Abstract
Biometric technology allows a computer system to identify and authenticate a person directly based on physical or behavioural traits. A human body is absolutely unique. Each human body on earth, if measured by composition on molecular level, is so unique, that the particular composition has never existed before. When that human cease to exist, that unique composition will never exist again. However the ability to measure a human to a molecular level of accuracy is not currently possible with existing technology. Biometrics refers to the science and technology that measure and statistically analyse human body characteristics and biological data. DNA, fingerprints, eye retinas and irises, facial patterns and hand geometry are used for biometric for authentication purposes. Apart from having unique physical traits, all human also exhibit unique behavioural traits. The way that a person talks, or the way that a person walks (a person’s gait) can all assist in the identification of the person. Various research projects focused on the way that a person types a password. This behavioural trait can then be used to strengthen the security of a supplied password. This paper reports on research that investigates the uniqueness of eye movement. The way a person creates a pin, using his or her eyes are used as a behavioural biometric to strengthen the pin that is supplied. Eye tracking technology usually involves costly equipment such as the Tobii eye tracking system. For this research the Eyewriter system is used due to the affordability and the open source nature of the Eyewriter hardware and software. Earlier research concluded that the movement of a human eye is unique. Behavioural eye biometrics can be used to authenticate a human in a one to one match environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bednarik, R., Kinnunen, T., Mihaila, A., Fränti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780–789. Springer, Heidelberg (2005)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)
Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72–76 (2010)
Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentication: a review. Int. J. u-and e-Serv. Sci. Technol. 2(3), 13–28 (2009)
Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multimodal 2D + 3D face biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 27(4), 619–624 (2005)
Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP WG. IFIP, vol. 147, pp. 275–289. Springer, Heidelberg (2014)
EyeWriter: The EyeWriter (2015). www.eyewriter.org
EyeWriter 2.0 (2015). http://www.instructables.com/id/The-EyeWriter-20/
EyeWriter code, Eye Writer Application Code (2014). https://github.com/eyewriter/eyewriter-1.0
Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381–392. International Society for Optics and Photonics, August 2004
He, Z., Tan, T., Sun, Z., Qiu, X.: Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 31(9), 1670–1684 (2009)
Higgins, P.T.: Introduction to biometrics. In: The Proceeding of Biometrics Consortium Conference (2006)
Kim, D.J., Hong, K.S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electron. 54(4), 1790–1797 (2008)
Kumar, A., Wang, D.C., Shen, H.C., Jain, A.K.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) Audio- and Video-Based Biometric Person Authentication. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)
Lee, H.C., Ramotowski, R., Gaensslen, R.E. (eds.): Advances in Fingerprint Technology. CRC Press, Boca Raton (2001)
Mäntyjärvi, J., Lindholm, M., Vildjiounaite, E., Mäkelä, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Proceedings (ICASSP 2005), vol. 2, pp. ii-973. IEEE, March, 2005
Miller, B.: Vital signs of identity [biometrics]. IEEE Spectr. 31(2), 22–30 (1994)
Monrose, F., & Rubin, A. (1997, April). Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security (pp. 48-56). ACM
Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114, 16–18 May 1995. doi:10.1049/cp:19950480
Stern, D.P.: A Short history of nearly everything. Eos Trans. Am. Geophys. Union 86(20), 198 (2005)
Thalheim, L., Krissler, J., Ziegler, P.M.: Body check. C’t Mag. 11, 114 (2002)
Usher, D., Tosa, Y., Friedman, M.: Ocular biometrics: simultaneous capture and analysis of the retina and iris. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 133–155. Springer, London (2008)
Tobii: Tobii eye tracking technologies (2015). www.tobii.com
Wang, L. (ed.): Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications. IGI Global, Hershey (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Tait, B.L. (2015). Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-23276-8_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23275-1
Online ISBN: 978-3-319-23276-8
eBook Packages: Computer ScienceComputer Science (R0)