TY - GEN
T1 - A new non-intrusive authentication approach for data protection based on mouse dynamics
AU - Lin, Chien Cheng
AU - Chang, Chin Chun
AU - Liang, Deron
PY - 2012
Y1 - 2012
N2 - Mouse-dynamics-related schemes have been shown to be feasible for user authentication systems, however, the existing approaches are either intrusive or not prompt response. Preventing unauthorized accesses to critical digital assets, namely, data stored in the file management system, is one of the major objectives of user authentication. We therefore propose a non-intrusive approach capable of verifying a user having performed a few times of file-related operations via a mouse. To evaluate the effectiveness of the proposed approach, the mouse movement of the file-related operations in Explorer, which is the most common way to search, open, save, copy, and/or delete files in Windows environments, is used for authentication. The experimental results show that the proposed approach is feasible and has three advantages: 1) it is non-intrusive, 2) it authenticates users in a short period of time, and 3) the quantity of mouse dynamics used for authentication purpose is lightweight.
AB - Mouse-dynamics-related schemes have been shown to be feasible for user authentication systems, however, the existing approaches are either intrusive or not prompt response. Preventing unauthorized accesses to critical digital assets, namely, data stored in the file management system, is one of the major objectives of user authentication. We therefore propose a non-intrusive approach capable of verifying a user having performed a few times of file-related operations via a mouse. To evaluate the effectiveness of the proposed approach, the mouse movement of the file-related operations in Explorer, which is the most common way to search, open, save, copy, and/or delete files in Windows environments, is used for authentication. The experimental results show that the proposed approach is feasible and has three advantages: 1) it is non-intrusive, 2) it authenticates users in a short period of time, and 3) the quantity of mouse dynamics used for authentication purpose is lightweight.
KW - behavioral biometrics
KW - Mouse dynamics
KW - user authentication
UR - http://www.scopus.com/inward/record.url?scp=84862067769&partnerID=8YFLogxK
U2 - 10.1109/ISBAST.2012.11
DO - 10.1109/ISBAST.2012.11
M3 - 會議論文篇章
AN - SCOPUS:84862067769
SN - 9780769546964
T3 - Proceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
SP - 9
EP - 14
BT - Proceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
T2 - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
Y2 - 26 March 2012 through 29 March 2012
ER -