Design and evaluation of a pressure based typing biometric authentication system
The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing circuit, and data acquisition devices to generate waveforms, which when concatenated, produ...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
InTech - Open Access Publisher
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/7049/1/Chapter.pdf http://irep.iium.edu.my/7049/ http://www.intechopen.com/books/show/title/biometric-systems-design-and-applications |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
Summary: | The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing circuit, and data acquisition devices to generate waveforms, which when concatenated, produce a pattern for the typed password. The system generates two templates for typed passwords. First template is for the force applied on each password key pressed. The second template is for latency of the password
keys. These templates are analyzed using two classifiers. Autoregressive (AR) classifier is used to authenticate the pressure template. Latency classifier is used to authenticate the latency template. Authentication is complete by matching the results of these classifiers concurrently. The proposed system has been implemented by constructing users’ database patterns which are later matched to the biometric patterns entered by each user, thereby enabling the systemto accept or reject the user. Experiments have been conducted to test the performance of the overall PBAS system and results obtained showed that this proposed system is reliable with many potential applications for computer security. |
---|