SlideShare a Scribd company logo
1 of 4
Download to read offline
K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International
         Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259
   A Survey On Keystroke Authentication By Using Local Search
                          Algorithm
                1
                    K.D.V.S.Anil kumar, 2 M.suman, 3 A.Ramakrishna, 4
                                 Dr.A.S.N.Chakravarthy
                1 PGResearch scholar, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India,
                2 Associate Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India,
                3 Assistant Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India,
                    4 Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India.


Abstract
         In now a days Password authentication             relatively cheaper than other conventional methods
plays a vital role typing biometrics as a                  like iris technology and finger print technology. Most
transparent layer of user authentication for               current computer access systems use a username and
security. Keystroke authentication provides                password to authenticate users trying to log-in.
security to the applications like electronic mail,         secrecy of the username and password is most
banking and any other web services etc., There             important in this method of authentication.
are several types of techniques to protect our             Authentication means the process of identifying an
passwords but it can be easily hacked by the               individual, usually based on a username and
hackers through so many algorithms. By using               password. In security systems, authentication is
keystroke authentication we can provide security           different from authorization, based on the identity
to the applications. Our research focuses on by            giving            system            objects         to
using individual’s typing pattern we can measure           individuals[6].Authentication merely ensures that the
the time period between keystrokes. By using the           individual is who he or she claims to be, but says
weights of a fully trained Multi Layer Perceptron          nothing about the access rights of the individual.
(MLP) the typing pattern of a particular
individual can be represented in the recent .In this                Keystroke analysis is a behavioural
paper i want to propose alternate algorithm                biometric deals with by typing rhythms of the
similar to k-mean algorithm. Each user’s typing            individuals typed for the user. To improve the
pattern can be viewed as a cluster of                      security of a Standalone application a new
measurements that can be differentiated from               methodology has been proposed by which the
clusters of other users.                                   keystroke Analysis can be combined with the existing
                                                           authentication Mechanisms through keyboards.
Keywords—Authentication, eystrokeauthentication,
local search        algorithm,   multilayer   perceptron            Keystroke         dynamics,      or typing
network.                                                   dynamics,gives the complete timing information that
                                                           describes exactly at what time each key was pressed
I. INTRODUCTION                                            and at what time when the key was released as a
          In these days the security of computer           person is typing at a computer keyboard.
access is rely important because a lot of electronic
transactions are executed every day via internet in        II. LITERATURE SURVEY
shopping, banking etc., By using Biometric system                   In the past the user name and password is
we can identifies a user or verifies the identity based    typed by the user. This information is taken by the
upon the measurement of his/her unique                     computer and the information can be compared in the
physiological traits such as face[1],palm[2],iris,or       database. If the information present in the database
behavioural                  characterstics         like   and the information provided by the user are found to
voice[3] ,handwriting[4],signature[5],keystrokedyna        be the same, then the user is to be accessed. If the
mics ,physiological biometics is biological/chemical       information provided by the user does not match with
traits that are innate and behavioural biometrics are      what is present in the database, then the error
mannerisms or traits that are learned or acquired.         message is displayed to the user.

          Biometrics based on typing patterns are
different in that. It is very cheap to implement, more
distributed and more unobtrusive than conventional
biometric procedures. Because It simply require a
collecting data on a persons typing patterns keyboard
and to collect data by using software. This is


                                                                                                   256 | P a g e
K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International
        Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
             www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259
                                                           are added together producing a combined value uj.
                                                           The weighted sum (uj) is given to a transfer function,
                                                           σ, which outputs a value hj. The outputs from the
                                                           hidden layer are given to the output layer.
                                                           Output Layer — In the output layer the neuron has
                                                           been arrived from hidden layer, the value that we are
                                                           getting from e hidden layer neuron is multiplied by a
                                                           weight (wkj), and the resulting weighted values are
                                                           added together producing a combined value vj. The
                                                           weighted sum (vj) is given into a transfer function, σ,
                                                           which outputs a value yk. The y values are the outputs
                                                           of the network.

                                                           2. BACK PROPOGATION ALGORITHM
                                                                     To train a neural network we need to
                                                           perform some task, for that we must adjust the
                                                           weights of each unit in such a way that the error
                                                           between the desired output and the actual output is
         FIG 1.Existing user authentication system[7]
                                                           reduced [10]. In order to reduce the error the process
                                                           requires the neural network to compute the error
III. LITERATURE SURVEY                                     derivative of the weights (EW). , the process must
1.THE MULTILAYER PERCEPTRON NEURAL NETWORK
                                                           calculate how the error changes as each weight is
MODEL
                                                           increased or decreased slightly to calculate the error
The below fig shows the multiperceptron neural
                                                           derivative of weights(EW) back propogation
network     consists of three layers
                                                           algorithm is the efficient one.
                                                                     if all the units in the network are linear
                                                           back-propagation algorithm is easy to understand.
                                                           The algorithm computes each EW by first computing
                                                           the EA, the rate at which the error changes as the
                                                           activity level of a unit is changed. For output units,
                                                           the EA is simply the difference between the actual
                                                           and the desired output. To compute the EA for a
                                                           hidden unit in the layer just before the output layer,
                                                           first we identify all the weights between that hidden
                                                           unit and the output units to which it is connected. We
                                                           can multiply those weights with the EAs of those
                                                           output units and add the products. For the chosen
FIG   2.MULTIPERCEPTRON                      NEURAL        hidden unit this sum equals the EA . we can compute
NETWORK[8]                                                 in like fashion the EAs for other layers, After
                                                           calculating all the EAs in the hidden layer just before
          This network has three layers they are input     the output layer moving from layer to layer in a
layer (on the left) with three neurons, one hidden         direction opposite to the way activities propagate
layer (in the middle) with three neurons and an output     through the network. This is what gives back
layer (on the right) with three neurons[9].                propagation its name. Once the EA has been
A neuron is present with a predictor variable in the       computed for a unit, it is straight forward to compute
input layer. In the case of categorical variables, To      the EW for each incoming connection of the unit.
represent the N categories of the variable, N-1            The EW is the product of the EA and the activity
neurons are used.                                          through the incoming connection.
          Input Layer —In the input layer A vector of
predictor variable values (x1...xp) is presented. The      3. MODIFIED K-MEANS ALGORITHM:
range of each variable is -1 to 1. It distributes the               The clustering problem can be stated as
values to each of the neurons in the hidden layer. In      follows. Given p patterns in an n dimensional metric
addition to the predictor variables, there is a constant   space, determine a partition of patterns into K groups,
input of 1.0, called the bias that is fed to each of the   or clusters. For the purposes of this experiment the
hidden layers; the bias is multiplied by a weight and      number of clusters is set to two. The modified K-
added to the sum going into the neuron.                    means cluster algorithm is as follows[11-14] .
          Hidden Layer —Iin the hidden layer a
neuron has to be arrived from input layer, the value       1.By selecting two points as the centroids of the
that are arrived from each input neuron is multiplied      respective or same cluster select an initial partition
by a weight (wji ), and the resulting weighted values      with 2 clusters .


                                                                                                    257 | P a g e
K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International
         Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
              www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259
2.Based on the allocation function generate a new              computations are needed.
partition by assigning each pattern to a cluster a point
is allocated to a cluster if it is closer to the centroid of   V. RESULTS & DISCUSSION
the cluster and The distance is measured using the                       These are results by using multilayer
particular metric being considered.                            perceptron network and k-means algorithm similarly
3. Based on the representation scheme we can                   we get approximate result by using local search
compute the new cluster identities (centroids). This is        algorithm. Similarly we get the best results by using
known as weighted average of the reciprocal                    alternate training networks.
distances.                                                               However results of individual person was
4. Repeat steps 2 and 3 until we get a near optimum            accumulated and the average rate of correct
value of the cluster criterion is found. To allow              classification for both methods and representation
different metric space It is the square error criterion        were to be calculated.It seems to be huge difference
to be modified.                                                in the rate of different users.
5. Repeat steps 2 to 4 until cluster membership
stabilizes.
6. Perform steps 1 to 5 for 100 repetitions and record
the resulting clusters. The cluster configuration with
the most occurrences is considered to be the correct
partition of the data set.
For classifying the typing patterns Eight metrics were
to be investigated in order to explore the effect of
different metric spaces. Some of the metrics was of
the correlation type, e.g. Correlation Coefficient and
Kendall‟s Correlation Coefficient. Others are more
intuitive measures of distance, e.g. Euclidean and
City Block. There were also non-linear metrics, e.g.
Minkowsky, Camberra, Chebyshev andQuadratic.
The most successful metric was found to be the                  FIG 3.Authentic user recognition and Impostor
Camberra Metric.                                               rejection using MLP[15]

IV PROPOSED SYSTEM                                                       For example,among all users, some of the
LOCAL SEARCH ALGORITHM:                                        users managed to achieve 100% acceptance but some
          For solving computational problems Local             of the users accomprised less than 50% acceptance.
Search is one of the optimization method. LS moves             This implies that observation would be the impose
from candidate solution to a neighbouring solution             rejection rates as well. Moreover average acceptance
interatively, we have applied this fundamental                 rate for the legal user was found to be 84% and85%.
methodology on the multi-layer ENN. We define a
vector V whose elements include all adaptable
parameters (weights between all layers and
thresholds of each neuron) as
           V = (w11 , w12 ,...wij ...,θ1 ,θ 2 ,...,θ i ,...)
 By using local search algorithm the error function can
be minimised. It performs the local search iteratively
and minimizes the error measure function along with
the set of decent directions directly. The current
iteration is not a stationary point Sufficient search
directions are included to guarantee, By this we can
find the nearest minima efficiently. Furthermore, the
learning is performed by simply changing the weight
and threshold vectors by a small positive or negative          FIG 4. Authentic user recognition and Impostor
constant, and accepting the change if it produces a                    rejection using clustering Algorithms[15]
smaller error measure.
          This is simple to specify and implement in                     By observing the graph, it can be seen that
hardware applications for the following reasons: As a          the impostors were able to better act on the legal
direct search method, no back propagation pass is              users after having observed legal users keying in their
needed and only a forward path is required. no                 respective passwords. For cluster analysis, we found
bidirectional circuits and hardware for the back               that there was a slight decrease in the rejection rate of
propagation are needed, in terms of analog                     the impostor when the subject observed the
implementations. To generate the derivative no                 authorised user‟s typing pattern.
complex analog multipliers and other analog



                                                                                                         258 | P a g e
K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International
        Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
             www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259
As far as concerned the ongoing research biometric           [9]    http://www.dtreg.com/mlfn.htm     last   date
typing could not replace the accuracy of user                       visited on 05/03/12.
identification using passwords. It is due to the fact        [10]
that variation in one‟s typing patterns based on the                http://www.doc.ic.ac.uk/~nd/surprise_96/jou
factors such as users mental situation example                      rnal/vol4/cs11/report.html#The         Back-
tiredness or physical injury. This shows that the                   Propagation Algorithm.
analysis of the data and last interval definitely have       [11]   Eric Backer, “Computer Assisted Reasoning
standard deviation than compared to other                           in Cluster Analysis”, Prentice Hall,1995.
measurements.                                                [12]   R.S.Michalski, R.E.Stepp, E. Diday,”A
          The research also shows that the observation              recent advance in Data Analysis: Clustering
that users tended to wait for a variable time interval              Objects into Classes Characterised by
before pressing the return key.                                     Conjunctive Concepts”, North Holland
                                                                    Publishing company,1981.
VII CONCLUSION & FUTURE SCOPE                                [13]   Richard O. Duda, Peter E Hart, “Pattern
         The proposed paper shows that keystroke is                 classification andf scene analysis”,John
a special kind of biometric which can be used as                    Wiley & sons,Inc.,1973.
special features for an additional and transparent           [14]    M.R.Anderbeg, “Cluster Analysis for
layer for user authentication. It also investigates the             Applications”,Academic Press,1973.
use of local search algorithm for a detection method         [15]   Leenesh Kumar MAISURIA, Cheng Soon
for keystroke patterns.                                             ONG          &     Weng         Kin       LAI
                                                                    <lai@mimos.my>Information Management
          We can enhance the local search algorithm                 and Computational Intelligence Research
by adding special features to overcome the                          Group MIMOS Berhad.Technology Park
difficulties that the local search algorithm is suffering.          Malaysia             57000             Kuala
By using alternate algorithms .and training networks                Lumpur,MALAYSIA.
we can get the best security keystroke mechanism.

REFERENCES
   [1]   voth.D(2003),        'Face        Recognition
         Technology‟                            ,IEEE
         Intelligent Systems, vol.18,No. 3, pp.4-7.
  [2]    shu W. and Zhang.D(1998),‟Automated
         Personal Identification by Palmprint‟,
         Optical Engineering,vol.37,No.8,pp.2359-
         2362.
  [3]    Shaughnessy       .D     (1986),     „Speaker
         Recognition‟, IEEE ASSP Magazine, Vol. 3,
         No. 4, pp. 4-17.
  [4]    Tappert .C.C (2009), „Rationale for adaptive
         online handwriting recognition‟, Proceedings
         of International Workshop on Frontiers in
         Handwriting Recognition, , Montreal,
         Canada, pp. 13-22.
  [5]    Herbst .N and Liu .C (1977), „Automatic
         Signature      Verification      based     on
         Accelerometry‟, IBM Journal of Research
         and Development, Vol. 21, pp. 245-253.
  [6]
         http://en.wikipedia.org/w/index.php?search=
         keystroke+authentication&title=Special%3
         ASearch. Last date visited on 05/03/12.
  [7]
         http://www.authorstream.com/Presentation/a
         SGuest129364-1358874-keystroke-analysis-
         improved-authentication-mechanism      last
         date visited on 05/03/12.
   [8]   S.Haykin “NEURAL NETWORKS : A
         Comprehensive Foundation”, Prentice hall
         1994.




                                                                                                   259 | P a g e

More Related Content

What's hot

AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
NNFL 3 - Guru Nanak Dev Engineering College
NNFL  3 - Guru Nanak Dev Engineering CollegeNNFL  3 - Guru Nanak Dev Engineering College
NNFL 3 - Guru Nanak Dev Engineering CollegeMR. VIKRAM SNEHI
 
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...IJERA Editor
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final ReportShikhar Agarwal
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
Brain-computer interface of focus and motor imagery using wavelet and recurre...
Brain-computer interface of focus and motor imagery using wavelet and recurre...Brain-computer interface of focus and motor imagery using wavelet and recurre...
Brain-computer interface of focus and motor imagery using wavelet and recurre...TELKOMNIKA JOURNAL
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
NNFL 6 - Guru Nanak Dev Engineering College
NNFL  6 - Guru Nanak Dev Engineering CollegeNNFL  6 - Guru Nanak Dev Engineering College
NNFL 6 - Guru Nanak Dev Engineering CollegeMR. VIKRAM SNEHI
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
NNFL 7 - Guru Nanak Dev Engineering College
NNFL  7 - Guru Nanak Dev Engineering CollegeNNFL  7 - Guru Nanak Dev Engineering College
NNFL 7 - Guru Nanak Dev Engineering CollegeMR. VIKRAM SNEHI
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesIJERA Editor
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 

What's hot (19)

AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
NNFL 3 - Guru Nanak Dev Engineering College
NNFL  3 - Guru Nanak Dev Engineering CollegeNNFL  3 - Guru Nanak Dev Engineering College
NNFL 3 - Guru Nanak Dev Engineering College
 
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
 
Artificial Neural networks
Artificial Neural networksArtificial Neural networks
Artificial Neural networks
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final Report
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
Brain-computer interface of focus and motor imagery using wavelet and recurre...
Brain-computer interface of focus and motor imagery using wavelet and recurre...Brain-computer interface of focus and motor imagery using wavelet and recurre...
Brain-computer interface of focus and motor imagery using wavelet and recurre...
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
I26043047
I26043047I26043047
I26043047
 
NNFL 6 - Guru Nanak Dev Engineering College
NNFL  6 - Guru Nanak Dev Engineering CollegeNNFL  6 - Guru Nanak Dev Engineering College
NNFL 6 - Guru Nanak Dev Engineering College
 
40120140507007
4012014050700740120140507007
40120140507007
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
NNFL 7 - Guru Nanak Dev Engineering College
NNFL  7 - Guru Nanak Dev Engineering CollegeNNFL  7 - Guru Nanak Dev Engineering College
NNFL 7 - Guru Nanak Dev Engineering College
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 

Viewers also liked

Viewers also liked (20)

Aj25210213
Aj25210213Aj25210213
Aj25210213
 
Am25227236
Am25227236Am25227236
Am25227236
 
Dz25764770
Dz25764770Dz25764770
Dz25764770
 
Ag25181192
Ag25181192Ag25181192
Ag25181192
 
Bc25325327
Bc25325327Bc25325327
Bc25325327
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Presentation1
Presentation1Presentation1
Presentation1
 
Silabo de avances tecnologico
Silabo de avances tecnologicoSilabo de avances tecnologico
Silabo de avances tecnologico
 
Semarang blogger festival 2013
Semarang blogger festival 2013Semarang blogger festival 2013
Semarang blogger festival 2013
 
Presentación1. tics
Presentación1. ticsPresentación1. tics
Presentación1. tics
 
Informe rendicion de cuentas 2013
Informe rendicion de cuentas 2013Informe rendicion de cuentas 2013
Informe rendicion de cuentas 2013
 
Letter of reccomendation
Letter of reccomendationLetter of reccomendation
Letter of reccomendation
 
D
DD
D
 
Kedai citara (presentation)
Kedai citara (presentation)Kedai citara (presentation)
Kedai citara (presentation)
 
automation
automationautomation
automation
 
Task 1 max watts
Task 1 max wattsTask 1 max watts
Task 1 max watts
 
Bioteknologia
BioteknologiaBioteknologia
Bioteknologia
 
Help treinamento
Help treinamentoHelp treinamento
Help treinamento
 
Carta fm 2003 gobierno de lucio
Carta fm 2003 gobierno de lucioCarta fm 2003 gobierno de lucio
Carta fm 2003 gobierno de lucio
 
Gmail
GmailGmail
Gmail
 

Similar to KEYSTROKE AUTHENTICATION SURVEY

IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...IRJET Journal
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...IOSR Journals
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...IOSR Journals
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...inventionjournals
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTION
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTIONINVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTION
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTIONIJNSA Journal
 
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...IAEME Publication
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
 
Motor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemMotor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemIRJET Journal
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
 
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...RioCarthiis
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationIRJET Journal
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networksijceronline
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 

Similar to KEYSTROKE AUTHENTICATION SURVEY (20)

238 243
238 243238 243
238 243
 
238 243
238 243238 243
238 243
 
IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...
 
PATTERN RECOGNITION.pptx
PATTERN RECOGNITION.pptxPATTERN RECOGNITION.pptx
PATTERN RECOGNITION.pptx
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTION
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTIONINVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTION
INVERTIBLE NEURAL NETWORK FOR INFERENCE PIPELINE ANOMALY DETECTION
 
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
NEURAL NETWORK FOR THE RELIABILITY ANALYSIS OF A SERIES - PARALLEL SYSTEM SUB...
 
H364752
H364752H364752
H364752
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
Motor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating SystemMotor Imagery based Brain Computer Interface for Windows Operating System
Motor Imagery based Brain Computer Interface for Windows Operating System
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
 
A Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verificationA Convolutional Neural Network approach for Signature verification
A Convolutional Neural Network approach for Signature verification
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Deep learning
Deep learningDeep learning
Deep learning
 

KEYSTROKE AUTHENTICATION SURVEY

  • 1. K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259 A Survey On Keystroke Authentication By Using Local Search Algorithm 1 K.D.V.S.Anil kumar, 2 M.suman, 3 A.Ramakrishna, 4 Dr.A.S.N.Chakravarthy 1 PGResearch scholar, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India, 2 Associate Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India, 3 Assistant Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India, 4 Professor, Dept. of ECM. K.L.University, Vaddeswaram, A.P, India. Abstract In now a days Password authentication relatively cheaper than other conventional methods plays a vital role typing biometrics as a like iris technology and finger print technology. Most transparent layer of user authentication for current computer access systems use a username and security. Keystroke authentication provides password to authenticate users trying to log-in. security to the applications like electronic mail, secrecy of the username and password is most banking and any other web services etc., There important in this method of authentication. are several types of techniques to protect our Authentication means the process of identifying an passwords but it can be easily hacked by the individual, usually based on a username and hackers through so many algorithms. By using password. In security systems, authentication is keystroke authentication we can provide security different from authorization, based on the identity to the applications. Our research focuses on by giving system objects to using individual’s typing pattern we can measure individuals[6].Authentication merely ensures that the the time period between keystrokes. By using the individual is who he or she claims to be, but says weights of a fully trained Multi Layer Perceptron nothing about the access rights of the individual. (MLP) the typing pattern of a particular individual can be represented in the recent .In this Keystroke analysis is a behavioural paper i want to propose alternate algorithm biometric deals with by typing rhythms of the similar to k-mean algorithm. Each user’s typing individuals typed for the user. To improve the pattern can be viewed as a cluster of security of a Standalone application a new measurements that can be differentiated from methodology has been proposed by which the clusters of other users. keystroke Analysis can be combined with the existing authentication Mechanisms through keyboards. Keywords—Authentication, eystrokeauthentication, local search algorithm, multilayer perceptron Keystroke dynamics, or typing network. dynamics,gives the complete timing information that describes exactly at what time each key was pressed I. INTRODUCTION and at what time when the key was released as a In these days the security of computer person is typing at a computer keyboard. access is rely important because a lot of electronic transactions are executed every day via internet in II. LITERATURE SURVEY shopping, banking etc., By using Biometric system In the past the user name and password is we can identifies a user or verifies the identity based typed by the user. This information is taken by the upon the measurement of his/her unique computer and the information can be compared in the physiological traits such as face[1],palm[2],iris,or database. If the information present in the database behavioural characterstics like and the information provided by the user are found to voice[3] ,handwriting[4],signature[5],keystrokedyna be the same, then the user is to be accessed. If the mics ,physiological biometics is biological/chemical information provided by the user does not match with traits that are innate and behavioural biometrics are what is present in the database, then the error mannerisms or traits that are learned or acquired. message is displayed to the user. Biometrics based on typing patterns are different in that. It is very cheap to implement, more distributed and more unobtrusive than conventional biometric procedures. Because It simply require a collecting data on a persons typing patterns keyboard and to collect data by using software. This is 256 | P a g e
  • 2. K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259 are added together producing a combined value uj. The weighted sum (uj) is given to a transfer function, σ, which outputs a value hj. The outputs from the hidden layer are given to the output layer. Output Layer — In the output layer the neuron has been arrived from hidden layer, the value that we are getting from e hidden layer neuron is multiplied by a weight (wkj), and the resulting weighted values are added together producing a combined value vj. The weighted sum (vj) is given into a transfer function, σ, which outputs a value yk. The y values are the outputs of the network. 2. BACK PROPOGATION ALGORITHM To train a neural network we need to perform some task, for that we must adjust the weights of each unit in such a way that the error between the desired output and the actual output is FIG 1.Existing user authentication system[7] reduced [10]. In order to reduce the error the process requires the neural network to compute the error III. LITERATURE SURVEY derivative of the weights (EW). , the process must 1.THE MULTILAYER PERCEPTRON NEURAL NETWORK calculate how the error changes as each weight is MODEL increased or decreased slightly to calculate the error The below fig shows the multiperceptron neural derivative of weights(EW) back propogation network consists of three layers algorithm is the efficient one. if all the units in the network are linear back-propagation algorithm is easy to understand. The algorithm computes each EW by first computing the EA, the rate at which the error changes as the activity level of a unit is changed. For output units, the EA is simply the difference between the actual and the desired output. To compute the EA for a hidden unit in the layer just before the output layer, first we identify all the weights between that hidden unit and the output units to which it is connected. We can multiply those weights with the EAs of those output units and add the products. For the chosen FIG 2.MULTIPERCEPTRON NEURAL hidden unit this sum equals the EA . we can compute NETWORK[8] in like fashion the EAs for other layers, After calculating all the EAs in the hidden layer just before This network has three layers they are input the output layer moving from layer to layer in a layer (on the left) with three neurons, one hidden direction opposite to the way activities propagate layer (in the middle) with three neurons and an output through the network. This is what gives back layer (on the right) with three neurons[9]. propagation its name. Once the EA has been A neuron is present with a predictor variable in the computed for a unit, it is straight forward to compute input layer. In the case of categorical variables, To the EW for each incoming connection of the unit. represent the N categories of the variable, N-1 The EW is the product of the EA and the activity neurons are used. through the incoming connection. Input Layer —In the input layer A vector of predictor variable values (x1...xp) is presented. The 3. MODIFIED K-MEANS ALGORITHM: range of each variable is -1 to 1. It distributes the The clustering problem can be stated as values to each of the neurons in the hidden layer. In follows. Given p patterns in an n dimensional metric addition to the predictor variables, there is a constant space, determine a partition of patterns into K groups, input of 1.0, called the bias that is fed to each of the or clusters. For the purposes of this experiment the hidden layers; the bias is multiplied by a weight and number of clusters is set to two. The modified K- added to the sum going into the neuron. means cluster algorithm is as follows[11-14] . Hidden Layer —Iin the hidden layer a neuron has to be arrived from input layer, the value 1.By selecting two points as the centroids of the that are arrived from each input neuron is multiplied respective or same cluster select an initial partition by a weight (wji ), and the resulting weighted values with 2 clusters . 257 | P a g e
  • 3. K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259 2.Based on the allocation function generate a new computations are needed. partition by assigning each pattern to a cluster a point is allocated to a cluster if it is closer to the centroid of V. RESULTS & DISCUSSION the cluster and The distance is measured using the These are results by using multilayer particular metric being considered. perceptron network and k-means algorithm similarly 3. Based on the representation scheme we can we get approximate result by using local search compute the new cluster identities (centroids). This is algorithm. Similarly we get the best results by using known as weighted average of the reciprocal alternate training networks. distances. However results of individual person was 4. Repeat steps 2 and 3 until we get a near optimum accumulated and the average rate of correct value of the cluster criterion is found. To allow classification for both methods and representation different metric space It is the square error criterion were to be calculated.It seems to be huge difference to be modified. in the rate of different users. 5. Repeat steps 2 to 4 until cluster membership stabilizes. 6. Perform steps 1 to 5 for 100 repetitions and record the resulting clusters. The cluster configuration with the most occurrences is considered to be the correct partition of the data set. For classifying the typing patterns Eight metrics were to be investigated in order to explore the effect of different metric spaces. Some of the metrics was of the correlation type, e.g. Correlation Coefficient and Kendall‟s Correlation Coefficient. Others are more intuitive measures of distance, e.g. Euclidean and City Block. There were also non-linear metrics, e.g. Minkowsky, Camberra, Chebyshev andQuadratic. The most successful metric was found to be the FIG 3.Authentic user recognition and Impostor Camberra Metric. rejection using MLP[15] IV PROPOSED SYSTEM For example,among all users, some of the LOCAL SEARCH ALGORITHM: users managed to achieve 100% acceptance but some For solving computational problems Local of the users accomprised less than 50% acceptance. Search is one of the optimization method. LS moves This implies that observation would be the impose from candidate solution to a neighbouring solution rejection rates as well. Moreover average acceptance interatively, we have applied this fundamental rate for the legal user was found to be 84% and85%. methodology on the multi-layer ENN. We define a vector V whose elements include all adaptable parameters (weights between all layers and thresholds of each neuron) as V = (w11 , w12 ,...wij ...,θ1 ,θ 2 ,...,θ i ,...) By using local search algorithm the error function can be minimised. It performs the local search iteratively and minimizes the error measure function along with the set of decent directions directly. The current iteration is not a stationary point Sufficient search directions are included to guarantee, By this we can find the nearest minima efficiently. Furthermore, the learning is performed by simply changing the weight and threshold vectors by a small positive or negative FIG 4. Authentic user recognition and Impostor constant, and accepting the change if it produces a rejection using clustering Algorithms[15] smaller error measure. This is simple to specify and implement in By observing the graph, it can be seen that hardware applications for the following reasons: As a the impostors were able to better act on the legal direct search method, no back propagation pass is users after having observed legal users keying in their needed and only a forward path is required. no respective passwords. For cluster analysis, we found bidirectional circuits and hardware for the back that there was a slight decrease in the rejection rate of propagation are needed, in terms of analog the impostor when the subject observed the implementations. To generate the derivative no authorised user‟s typing pattern. complex analog multipliers and other analog 258 | P a g e
  • 4. K.D.V.S.Anil kumar, M.suman, A.Ramakrishna, Dr.A.S.N.Chakravarthy / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.256-259 As far as concerned the ongoing research biometric [9] http://www.dtreg.com/mlfn.htm last date typing could not replace the accuracy of user visited on 05/03/12. identification using passwords. It is due to the fact [10] that variation in one‟s typing patterns based on the http://www.doc.ic.ac.uk/~nd/surprise_96/jou factors such as users mental situation example rnal/vol4/cs11/report.html#The Back- tiredness or physical injury. This shows that the Propagation Algorithm. analysis of the data and last interval definitely have [11] Eric Backer, “Computer Assisted Reasoning standard deviation than compared to other in Cluster Analysis”, Prentice Hall,1995. measurements. [12] R.S.Michalski, R.E.Stepp, E. Diday,”A The research also shows that the observation recent advance in Data Analysis: Clustering that users tended to wait for a variable time interval Objects into Classes Characterised by before pressing the return key. Conjunctive Concepts”, North Holland Publishing company,1981. VII CONCLUSION & FUTURE SCOPE [13] Richard O. Duda, Peter E Hart, “Pattern The proposed paper shows that keystroke is classification andf scene analysis”,John a special kind of biometric which can be used as Wiley & sons,Inc.,1973. special features for an additional and transparent [14] M.R.Anderbeg, “Cluster Analysis for layer for user authentication. It also investigates the Applications”,Academic Press,1973. use of local search algorithm for a detection method [15] Leenesh Kumar MAISURIA, Cheng Soon for keystroke patterns. ONG & Weng Kin LAI <lai@mimos.my>Information Management We can enhance the local search algorithm and Computational Intelligence Research by adding special features to overcome the Group MIMOS Berhad.Technology Park difficulties that the local search algorithm is suffering. Malaysia 57000 Kuala By using alternate algorithms .and training networks Lumpur,MALAYSIA. we can get the best security keystroke mechanism. REFERENCES [1] voth.D(2003), 'Face Recognition Technology‟ ,IEEE Intelligent Systems, vol.18,No. 3, pp.4-7. [2] shu W. and Zhang.D(1998),‟Automated Personal Identification by Palmprint‟, Optical Engineering,vol.37,No.8,pp.2359- 2362. [3] Shaughnessy .D (1986), „Speaker Recognition‟, IEEE ASSP Magazine, Vol. 3, No. 4, pp. 4-17. [4] Tappert .C.C (2009), „Rationale for adaptive online handwriting recognition‟, Proceedings of International Workshop on Frontiers in Handwriting Recognition, , Montreal, Canada, pp. 13-22. [5] Herbst .N and Liu .C (1977), „Automatic Signature Verification based on Accelerometry‟, IBM Journal of Research and Development, Vol. 21, pp. 245-253. [6] http://en.wikipedia.org/w/index.php?search= keystroke+authentication&title=Special%3 ASearch. Last date visited on 05/03/12. [7] http://www.authorstream.com/Presentation/a SGuest129364-1358874-keystroke-analysis- improved-authentication-mechanism last date visited on 05/03/12. [8] S.Haykin “NEURAL NETWORKS : A Comprehensive Foundation”, Prentice hall 1994. 259 | P a g e