The major problem in the computer system is that users are now able to access data from remote places and perform transaction online. This paper reports on the experiment and performance of using keystroke dynamics as a user authentication method. The work is designed such that it is possible for the computer system to identify authorized and unauthorized user. This is desired to control access to a system that will assign the authorized user upon entering the system. The technique used to discriminate the data is Neural Network. This paper describes the application of neural networks to the problem of identifying specific users through the typing characteristics exhibited when typing their own name. The test carried out uses two kinds of neural network model, i.e. ADALINE and Backpropagation Network. A comparison of these two techniques are presented.
[1]
John J. Leggett,et al.
Dynamic Identity Verification via Keystroke Characteristics
,
1991,
Int. J. Man Mach. Stud..
[2]
B. Miller,et al.
Vital signs of identity [biometrics]
,
1994,
IEEE Spectrum.
[3]
Simon Haykin,et al.
Neural Networks: A Comprehensive Foundation
,
1998
.
[4]
Jacek M. Zurada,et al.
Introduction to artificial neural systems
,
1992
.
[5]
Christopher M. Bishop,et al.
Neural networks for pattern recognition
,
1995
.
[6]
K. Yale.
Preparng the right data diet for training neural networks
,
1997
.
[7]
John J. Leggett,et al.
Verifying Identity via Keystroke Characteristics
,
1988,
Int. J. Man Mach. Stud..