Skip to main content

A User Authentication Technic Using a~Web Interaction Monitoring System

  • Conference paper
  • First Online:
Pattern Recognition and Image Analysis (IbPRIA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2652))

Included in the following conference series:

  • 984 Accesses

Abstract

User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), that captures an user interaction on the web via a pointing device. This forms the basis of a new authentication system that uses behavioral information extracted from these interaction signals. The user interaction logs produced by WIDAM are presented to a sequential classifier, that applies statistical pattern recognition techniques to ascertain the identity of an individual – authentication system. The overall performance of the combined acquisition / authentication systems is measured by the global equal error rate, estimated from a test set. Preliminary results show that the new technique is a promising tool for user authentication, exhibiting comparable performances to other behavioural biometric techniques. Exploring standard human-computer interaction devices, and enabling remote access to behavioural information, this system constitutes an inexpensive and practical approach to user authentication through the world wide web.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Abernethy, R.B.: The New Weibull Handbook. Robert B. Abernethy (2000)

    Google Scholar 

  2. BenZeghiba, M.F., Bourlard, H., Mariethoz, J.: Speaker verification based on user-customized password. Technical Report IDIAP-RR 01-13, Institut Dalle Molle d’Intelligence Artificial Perceprive (2001)

    Google Scholar 

  3. Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, Boca Raton (1993)

    Book  Google Scholar 

  4. Gamboa, H., Ferreira, V.: WIDAM - Web Interaction Display and Monitoring. In: Proceedings of the 5th International Conference on Enterprise Information Systems, vol. 4, pp. 21–27 (2003)

    Google Scholar 

  5. Gamboa, H., Fred, A.: An Identity Authentication System Based On Human Computer Interaction Behaviour. In: Proceedings of the 3rd International Workshop on Pattern Recognition in Information Systems, pp. 46–55 (2003)

    Google Scholar 

  6. Gupta, J., McCabe, A.: A review of dynamic handwritten signature verification. Technical report, James Cook University, Australia (1997)

    Google Scholar 

  7. Hors, A.L., Hgaret, P.L., Wood, L.: Document object model level 2 core. Technical report, W3C (2000)

    Google Scholar 

  8. Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: A review. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(1) (2000)

    Article  Google Scholar 

  9. Matyas Jr., V., Riha, Z.: Biometric authentication systems. Technical report, ECOM-MONITOR (2000)

    Google Scholar 

  10. Mansfield, T., Roethenbaugh, G.: 1999 glossary of biometric terms. Technical report, Association for Biometrics (1999)

    Google Scholar 

  11. Pixley, T.: Document object model (dom) level 2 events specification. Technical report, W3C (2000)

    Google Scholar 

  12. Ruggles, T.: Comparison of biometric techniques. Technical report, California Welfare Fraud Prevention System (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gamboa, H., Fred, A. (2003). A User Authentication Technic Using a~Web Interaction Monitoring System. In: Perales, F.J., Campilho, A.J.C., de la Blanca, N.P., Sanfeliu, A. (eds) Pattern Recognition and Image Analysis. IbPRIA 2003. Lecture Notes in Computer Science, vol 2652. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44871-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-44871-6_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40217-6

  • Online ISBN: 978-3-540-44871-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics