Design and evaluation of a pressure based typing biometric authentication system

The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing circuit, and data acquisition devices to generate waveforms, which when concatenated, produ...

Full description

Saved in:
Bibliographic Details
Main Authors: Salami, Momoh Jimoh Emiyoka, Eltahir, Wasil, Ali, Hasimah
Other Authors: Riaz, Zahid
Format: Book Chapter
Language:English
Published: InTech - Open Access Publisher 2011
Subjects:
Online Access:http://irep.iium.edu.my/7049/1/Chapter.pdf
http://irep.iium.edu.my/7049/
http://www.intechopen.com/books/show/title/biometric-systems-design-and-applications
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Description
Summary:The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing circuit, and data acquisition devices to generate waveforms, which when concatenated, produce a pattern for the typed password. The system generates two templates for typed passwords. First template is for the force applied on each password key pressed. The second template is for latency of the password keys. These templates are analyzed using two classifiers. Autoregressive (AR) classifier is used to authenticate the pressure template. Latency classifier is used to authenticate the latency template. Authentication is complete by matching the results of these classifiers concurrently. The proposed system has been implemented by constructing users’ database patterns which are later matched to the biometric patterns entered by each user, thereby enabling the systemto accept or reject the user. Experiments have been conducted to test the performance of the overall PBAS system and results obtained showed that this proposed system is reliable with many potential applications for computer security.