SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 33-36
www.iosrjournals.org
www.iosrjournals.org 33 | Page
User Identity Verification Using Mouse Signature
B J Gorad, D.V Kodavade
1
(Computer Science & Engineering, Sharad Institute of Technology College of Engineering, Ichalkaranji,
Maharashtra, India)
(Computer Science & Engineering, D.K.T.E Society’s Textile & Engineering Institute, Ichalkaranji,
Maharashtra, India)
Abstract : Stealing Identity of the user is a crime in which hackers does the unauthorized activity under the
stolen identity by using credentials such as passwords, usernames etc. User verification system provides
security layer in addition to username and password by continuously validating the identity of the logged-on
user based on their behavioral and physiological characteristics. We introduced a novel method that
continuously verifies the user according to characteristics of their interaction with the mouse. The research
contribution is in two parts. First, user signature is created according to the user’s interaction with mouse while
he is doing some predefined activity such as, drawing any alphabet or his signature on canvas application and it
gets stored in a database and used for verification purpose. In the second part design hierarchy, to generate a
user signature for the current session is discussed. The paper also discusses a decision making system to take
decision about to continue the log in or log out from the system based on matching of his current signature and
previously created signature. The system developed gives better verification accuracy by reducing the response
time of the system.
Index Terms— LC – Left click, RC – Right Click, DC- Double Click, MM- Mouse Move etc
I. INTRODUCTION
Currently most computer Systems and online websites, identifies users by means of user names and
passwords/ PINS. But normally hackers can easily steal the password with the help of so many techniques.
Some of the techniques are phishing attacks, key logger and so on. Also sometimes a user‟s computer remains
unlocked at that time hackers can install the key logger in user‟s computer or by sending some links to that
computer, Ex. Greetings or some images etc. if user clicks on that link key logger installs on that computer, it
records every keystroke including passwords, usernames, screen shots after 5-5 minutes. Also they can send that
hacked data to hackers without knowing to user.
The drawback of normal identification methods that only based on credentials lead to the introduction
of user authentication and verification techniques that are based on behavioral and physiological biometrics
which are assumed to be unique to each other and hard to steal. Authentication is performed once during the
login while verification is performed continuously throughout the session. Identity Verification can be achieved
by using one of the two techniques, either by Behavioral biometric system or Physiological Biometric system.
The behavioral biometric feature includes characteristics of interaction of user and input devices such as mouse
and keyboard. And physiological biometric use the human feature that is unique to individuals. For Examples:
fingerprints, iris patterns, face, blinking patterns, lip movement, gait/stride, voice/speech, signature/handwriting
etc.
Thus, systems utilizing biometric user verification require a hacker who wants to infiltrate the system not
only to steal the credentials of the user but also to mimic the user‟s behavioral and/or physiological biometrics
making identity thefts much harder. We are focused to implement a behavioral biometric system because it does
not require dedicated hardware‟s as in physiological it requires. Obviously cost to implement this system is not
more than physiological system
II. RELEVANT LITERATURE
Most common behavioral biometric verification techniques are based on: (a) mouse
dynamics[1][2][3][4], which are derived from the user-mouse interaction and are the focus of this paper; (b)
keystroke dynamics[6][7][8], which are derived from the keyboard activity; and (c) software interaction,
which rely on features extracted from the interaction of a user with a specific software tool (somewhat our
system falls in this category also).
Submitted date 22 June 2013 Accepted Date: 27 June 2013
User Identity Verification using Mouse Signature
www.iosrjournals.org 34 | Page
Behavioral methods can also be characterized according to the learning approach that they employ.
Explicit learning methods monitor user activity while performing a predefined task such as playing a memory
game, this method falls in this category. Implicit learning techniques, on the other hand, monitor the user
during general day-to-day computer activity rather than during the performance of a specific task –Explicit and
implicit methods are also referred to as static and dynamic methods [1], respectively. Implicit learning is
considered more challenging due to high inconsistency owed to the variety of the performed tasks, mood
changes and other influential factors. Nevertheless, it is the best way to learn unique user behavior
characteristics such as frequently performed actions. Since biometric-based verification systems are a special
case of classifiers, their performance is evaluated using similar measurements.
III. PROPOSED MODEL
We propose a novel verification method which verifies a user based on each individual mouse action.
This method requires the aggregation of dozens of mouse coordinates and its activities before accurate
verification can be performed. Verification of each individual mouse action increases the accuracy while
reducing the time that is needed to verify the identity of the user since the fewer actions are required to achieve a
specific accuracy level, as compared to the histogram- based approach which is explained in [1].
The general block diagram of the proposed system is shown in fig. 1
Event
Acquisition
Feature
Extraction
Classifier
(Similarity
match)
Signatures
db
Fig.1 General Block diagram of proposed system
A biometric-based user verification system is essentially a pattern recognition system that acquires biometric
data from an individual, extracts a feature set to establish a unique user signature and constructs a verification
model to classify (Similarity Match) between the user signature‟s.
In above diagram no 1 -
Green Signal- Authorized user
Red Signal – Unauthorized user/ Hacker
3.1. General architecture
Fig. 1 depicts the architecture of a behavioral biometric user verification system. Such systems include the
following components:
-Event acquisition – captures the events generated by the various input devices used for the interaction (e.g.
Keyboard, mouse) via their drivers, Events can be mouse move (MM), left down (LD), left up (LU), right down
(RD), right up (RU), silence (S) etc.
-Feature extraction – High level features [1]can be extracted from that events and the signature will be
constructed which characterizes the behavioral biometrics of the user, The features may include Mouse Move
Sequence (MMS), Left Click (LC), Right Click (RC) etc.
-Classifier – Consists of an inducer (e.g. Support Vector Machines, ANN, Random Forest Classifier etc.) that is
used to build the user verification model to classify the signatures. During verification, the induced model is
used to classify new samples acquired from the user. Any classifiers can be used depend on its availability and
its knowledge [1].
-Signature database – A database is used to store the signature of user. If multiple users exist for system, then
upon the entry of a username, signature of that user will retrieve for verification process [1].
In the database, the signature will consist number of mouse moves; number of left clicks, number of
right clicks, number of silence along with time intervals and aggregation of mouse Co-ordinates.
Same type of signature will be created for every session.
User Identity Verification using Mouse Signature
www.iosrjournals.org 35 | Page
Data Flow Diagrams for proposed model:
Fig. 2 User Registration Process(Admin)
Fig. 3 User Verification Process (Admin/ User)
In this proposed system, users have to register first. Registration is done at the start by opening the
canvas and drawing an alphabet or sequence of alphabets, after saving it, it will be the signature for that
respective user. Next time when user will start the system, obviously first he has to login into the system using
credentials such as username and password. As usually users will enter his username and password which is
already assigned to him, and he will do his daily activity. During his daily activity after some interval canvas will
pop up, and it will ask to draw his signature and he has to draw the signature, so a temporary signature is created
for that session. Finally the verification model compares the current sessions signature and initially created
signature. In all the times both signature will not match exactly but we can give some range (matching is in
between 80% to 100% etc), the user will be authenticated else the system will log out.
We are recommending Random forest Classifier to build the verification model. During the pop up of canvas all
other features of computer system will be locked, the user should not be able to do anything than drawing his
signature.
If the user is drawing wrong signature continuously three times then the system will identify the logged in user is
a hacker, he has stolen the credentials and the entire system will lock so he will not use the entire system at all.
The login continuation of computer system or discontinuation will totally depend on percentage of matching of
signatures.
User Identity Verification using Mouse Signature
www.iosrjournals.org 36 | Page
Final Decision = {Yes /No}
IV. CONCLUSION
Hence we can conclude that, User Verification System using mouse signature will give one more
additional security layer in addition to the normal security layer. Obviously to infiltrate the computer system will
be harder using this method because the hacker has not only to steal the credentials of authorized user but also he
has to mimic the user‟s behavior, and it‟s normally impossible.
V. FUTURE SCOPE
In future, this system can be implemented for an implicit behavioral biometric system. Also some
extension can be done to this system to give better security, as after logout of the system due to more than three
times not matching of signature, random password can be generated and it will send to the registered user‟s
mobile number, so hackers can't login again by using old username and password.
References
[1]. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar, “User identity verification via mouse dynamics”,
Information Sciences 201 (2012) 19–36.
[2]. Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, and Roy A. Maxion, User Authentication Through Mouse Dynamics.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYVOL. 8, NO. 1, Jan 2013
[3]. Zach Jorgensen and Ting Yu, On Mouse Dynamics as a Behavioral Biometric for Authentication. ACM 978-1-4503-0564-8/March
2011.
[4]. Z. Jorgensen, T. Yu, “On mouse dynamics as a behavioral biometric for authentication, in: Proceedings of the Sixth ACM
Symposium on Information, Computer, and Communications Security” (AsiaCCS), March 2011
[5]. Saurabh Singh, Dr K V Arya, “Mouse Interaction based Authentication System by Classifying the Distance Traveled by the Mouse”
International Journal of Computer Applications (0975 – 8887) Volume 17– No.1, March 2011
[6]. Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárraga, Lee L. Ling, andJoão B. T. Yabu-Uti, “User Authentication
through Typing Biometrics Features, IEEE Transactions on Signal Processing”, Vol. 53, No. 2, February 2005
[7]. S. Cho, C. Han, D.H. Han, H.I. Kim, “Web-based keystroke dynamics identity verification using neural network, Journal of
Organizational Computing and Electronic Commerce” 10 (4) (2000) 295–307.
[8]. L. Ballard, D. Lopresti, F. Monrose, “Evaluating the security of handwriting biometrics, in: The 10th International Workshop on
Frontiers in Handwriting Recognition” (IWFHR „06), La Baule, France, 2006.
[9]. H. Gamboa, A. Fred, “An identity authentication system based on human computer interaction behavior, in: 3rd International
Workshop on Pattern Recognition on Information Systems”, 2003, pp. 46–55.

More Related Content

What's hot

Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
eSAT Journals
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 

What's hot (20)

Authentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and ImagesAuthentication Schemes for Session Passwords using Color and Images
Authentication Schemes for Session Passwords using Color and Images
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Class paper final
Class paper finalClass paper final
Class paper final
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
C045016020
C045016020C045016020
C045016020
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
H364752
H364752H364752
H364752
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
R01754129132
R01754129132R01754129132
R01754129132
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 

Viewers also liked

A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lan
phihoanhbmt
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
Temibaybee
 
Two household items
Two household itemsTwo household items
Two household items
mharish9
 
Grouping animals that have legs
Grouping animals that have  legs Grouping animals that have  legs
Grouping animals that have legs
phooiyinloi
 
Media pitch
Media pitchMedia pitch
Media pitch
HMonan
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на дне
Natalya Dyrda
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2
lucaminetti
 

Viewers also liked (19)

DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMDESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lan
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
 
Two household items
Two household itemsTwo household items
Two household items
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
Transport1
Transport1Transport1
Transport1
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
Ficointerviewquestionsandanswers
 
Grouping animals that have legs
Grouping animals that have  legs Grouping animals that have  legs
Grouping animals that have legs
 
Media pitch
Media pitchMedia pitch
Media pitch
 
пьеса а.м. горького на дне
пьеса а.м. горького на днепьеса а.м. горького на дне
пьеса а.м. горького на дне
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2
 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1
 
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filt...
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Designing Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual WorldDesigning Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual World
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
Презентация Чечельницкого района - Проект приграничного сотрудничества Украин...
 
OFIPA
OFIPAOFIPA
OFIPA
 

Similar to User Identity Verification Using Mouse Signature

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
 
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docxRunning head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
susanschei
 

Similar to User Identity Verification Using Mouse Signature (20)

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Dynamic Behavior Authentication System
Dynamic Behavior Authentication SystemDynamic Behavior Authentication System
Dynamic Behavior Authentication System
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
 
Improvement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of PasswordsImprovement of Security Systems by Keystroke Dynamics of Passwords
Improvement of Security Systems by Keystroke Dynamics of Passwords
 
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docxRunning head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
Running head BIOMETRIC MONITORING SYSTEM 1BIOMETRIC MONIT.docx
 
J1802035460
J1802035460J1802035460
J1802035460
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 

User Identity Verification Using Mouse Signature

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 33-36 www.iosrjournals.org www.iosrjournals.org 33 | Page User Identity Verification Using Mouse Signature B J Gorad, D.V Kodavade 1 (Computer Science & Engineering, Sharad Institute of Technology College of Engineering, Ichalkaranji, Maharashtra, India) (Computer Science & Engineering, D.K.T.E Society’s Textile & Engineering Institute, Ichalkaranji, Maharashtra, India) Abstract : Stealing Identity of the user is a crime in which hackers does the unauthorized activity under the stolen identity by using credentials such as passwords, usernames etc. User verification system provides security layer in addition to username and password by continuously validating the identity of the logged-on user based on their behavioral and physiological characteristics. We introduced a novel method that continuously verifies the user according to characteristics of their interaction with the mouse. The research contribution is in two parts. First, user signature is created according to the user’s interaction with mouse while he is doing some predefined activity such as, drawing any alphabet or his signature on canvas application and it gets stored in a database and used for verification purpose. In the second part design hierarchy, to generate a user signature for the current session is discussed. The paper also discusses a decision making system to take decision about to continue the log in or log out from the system based on matching of his current signature and previously created signature. The system developed gives better verification accuracy by reducing the response time of the system. Index Terms— LC – Left click, RC – Right Click, DC- Double Click, MM- Mouse Move etc I. INTRODUCTION Currently most computer Systems and online websites, identifies users by means of user names and passwords/ PINS. But normally hackers can easily steal the password with the help of so many techniques. Some of the techniques are phishing attacks, key logger and so on. Also sometimes a user‟s computer remains unlocked at that time hackers can install the key logger in user‟s computer or by sending some links to that computer, Ex. Greetings or some images etc. if user clicks on that link key logger installs on that computer, it records every keystroke including passwords, usernames, screen shots after 5-5 minutes. Also they can send that hacked data to hackers without knowing to user. The drawback of normal identification methods that only based on credentials lead to the introduction of user authentication and verification techniques that are based on behavioral and physiological biometrics which are assumed to be unique to each other and hard to steal. Authentication is performed once during the login while verification is performed continuously throughout the session. Identity Verification can be achieved by using one of the two techniques, either by Behavioral biometric system or Physiological Biometric system. The behavioral biometric feature includes characteristics of interaction of user and input devices such as mouse and keyboard. And physiological biometric use the human feature that is unique to individuals. For Examples: fingerprints, iris patterns, face, blinking patterns, lip movement, gait/stride, voice/speech, signature/handwriting etc. Thus, systems utilizing biometric user verification require a hacker who wants to infiltrate the system not only to steal the credentials of the user but also to mimic the user‟s behavioral and/or physiological biometrics making identity thefts much harder. We are focused to implement a behavioral biometric system because it does not require dedicated hardware‟s as in physiological it requires. Obviously cost to implement this system is not more than physiological system II. RELEVANT LITERATURE Most common behavioral biometric verification techniques are based on: (a) mouse dynamics[1][2][3][4], which are derived from the user-mouse interaction and are the focus of this paper; (b) keystroke dynamics[6][7][8], which are derived from the keyboard activity; and (c) software interaction, which rely on features extracted from the interaction of a user with a specific software tool (somewhat our system falls in this category also). Submitted date 22 June 2013 Accepted Date: 27 June 2013
  • 2. User Identity Verification using Mouse Signature www.iosrjournals.org 34 | Page Behavioral methods can also be characterized according to the learning approach that they employ. Explicit learning methods monitor user activity while performing a predefined task such as playing a memory game, this method falls in this category. Implicit learning techniques, on the other hand, monitor the user during general day-to-day computer activity rather than during the performance of a specific task –Explicit and implicit methods are also referred to as static and dynamic methods [1], respectively. Implicit learning is considered more challenging due to high inconsistency owed to the variety of the performed tasks, mood changes and other influential factors. Nevertheless, it is the best way to learn unique user behavior characteristics such as frequently performed actions. Since biometric-based verification systems are a special case of classifiers, their performance is evaluated using similar measurements. III. PROPOSED MODEL We propose a novel verification method which verifies a user based on each individual mouse action. This method requires the aggregation of dozens of mouse coordinates and its activities before accurate verification can be performed. Verification of each individual mouse action increases the accuracy while reducing the time that is needed to verify the identity of the user since the fewer actions are required to achieve a specific accuracy level, as compared to the histogram- based approach which is explained in [1]. The general block diagram of the proposed system is shown in fig. 1 Event Acquisition Feature Extraction Classifier (Similarity match) Signatures db Fig.1 General Block diagram of proposed system A biometric-based user verification system is essentially a pattern recognition system that acquires biometric data from an individual, extracts a feature set to establish a unique user signature and constructs a verification model to classify (Similarity Match) between the user signature‟s. In above diagram no 1 - Green Signal- Authorized user Red Signal – Unauthorized user/ Hacker 3.1. General architecture Fig. 1 depicts the architecture of a behavioral biometric user verification system. Such systems include the following components: -Event acquisition – captures the events generated by the various input devices used for the interaction (e.g. Keyboard, mouse) via their drivers, Events can be mouse move (MM), left down (LD), left up (LU), right down (RD), right up (RU), silence (S) etc. -Feature extraction – High level features [1]can be extracted from that events and the signature will be constructed which characterizes the behavioral biometrics of the user, The features may include Mouse Move Sequence (MMS), Left Click (LC), Right Click (RC) etc. -Classifier – Consists of an inducer (e.g. Support Vector Machines, ANN, Random Forest Classifier etc.) that is used to build the user verification model to classify the signatures. During verification, the induced model is used to classify new samples acquired from the user. Any classifiers can be used depend on its availability and its knowledge [1]. -Signature database – A database is used to store the signature of user. If multiple users exist for system, then upon the entry of a username, signature of that user will retrieve for verification process [1]. In the database, the signature will consist number of mouse moves; number of left clicks, number of right clicks, number of silence along with time intervals and aggregation of mouse Co-ordinates. Same type of signature will be created for every session.
  • 3. User Identity Verification using Mouse Signature www.iosrjournals.org 35 | Page Data Flow Diagrams for proposed model: Fig. 2 User Registration Process(Admin) Fig. 3 User Verification Process (Admin/ User) In this proposed system, users have to register first. Registration is done at the start by opening the canvas and drawing an alphabet or sequence of alphabets, after saving it, it will be the signature for that respective user. Next time when user will start the system, obviously first he has to login into the system using credentials such as username and password. As usually users will enter his username and password which is already assigned to him, and he will do his daily activity. During his daily activity after some interval canvas will pop up, and it will ask to draw his signature and he has to draw the signature, so a temporary signature is created for that session. Finally the verification model compares the current sessions signature and initially created signature. In all the times both signature will not match exactly but we can give some range (matching is in between 80% to 100% etc), the user will be authenticated else the system will log out. We are recommending Random forest Classifier to build the verification model. During the pop up of canvas all other features of computer system will be locked, the user should not be able to do anything than drawing his signature. If the user is drawing wrong signature continuously three times then the system will identify the logged in user is a hacker, he has stolen the credentials and the entire system will lock so he will not use the entire system at all. The login continuation of computer system or discontinuation will totally depend on percentage of matching of signatures.
  • 4. User Identity Verification using Mouse Signature www.iosrjournals.org 36 | Page Final Decision = {Yes /No} IV. CONCLUSION Hence we can conclude that, User Verification System using mouse signature will give one more additional security layer in addition to the normal security layer. Obviously to infiltrate the computer system will be harder using this method because the hacker has not only to steal the credentials of authorized user but also he has to mimic the user‟s behavior, and it‟s normally impossible. V. FUTURE SCOPE In future, this system can be implemented for an implicit behavioral biometric system. Also some extension can be done to this system to give better security, as after logout of the system due to more than three times not matching of signature, random password can be generated and it will send to the registered user‟s mobile number, so hackers can't login again by using old username and password. References [1]. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar, “User identity verification via mouse dynamics”, Information Sciences 201 (2012) 19–36. [2]. Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, and Roy A. Maxion, User Authentication Through Mouse Dynamics. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYVOL. 8, NO. 1, Jan 2013 [3]. Zach Jorgensen and Ting Yu, On Mouse Dynamics as a Behavioral Biometric for Authentication. ACM 978-1-4503-0564-8/March 2011. [4]. Z. Jorgensen, T. Yu, “On mouse dynamics as a behavioral biometric for authentication, in: Proceedings of the Sixth ACM Symposium on Information, Computer, and Communications Security” (AsiaCCS), March 2011 [5]. Saurabh Singh, Dr K V Arya, “Mouse Interaction based Authentication System by Classifying the Distance Traveled by the Mouse” International Journal of Computer Applications (0975 – 8887) Volume 17– No.1, March 2011 [6]. Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárraga, Lee L. Ling, andJoão B. T. Yabu-Uti, “User Authentication through Typing Biometrics Features, IEEE Transactions on Signal Processing”, Vol. 53, No. 2, February 2005 [7]. S. Cho, C. Han, D.H. Han, H.I. Kim, “Web-based keystroke dynamics identity verification using neural network, Journal of Organizational Computing and Electronic Commerce” 10 (4) (2000) 295–307. [8]. L. Ballard, D. Lopresti, F. Monrose, “Evaluating the security of handwriting biometrics, in: The 10th International Workshop on Frontiers in Handwriting Recognition” (IWFHR „06), La Baule, France, 2006. [9]. H. Gamboa, A. Fred, “An identity authentication system based on human computer interaction behavior, in: 3rd International Workshop on Pattern Recognition on Information Systems”, 2003, pp. 46–55.