Mouse tracking, behavioral biometrics, and GEFE

In this paper, we introduce a mouse movement behavioral biometric that involves image feature extraction using Genetic and Evolutionary Computations (GECs). This technique is referred to as Genetic and Evolutionary Feature Extraction (GEFE), and has been successfully used on a number of different biometrics. The data collector used in this paper is one where a user moves the mouse in an attempt to bring up a username/password dialog interface. This data collector traces the user's mouse movement to waken the dialog and represents that as an image. Our results suggest that mouse movement can be used to successfully distinguish between users.

[1]  Karl Ricanek,et al.  Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks , 2012, CSER.

[2]  Gerry V. Dozier,et al.  Permutation-based biometric authentication protocols for mitigating replay attacks , 2012, 2012 IEEE Congress on Evolutionary Computation.

[3]  Ashok A. Ghatol,et al.  Iris recognition: an emerging biometric technology , 2007 .

[4]  J. A. Lozano,et al.  Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation , 2001 .

[5]  Marios Savvides,et al.  Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[6]  Mingyue Li,et al.  Security vulnerabilities of an remote password authentication scheme with smart card , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[7]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[8]  Kenneth Revett A Bioinformatics Based Approach to Behavioural Biometrics , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.

[9]  Anil K. Jain,et al.  Handbook of Face Recognition, 2nd Edition , 2011 .

[10]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Thomas Bäck,et al.  Evolutionary computation: Toward a new philosophy of machine intelligence , 1997, Complex..

[12]  Henry C. Lee,et al.  Advances in Fingerprint Technology , 1991 .

[13]  Damon L. Woodard,et al.  Genetic based LBP feature extraction and selection for facial recognition , 2011, ACM-SE '11.

[14]  A. Ant Ozok,et al.  Perception and acceptance of fingerprint biometric technology , 2007, SOUPS '07.

[15]  Ariel Rabkin,et al.  Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.

[16]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[17]  Pedro Larrañaga,et al.  Estimation of Distribution Algorithms , 2002, Genetic Algorithms and Evolutionary Computation.

[18]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[19]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[20]  Lawrence. Davis,et al.  Handbook Of Genetic Algorithms , 1990 .

[21]  Nenghai Yu,et al.  A Security Enhanced Remote Password Authentication Scheme Using Smart Card , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.

[22]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[23]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[24]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..