Skip to main content

Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter

  • Conference paper
  • First Online:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (ICGS3 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Included in the following conference series:

  • International Conference on Global Security, Safety, and Sustainability

Abstract

Biometric technology allows a computer system to identify and authenticate a person directly based on physical or behavioural traits. A human body is absolutely unique. Each human body on earth, if measured by composition on molecular level, is so unique, that the particular composition has never existed before. When that human cease to exist, that unique composition will never exist again. However the ability to measure a human to a molecular level of accuracy is not currently possible with existing technology. Biometrics refers to the science and technology that measure and statistically analyse human body characteristics and biological data. DNA, fingerprints, eye retinas and irises, facial patterns and hand geometry are used for biometric for authentication purposes. Apart from having unique physical traits, all human also exhibit unique behavioural traits. The way that a person talks, or the way that a person walks (a person’s gait) can all assist in the identification of the person. Various research projects focused on the way that a person types a password. This behavioural trait can then be used to strengthen the security of a supplied password. This paper reports on research that investigates the uniqueness of eye movement. The way a person creates a pin, using his or her eyes are used as a behavioural biometric to strengthen the pin that is supplied. Eye tracking technology usually involves costly equipment such as the Tobii eye tracking system. For this research the Eyewriter system is used due to the affordability and the open source nature of the Eyewriter hardware and software. Earlier research concluded that the movement of a human eye is unique. Behavioural eye biometrics can be used to authenticate a human in a one to one match environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)

    Article  Google Scholar 

  3. Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)

    Article  Google Scholar 

  4. Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentication: a review. Int. J. u-and e-Serv. Sci. Technol. 2(3), 13–28 (2009)

    Google Scholar 

  5. Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multimodal 2D + 3D face biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 27(4), 619–624 (2005)

    Article  Google Scholar 

  6. Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP WG. IFIP, vol. 147, pp. 275–289. Springer, Heidelberg (2014)

    Google Scholar 

  7. EyeWriter: The EyeWriter (2015). www.eyewriter.org

  8. EyeWriter 2.0 (2015). http://www.instructables.com/id/The-EyeWriter-20/

  9. EyeWriter code, Eye Writer Application Code (2014). https://github.com/eyewriter/eyewriter-1.0

  10. Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381–392. International Society for Optics and Photonics, August 2004

    Google Scholar 

  11. He, Z., Tan, T., Sun, Z., Qiu, X.: Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 31(9), 1670–1684 (2009)

    Article  Google Scholar 

  12. Higgins, P.T.: Introduction to biometrics. In: The Proceeding of Biometrics Consortium Conference (2006)

    Google Scholar 

  13. Kim, D.J., Hong, K.S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electron. 54(4), 1790–1797 (2008)

    Article  MathSciNet  Google Scholar 

  14. Kumar, A., Wang, D.C., Shen, H.C., Jain, A.K.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) Audio- and Video-Based Biometric Person Authentication. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Lee, H.C., Ramotowski, R., Gaensslen, R.E. (eds.): Advances in Fingerprint Technology. CRC Press, Boca Raton (2001)

    Google Scholar 

  16. Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Proceedings (ICASSP 2005), vol. 2, pp. ii-973. IEEE, March, 2005

    Google Scholar 

  17. Miller, B.: Vital signs of identity [biometrics]. IEEE Spectr. 31(2), 22–30 (1994)

    Article  Google Scholar 

  18. Monrose, F., & Rubin, A. (1997, April). Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security (pp. 48-56). ACM

    Google Scholar 

  19. Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995. doi:10.1049/cp:19950480

  20. Stern, D.P.: A Short history of nearly everything. Eos Trans. Am. Geophys. Union 86(20), 198 (2005)

    Article  Google Scholar 

  21. Thalheim, L., Krissler, J., Ziegler, P.M.: Body check. C’t Mag. 11, 114 (2002)

    Google Scholar 

  22. Usher, D., Tosa, Y., Friedman, M.: Ocular biometrics: simultaneous capture and analysis of the retina and iris. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 133–155. Springer, London (2008)

    Chapter  Google Scholar 

  23. Tobii: Tobii eye tracking technologies (2015). www.tobii.com

  24. Wang, L. (ed.): Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications. IGI Global, Hershey (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bobby L. Tait .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Tait, B.L. (2015). Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics