Skip to main content

An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms

  • Conference paper
  • First Online:
  • 1618 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Abstract

Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Magalhães, S.T., Revett, K., Santos, H.: Password secured sites - stepping forward with keystroke dynamics. In: Proceedings of the IEEE International Conference on Next Generation Web Services Practices. IEEE CS Press (2005)

    Google Scholar 

  2. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: third fingerprint verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 1–7. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)

    MATH  Google Scholar 

  4. Revett, K.R., Tenreiro de Magalhães, S., Santos, H.M.D.: On the use of rough sets for user authentication via keystroke dynamics. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 145–159. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Revett, K., et al.: A machine learning approach to keystroke dynamics based user authentication. Int. J. Electron. Secur. Digit. Forensics 1(1), 55–70 (2007)

    Article  Google Scholar 

  6. Stefan, D., Shu, X., Yao, D.D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput. Secur. 31(1), 109–121 (2012)

    Article  Google Scholar 

  7. Revett, K., de Magalhães, S.T.: Cognitive biometrics: challenges for the future. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds.) ICGS3 2010. CCIS, vol. 92, pp. 79–86. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Revett, K., Jahankhani, H., de Magalhães, S.T., Santos, H.M.: User dynamics in graphical authentication systems. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) Global E-Security, pp. 173–181. Springer, Berlin (2008)

    Chapter  Google Scholar 

Download references

Acknowledgements

This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope UID/CEC/00319/2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sérgio Tenreiro de Magalhães .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Santos, H., de Magalhães, S.T., Magalhães, M.J. (2015). An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics