2008
DOI: 10.1109/tsmcc.2008.2001696
|View full text |Cite
|
Sign up to set email alerts
|

Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(47 citation statements)
references
References 28 publications
0
46
0
1
Order By: Relevance
“…Both classical statistical methods [39,46] and advanced machine learning approaches have been used, including K-Nearest Neighbor (KNN) classifiers [21,112], K-means methods [59], Bayesian classifiers [81], Fuzzy logic [44], Boost learning [8], and Random Forests [8,76], etc. Support vector machine (SVM) is a powerful machine learning method which computes decision boundaries by maximizing the margin in order to reduce the generalization error.…”
Section: Keystroke Dynamics Classification Using Statistical and Advamentioning
confidence: 99%
See 1 more Smart Citation
“…Both classical statistical methods [39,46] and advanced machine learning approaches have been used, including K-Nearest Neighbor (KNN) classifiers [21,112], K-means methods [59], Bayesian classifiers [81], Fuzzy logic [44], Boost learning [8], and Random Forests [8,76], etc. Support vector machine (SVM) is a powerful machine learning method which computes decision boundaries by maximizing the margin in order to reduce the generalization error.…”
Section: Keystroke Dynamics Classification Using Statistical and Advamentioning
confidence: 99%
“…Chen and Chang [20] and Jiang et al [56] have respectively used Hidden Markov Models to learn the non-deterministic temporal dynamics in typing rhythms. A Gaussian mixture model approach has been used in [46] as well.…”
Section: Keystroke Dynamics Classification Using Statistical and Advamentioning
confidence: 99%
“…The long history of keystroke research has also resulted in other various approaches, including K-means methods [32], fuzzy logic [29], fuzzy ARTMAP, histogram equalization of time intervals, Gaussian mixture model (GMM) [33], hidden Markov model (HMM), and genetic algorithms.…”
Section: The Literature Surveymentioning
confidence: 99%
“…At testing time, a keystroke feature is evaluated against the genuine user's GMM, and a threshold is applied to the likelihood of the feature vector to make the decision [33]. The idea of GMM-UBM is to train another GMM from a large pool of the so-called background subjects (except for the genuine user and the testing subjects), in addition to a GMM for each genuine subject.…”
Section: Gmm-ubmmentioning
confidence: 99%
“…다른 생체 기반 정보의 경우, 2차 인증에 사용되기 위해 서는 추가적인 하드웨어의 설치가 필수적인 반면에, 키스트로 크 다이나믹스는 유일하게 소프트웨어만으로 개인의 생체 기 반 정보를 처리할 수 있는 장점으로 인하여 웹 기반 서비스의 대표적인 2차 인증 방법론으로 널리 연구되어 왔다 (Giot et al, 2010;Monrose et al, 2002;Monrose and Rubin, 2000;Peacock et al, 2004). (Chen and Chang, 2004;Hosseinzadeh and Krishnan, 2008;Sinthupinyo et al, 2009;Sheng et al, 2005;Zhang et al, 2010). 일반적으로 인증 알고리즘의 복잡도가 증가할수록 등록 단계에서 요구하는 정상적 사용자 의 키스트로크 다이나믹스 데이터 수집 횟수는 증가한다 (Kang et al, 2008 …”
Section: 서 론 정보통신 기술의 꾸준한 발전과 함께 언제 어디서나 접속이 가능한 유비쿼터스 네트워크(Ubiquitouunclassified