Sciweavers

CSREASAM
2006

The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication

13 years 6 months ago
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has many issues. In this paper, we propose a kind of biometrics authentication method using the timings of key strokes of an identical simple phrase for all users. For this method, selection of the phrase is important. We analyzed the timings of key strokes using Self Organizing Map (SOM) and selected the suitable phrase for authentication. We examined the effectiveness of this method with the authentication experiments using the map organized by SOM.
Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni,
Added 30 Oct 2010
Updated 30 Oct 2010
Type Conference
Year 2006
Where CSREASAM
Authors Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima
Comments (0)