{"title":"PC-Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics","authors":"Heewoong Lee, Deok Gyu Lee, Kihyo Nam, Mun-Kweon Jeong","doi":"10.1111/exsy.13806","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC-based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard-based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.</p>\n </div>","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":"42 2","pages":""},"PeriodicalIF":3.0000,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Expert Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/exsy.13806","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC-based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard-based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.
期刊介绍:
Expert Systems: The Journal of Knowledge Engineering publishes papers dealing with all aspects of knowledge engineering, including individual methods and techniques in knowledge acquisition and representation, and their application in the construction of systems – including expert systems – based thereon. Detailed scientific evaluation is an essential part of any paper.
As well as traditional application areas, such as Software and Requirements Engineering, Human-Computer Interaction, and Artificial Intelligence, we are aiming at the new and growing markets for these technologies, such as Business, Economy, Market Research, and Medical and Health Care. The shift towards this new focus will be marked by a series of special issues covering hot and emergent topics.