Biometric Data Mining Applied to On-line Recognition Systems

Data mining has become an increasingly popular activity in all areas of research, from business to science, biometrics being no exception. Data mining is the computer-intensive activity of exploring large data sets with the purpose of discovering, within a subset of data, some relationship of patterns or hypothesis that may be worthy of further study (Hernandez-Aguilar et al., 2008; Amaratunga & Cabrera, 2004). According to a widely accepted definition, knowledge discovery in databases (KDD), more widely known as data mining, is a non-trivial process of identifying valid, novel, potentially useful and understandable patterns in data (Fayyad et al., 1996).

[1]  R. W. Johnson,et al.  Mining Data to Find Subsets of High Activity , 2001 .

[2]  Brian C. Lovell,et al.  Robust Face Recognition for Data Mining , 2009, Encyclopedia of Data Warehousing and Mining.

[3]  Neil Yager,et al.  Biometric system and data analysis , 2008 .

[4]  Ronnie Cohen,et al.  Internet Law and Policy , 2002 .

[5]  Heather Richter Lipford,et al.  Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.

[6]  Gintautas Dzemyda,et al.  Web-based biometric mouse decision support system for user's emotional and labour productivity analysis , 2008 .

[7]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery: An Overview , 1996, Advances in Knowledge Discovery and Data Mining.

[8]  K. Revett,et al.  Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets , 2005, 2005 portuguese conference on artificial intelligence.

[9]  Catherine Blake,et al.  UCI Repository of machine learning databases , 1998 .

[10]  Gediminas Adomavicius,et al.  Using Data Mining Methods to Build Customer Profiles , 2001, Computer.

[11]  Pamela Effrein Sandstrom,et al.  Information Foraging Theory: Adaptive Interaction with Information , 2010, J. Assoc. Inf. Sci. Technol..

[12]  K. Strater,et al.  Strategies and struggles with privacy in an online social networking community , 2008 .

[13]  Pranav Shah,et al.  Mouse Movements Biometric Identification: A Feasibility Study , 2007 .

[14]  José Alberto Hernández Aguilar,et al.  Design and Implementation of an Advanced Security Remote Assessment System for Universities Using Data Mining , 2010, Computación y Sistemas.

[15]  Balaji Padmanabhan,et al.  Toward user patterns for online security: Observation time and online user identification , 2010, Decis. Support Syst..

[16]  Clara Eusebi,et al.  A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data , 2008 .

[17]  Gregory Shalhoub,et al.  Stylometry System - Use Cases and Feasibility Study , 2010 .

[18]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[19]  Sirkka L. Jarvenpaa,et al.  Consumer trust in an Internet store , 2000, Inf. Technol. Manag..

[20]  Peter Pirolli,et al.  Information foraging theory , 2007 .

[21]  W. R. Howard Biometric System and Data Analysis: Design, Evaluation, and Data Mining , 2009 .

[22]  Adnan Amin,et al.  Fingerprint classification: a review , 2004, Pattern Analysis and Applications.

[23]  José Alberto Hernández,et al.  Biometrics in Online Assessments: A Study Case in High School Students , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[24]  Graham J. Williams,et al.  Data Mining , 2000, Communications in Computer and Information Science.

[25]  Neil Yager,et al.  Biometric System and Data Analysis: Design, Evaluation, and Data Mining , 2010 .

[26]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[27]  Arturo Hernández Aguirre,et al.  Identify an Adequate Anthropometry to Water Polo Using Social Data Mining , 2009, 2009 International Conference on Electrical, Communications, and Computers.