2013
DOI: 10.1155/2013/565183
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets

Abstract: User authentication using keystroke dynamics offers many advances in the domain of cyber security, including no extra hardware cost, continuous monitoring, and nonintrusiveness. Many algorithms have been proposed in the literature. Here, we introduce two new algorithms to the domain: the Gaussian mixture model with the universal background model (GMM-UBM) and the deep belief nets (DBN). Unlike most existing approaches, which only use genuine users' data at training time, these two generative model-based approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(37 citation statements)
references
References 27 publications
0
37
0
Order By: Relevance
“…They improved EER by 0.9% and ZMFAR by 4.5% compared to the best results in [11]. Furthermore, the Gaussian mixture model (GMM) was applied [17] producing EER of 0.087. Despite the authors also reported additional even better results we omit them here as the testing procedure was different from the one described in [11] making the fair comparison impossible.…”
Section: Related Workmentioning
confidence: 97%
“…They improved EER by 0.9% and ZMFAR by 4.5% compared to the best results in [11]. Furthermore, the Gaussian mixture model (GMM) was applied [17] producing EER of 0.087. Despite the authors also reported additional even better results we omit them here as the testing procedure was different from the one described in [11] making the fair comparison impossible.…”
Section: Related Workmentioning
confidence: 97%
“…Traditionally, these included keyboards, [11], [15], [19], and mouse [2], [18], [38]. Now, modern smartphones also provide an array of sensor information, which can be used similarly to construct user profiles based on touchscreen swipes [4], [14], gait analysis [12], [27], and other metrics.…”
Section: A Behavioral Biometricsmentioning
confidence: 99%
“…Both approaches have achieved the most competitive performances reported for the CMU benchmark dataset among more than 14 different systems. Both systems include training/modeling stages based exclusively on genuine data and other promising systems were discarded because they include impostor data during the training phase [23]. The approaches used in the experimental evaluation made in this paper are:…”
Section: Baseline Systemsmentioning
confidence: 99%