Skip to main content

Proposal of user identification scheme using mouse

  • Session 4: Authentication and Identification
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

User identification is very effective for protecting information from illegal access. There are password and handwriting authentication system, but the password authentication system has been frequently cracked and the handwriting authentication system needs a special device. Thus we examine whether it is possible or not to identify users by a standard device, mouse. We implement a user identification system using a mouse and experiment with it. The experimental results indicate mouse can be used for user identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Yoshimura, I. Yoshimura, “Recent Trends in Writer Recognition Technology”, The Journal of the Institute of Electronics, Information and Communication Engineers, Vol.72, No.7, pp.788–791, 1989

    Google Scholar 

  2. M. Kawasaki, H. Kakuda, Y. Mori, “An Identity Authentication Method Based on Arpeggio Keystrokes”, Transactions of Information Processing Society of Japan, Vol.34, No.5, pp.1198–1205, 1993

    Google Scholar 

  3. M. Kasukawa, Y. Mori, K. Komatsu, H. Akaike, H. Kakuda, “An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data”, Transactions of Information Processing Society of Japan, Vol.33, No.5, 1992

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Hayashi, K., Okamoto, E., Mambo, M. (1997). Proposal of user identification scheme using mouse. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028470

Download citation

  • DOI: https://doi.org/10.1007/BFb0028470

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics