Abstract
User identification is very effective for protecting information from illegal access. There are password and handwriting authentication system, but the password authentication system has been frequently cracked and the handwriting authentication system needs a special device. Thus we examine whether it is possible or not to identify users by a standard device, mouse. We implement a user identification system using a mouse and experiment with it. The experimental results indicate mouse can be used for user identification.
Preview
Unable to display preview. Download preview PDF.
References
M. Yoshimura, I. Yoshimura, “Recent Trends in Writer Recognition Technology”, The Journal of the Institute of Electronics, Information and Communication Engineers, Vol.72, No.7, pp.788–791, 1989
M. Kawasaki, H. Kakuda, Y. Mori, “An Identity Authentication Method Based on Arpeggio Keystrokes”, Transactions of Information Processing Society of Japan, Vol.34, No.5, pp.1198–1205, 1993
M. Kasukawa, Y. Mori, K. Komatsu, H. Akaike, H. Kakuda, “An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data”, Transactions of Information Processing Society of Japan, Vol.33, No.5, 1992
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Hayashi, K., Okamoto, E., Mambo, M. (1997). Proposal of user identification scheme using mouse. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028470
Download citation
DOI: https://doi.org/10.1007/BFb0028470
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive