Abstract
We present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touchmouse [1] under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pressure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action primitives. This design serves as an assistive method to enhance existing password and biometric based security mechanisms, enabling continuous and unobtrusive personal identity monitoring. Commercialized windows-based systems can be seamlessly integrated with the proposed system and this design can offer a convenient and lightweight solution for physical computer intrusion detection.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Microsoft touch-mouse - Microsoft hardware, http://www.microsoft.com/hardware/en-us/products/touch-mouse/microsite/
Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Professional 3(1), 27–32 (2001)
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: Security and privacy concerns. IEEE Security Privacy Mag. 1(2), 33–42 (2003)
Gish, H., Siu, M.H., Rohlicek, R.: Segregation of Speakers for Speech Recognition and Speaker Identification. In: Proc. of Conference on Acoustics, Speech, and Signal Processing, pp. 14–17. ACM Press (1991)
Isenor, D.K., Zakey, S.G.: Fingerprint identification using graph matching. Pattern Recognition 19(19), 113–122 (1986)
Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. of the IEEE 85(18), 1348–1363 (1997)
Lanitis, A., Tayler, C.J., Cootes, T.F.: Automatic face identification system using flexible appearance models. Image and Vision Computing 13(13), 393–401 (1997)
Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Proc. of Conference on Computer and Communications Security, pp. 48–56. ACM Press (1997)
Rusara, M., Brodley, C.: User Re-Authentication via Mouse Movements. In: Proc. of VizSEC/DMSEC, pp. 48–56. ACM Press (2004)
Igun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Instrusion Detection Approach. In: Proc. of Software Engineering, pp. 181–199. ACM Press (1995)
Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly detection using call stack information. In: Proc. of IEEE Symposium on Security and Privacy, pp. 62–78. IEEE Press (1998)
Denning, D.E.: Forgot username/password? Software Engineering 2(13), 222–232 (1987)
Ahmed, A.A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Transaction on Dependable and Secure Computing 4(3), 165–179 (2007)
Saul, L.K., Roweis, S.T.: Think globally, fit locally: unsupervised learning of low dimensional manifolds. Journal of Machine Learning Research 4, 119–155 (2003)
Liu, J.J., Xu, W., Huang, M.C., Alshurafa, N., Sarrafzadeh, M.: A dense pressure sensitive bedsheet design for unobtrusive sleep posture monitoring. In: IEEE International Conference on Pervasive Computing and Communications, IEEE (2013)
Kouropteva, O., Okun, O., Pietikainen, M.: Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine. In: Proc. of European Symposium on Artificial Neural Networks, pp. 229–234. ESANN (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, MC., Xu, W., Liu, J.J., Su, Y., He, L., Sarrafzadeh, M. (2013). Inconspicuous Personal Computer Protection with Touch-Mouse. In: Marinos, L., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2013. Lecture Notes in Computer Science, vol 8030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39345-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-39345-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39344-0
Online ISBN: 978-3-642-39345-7
eBook Packages: Computer ScienceComputer Science (R0)