A new non-intrusive authentication approach for data protection based on mouse dynamics

Chien Cheng Lin, Chin Chun Chang, Deron Liang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

Mouse-dynamics-related schemes have been shown to be feasible for user authentication systems, however, the existing approaches are either intrusive or not prompt response. Preventing unauthorized accesses to critical digital assets, namely, data stored in the file management system, is one of the major objectives of user authentication. We therefore propose a non-intrusive approach capable of verifying a user having performed a few times of file-related operations via a mouse. To evaluate the effectiveness of the proposed approach, the mouse movement of the file-related operations in Explorer, which is the most common way to search, open, save, copy, and/or delete files in Windows environments, is used for authentication. The experimental results show that the proposed approach is feasible and has three advantages: 1) it is non-intrusive, 2) it authenticates users in a short period of time, and 3) the quantity of mouse dynamics used for authentication purpose is lightweight.

Original languageEnglish
Title of host publicationProceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
Pages9-14
Number of pages6
DOIs
StatePublished - 2012
Event2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012 - Taipei, Taiwan
Duration: 26 Mar 201229 Mar 2012

Publication series

NameProceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012

Conference

Conference2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
Country/TerritoryTaiwan
CityTaipei
Period26/03/1229/03/12

Keywords

  • behavioral biometrics
  • Mouse dynamics
  • user authentication

Fingerprint

Dive into the research topics of 'A new non-intrusive authentication approach for data protection based on mouse dynamics'. Together they form a unique fingerprint.

Cite this