Abstract
A user identification system is very important for protecting information from illegal access. There are identification systems using standard devices (keyboard or mouse) and systems using special devices. A user identification system using mouse is proposed in [6]. In their system, users write a simple figure object and the successful verification rate is 87%. However the simple object is too easy to prevent impersonation. In order to realize a more reliable user identification system using mouse, we propose a new system to identify users using a complex figure object, signature. New techniques we utilize in our system are as follows: the normalization of input data, the adoption of new signature-writing-parameters, the evaluation of verification data using geometric average means and the dynamical update of database. We have implemented our user identification system and conducted experiments of the implemented system. The successful verification rate in our system is 93%.
Preview
Unable to display preview. Download preview PDF.
References
D.W. Davies, W.L. Price, “Security for Computer Network”, John Wiley & Son, Ltd, 1984.
M. Kasukawa, Y. Mori, K. Komatsu, H. Akaike, H. Kakuda, “An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data”, Transactions of Information Processing Society of Japan, Vol.33, No.5, pp.728–735, 1992. (in Japanese)
M. Kawasaki, H. Kakuda, Y. Mori, “An Identity Authentication Method Based on Arpeggio Keystrokes”, Transactions of Information Processing Society of Japan, Vol.34, No.5, pp.1198–1205, 1993. (in Japanese)
S. Bruce, “Applied Cryptography, Second Edition”, John Wiley & Son, Ltd, 1996.
M. Yoshimura, I. Yoshimura, “Recent Trends in Writer Recognition Technology”, The Journal of the Institute of Electronics, Information and Communication Engineers, PRMU96-48, pp.81–90, 1996. (in Japanese)
K. Hayashi, E. Okamoto, M. Mambo, “Proposal of User Identification Scheme Using Mouse”, ICICS'97, Information and Communications Security, LNCS 1334, Springer-Verlag, pp. 144–148, 1997.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Syukri, A.F., Okamoto, E., Mambo, M. (1998). A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053751
Download citation
DOI: https://doi.org/10.1007/BFb0053751
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive