layer in addition to the normal security layer. Obviously to infiltrate the computer system will be harder using this method because the hacker has not only to steal the credentials of authorized user but also he has to mimic the user‟s behavior, and it‟s normally impossible. V. FUTURE SCOPE In future, this system can be implemented for an implicit behavioral biometric system. Also some extension can be done to this system to give better security, as after logout of the system due to more than three times not matching of signature, random password can be generated and it will send to the registered user‟s mobile number, so hackers can't login again by using old username and password. References [1]. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar, “User identity verification via mouse dynamics”, Information Sciences 201 (2012) 19–36. [2]. Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, and Roy A. Maxion, User Authentication Through Mouse Dynamics. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYVOL. 8, NO. 1, Jan 2013 [3]. Zach Jorgensen and Ting Yu, On Mouse Dynamics as a Behavioral Biometric for Authentication. ACM 978-1-4503-0564-8/March 2011. [4]. Z. Jorgensen, T. Yu, “On mouse dynamics as a behavioral biometric for authentication, in: Proceedings of the Sixth ACM Symposium on Information, Computer, and Communications Security” (AsiaCCS), March 2011 [5]. Saurabh Singh, Dr K V Arya, “Mouse Interaction based Authentication System by Classifying the Distance Traveled by the Mouse” International Journal of Computer Applications (0975 – 8887) Volume 17– No.1, March 2011 [6]. Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárraga, Lee L. Ling, andJoão B. T. Yabu-Uti, “User Authentication through Typing Biometrics Features, IEEE Transactions on Signal Processing”, Vol. 53, No. 2, February 2005 [7]. S. Cho, C. Han, D.H. Han, H.I. Kim, “Web-based keystroke dynamics identity verification using neural network, Journal of Organizational Computing and Electronic Commerce” 10 (4) (2000) 295–307. [8]. L. Ballard, D. Lopresti, F. Monrose, “Evaluating the security of handwriting biometrics, in: The 10th International Workshop on Frontiers in Handwriting Recognition” (IWFHR „06), La Baule, France, 2006. [9]. H. Gamboa, A. Fred, “An identity authentication system based on human computer interaction behavior, in: 3rd International Workshop on Pattern Recognition on Information Systems”, 2003, pp. 46–55.