Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
User identity verification via mouse dynamics
1. “User Identity verification via mouse dynamics”
Under the Guidance of –
Prof. D.V. Kodavade
Head & Associate Professor, Department of CSE,
D.K.T.E Ichalkaranji, Kolhapur.
Sumitted By –
Mr. Gorad Balwant Jaywant
M.Tech –II(CST),
Department of Technology, Shivaji University, Kolhapur.
2. Index
Introduction
Choice of the topic
Literature Review.
System Architecture
System Requirement and Design
Implementation
Experiments and Results
Conclusion and Future Enhancements
Bibliography
List of Journals and Publications
2
5. Biometric Technology
Accuracy
Cost
Device Required
Acceptability
Iris Recognition
High
High
Camera
Medium-low
Retinal Scan
High
High
Camera
Low
Face Recognition
Medium- low
Medium
Camera
High
Voice Recognition
Medium
Medium
Microphone
High
Finger Print
High
Medium
Scanner
Medium
Signature Recognition
Low
Medium
Mouse, Optic Pen, Touch Panel.
High
Hand Geometry
Medium-low
Low
Scanner
High
Table No. 1 Overview of Biometric Technologies
5
17. .
In the proposed hierarchy, Following are the features are considered for extraction.
LeftClicks(LC)
RightClicks(RC)
DoubleClicks(DC)
MouseMove(MM)
AreaunderCurve(AUC)
Eccentricity(ECC)
TotalTime(TT)
17
18. I. Left Clicks (LC) – refers to the action of clicking on the left
mouse button. This action consists of a left button down event
followed by a left button up event taking place within specified
τLC seconds from the button down event.
Formally,
Where ld = left down, lu = left up, m1, m2 ...mn = mouse
move events and τLC = specified time interval
Fig. 3 Left Click feature
18
19. II. Right Clicks (RC) – refers to the action of clicking on the
right mouse button. This action consists of a right button down
event followed by a right button up event taking place within
specified τRC seconds from the button down event.
Formally,
Where rd = right down, ru = right up, m1, m2 ... mn = mouse
move events and τRC = specified time interval
Fig. 4 Right Click feature
19
20. III. Double Clicks (DC) - is composed of a two consecutive
left clicks or right clicks in which the mouse-up of the first click
and the mouse-down of the second one occur within an
interval of τI seconds.
Formally:
Fig. 5 Left Click feature
20
21. IV. Mouse Move (MM) - A sequence of mouse-move events
followed by silence time σ.
Formally,
MM = MMS.σ
Fig. 6 Left Click feature
21
26. So, Percentage of Match (POM) is calculated with the help of following formula.
Final Percentage of Matching (POM) =
POM (in LC) + POM (in RC) + POM (in DC) + POM (in MM) + POM (in AUC) + POM (in ECC) + POM (in TT) .
Another Factor used in Classifier is PVM(Predefined Value Set for Matching), This can be decided by administrator of the system
PVM is the criteria to set the security level.
IF POM≥ PVM… User Access to computer is Granted
Else User Access is Denied26
33. Table No
Name of database
Table names
Name of the columns
Purpose of creation
1
MouseDB
AddUserTable
Id, username, password,
Mobile, Signature, question, ans
To Add New User into System.
2
MouseDB
feature
User_name, Area, Double_clk, Eccentricity, mouse_mvc, Total_time,Left_clk, Right_clk
To Store the features those are extracted from user drawn mouse dynamics / mouse signature.
3
MouseDB
chk
chk, match
To check valid matching or invalid matching.
4
MouseDB
count1
count, validity
To check number times valid verification and the number of times invalid verification.
5
MouseDB
MainLogin
UserNm,UserPass
To access the system, its main login to system.
6
MouseDB
temp
username, path
To store the mouse signature image path.
Table3. Database tables
33
36. 7. EXPERIMENTS AND RESULTS
Experiment 1-
Thisfirstexperimentisconductedtotesttheauthenticationandnonauthenticationfortherespectiveusers.
Obviouslyiftheuserisabletodrawthesamedynamicsthenandthenonlyuserwillbeauthenticatedelseitisnotauthenticated.
SameUsername,Password,MobileNumberandFavoriteNumberareusedtoconducttheexperiment. Fig. 13 Sign during registrationFig. 14 Sign during verification36
37. Sr. No
Features Extracted
Value During Registration
Value During Verification
Final Decision
1.
Left Clicks (LC)
14
03
16% Match
Not Authenticated User
2.
Right Clicks (RC)
6
0
3.
Double Clicks (DC)
4
0
4.
Mouse Move (MM) pixels
1147
1013
5.
Area Under Curve (AUC) pixels
31562
22801
6.
Eccentricity (ECC)
0.4778
-0.0957
7.
Total Time (TT) Seconds
19
17
Table.4 Result of experiment 1
37
39. Table.5 Result of experiment 2
Sr. No
Features Extracted
Value During Registration
Value During Verification
Final Decision
1.
Left Clicks (LC)
14
14
88% Matched
Authenticated user
2.
Right Clicks (RC)
6
6
3.
Double Clicks (DC)
4
4
4.
Mouse Move (MM) pixels
1147
1085
5.
Area Under Curve (AUC) pixels
31562
31320
6.
Eccentricity (ECC)
0.4778
0.5172
7.
Total Time (TT) Seconds
19
18
39
49. 10. LIST OF JOURNALS AND PUBLICATIONS
1. “User Identity Verification Using Mouse Signature” in the International Organization of Scientific Research(IOSR)e-ISSN: 2278-0661, p-ISSN: 2278-8727Volume 12, Issue 4 (Jul. -Aug. 2013).
49