Abstract
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), that captures an user interaction on the web via a pointing device. This forms the basis of a new authentication system that uses behavioral information extracted from these interaction signals. The user interaction logs produced by WIDAM are presented to a sequential classifier, that applies statistical pattern recognition techniques to ascertain the identity of an individual – authentication system. The overall performance of the combined acquisition / authentication systems is measured by the global equal error rate, estimated from a test set. Preliminary results show that the new technique is a promising tool for user authentication, exhibiting comparable performances to other behavioural biometric techniques. Exploring standard human-computer interaction devices, and enabling remote access to behavioural information, this system constitutes an inexpensive and practical approach to user authentication through the world wide web.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abernethy, R.B.: The New Weibull Handbook. Robert B. Abernethy (2000)
BenZeghiba, M.F., Bourlard, H., Mariethoz, J.: Speaker verification based on user-customized password. Technical Report IDIAP-RR 01-13, Institut Dalle Molle d’Intelligence Artificial Perceprive (2001)
Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, Boca Raton (1993)
Gamboa, H., Ferreira, V.: WIDAM - Web Interaction Display and Monitoring. In: Proceedings of the 5th International Conference on Enterprise Information Systems, vol. 4, pp. 21–27 (2003)
Gamboa, H., Fred, A.: An Identity Authentication System Based On Human Computer Interaction Behaviour. In: Proceedings of the 3rd International Workshop on Pattern Recognition in Information Systems, pp. 46–55 (2003)
Gupta, J., McCabe, A.: A review of dynamic handwritten signature verification. Technical report, James Cook University, Australia (1997)
Hors, A.L., Hgaret, P.L., Wood, L.: Document object model level 2 core. Technical report, W3C (2000)
Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: A review. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(1) (2000)
Matyas Jr., V., Riha, Z.: Biometric authentication systems. Technical report, ECOM-MONITOR (2000)
Mansfield, T., Roethenbaugh, G.: 1999 glossary of biometric terms. Technical report, Association for Biometrics (1999)
Pixley, T.: Document object model (dom) level 2 events specification. Technical report, W3C (2000)
Ruggles, T.: Comparison of biometric techniques. Technical report, California Welfare Fraud Prevention System (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gamboa, H., Fred, A. (2003). A User Authentication Technic Using a~Web Interaction Monitoring System. In: Perales, F.J., Campilho, A.J.C., de la Blanca, N.P., Sanfeliu, A. (eds) Pattern Recognition and Image Analysis. IbPRIA 2003. Lecture Notes in Computer Science, vol 2652. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44871-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-44871-6_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40217-6
Online ISBN: 978-3-540-44871-6
eBook Packages: Springer Book Archive