Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A user identification system using signature written with mouse

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

A user identification system is very important for protecting information from illegal access. There are identification systems using standard devices (keyboard or mouse) and systems using special devices. A user identification system using mouse is proposed in [6]. In their system, users write a simple figure object and the successful verification rate is 87%. However the simple object is too easy to prevent impersonation. In order to realize a more reliable user identification system using mouse, we propose a new system to identify users using a complex figure object, signature. New techniques we utilize in our system are as follows: the normalization of input data, the adoption of new signature-writing-parameters, the evaluation of verification data using geometric average means and the dynamical update of database. We have implemented our user identification system and conducted experiments of the implemented system. The successful verification rate in our system is 93%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.W. Davies, W.L. Price, “Security for Computer Network”, John Wiley & Son, Ltd, 1984.

    Google Scholar 

  2. M. Kasukawa, Y. Mori, K. Komatsu, H. Akaike, H. Kakuda, “An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data”, Transactions of Information Processing Society of Japan, Vol.33, No.5, pp.728–735, 1992. (in Japanese)

    Google Scholar 

  3. M. Kawasaki, H. Kakuda, Y. Mori, “An Identity Authentication Method Based on Arpeggio Keystrokes”, Transactions of Information Processing Society of Japan, Vol.34, No.5, pp.1198–1205, 1993. (in Japanese)

    Google Scholar 

  4. S. Bruce, “Applied Cryptography, Second Edition”, John Wiley & Son, Ltd, 1996.

    Google Scholar 

  5. M. Yoshimura, I. Yoshimura, “Recent Trends in Writer Recognition Technology”, The Journal of the Institute of Electronics, Information and Communication Engineers, PRMU96-48, pp.81–90, 1996. (in Japanese)

    Google Scholar 

  6. K. Hayashi, E. Okamoto, M. Mambo, “Proposal of User Identification Scheme Using Mouse”, ICICS'97, Information and Communications Security, LNCS 1334, Springer-Verlag, pp. 144–148, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Syukri, A.F., Okamoto, E., Mambo, M. (1998). A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053751

Download citation

  • DOI: https://doi.org/10.1007/BFb0053751

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics