Home
  • English
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Log In
    New user? Click here to register. Have you forgotten your password?
Home
  • Browse Our Collections
  • Publications
  • Researchers
  • Research Data
  • Institutions
  • Statistics
    • English
    • ÄŒeÅ¡tina
    • Deutsch
    • Español
    • Français
    • Gàidhlig
    • LatvieÅ¡u
    • Magyar
    • Nederlands
    • Português
    • Português do Brasil
    • Suomi
    • Log In
      New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Resources
  3. UniMAP Index Publications
  4. Publications 2020
  5. Multiple Fusions Approach for Keystroke Dynamics Verification System with Soft Biometrics
 
Options

Multiple Fusions Approach for Keystroke Dynamics Verification System with Soft Biometrics

Journal
IOP Conference Series: Materials Science and Engineering
ISSN
17578981
Date Issued
2020-09-21
Author(s)
Mohd Noorulfakhri Yaacob
Universiti Malaysia Perlis
Syed Zulkarnain Syed Idrus
Universiti Malaysia Perlis
Wan Azani Wan Mustafa
Universiti Malaysia Perlis
Mohd Aminudin Jamlos
Universiti Malaysia Perlis
Helmy Abd Wahab M.
DOI
10.1088/1757-899X/917/1/012075
Abstract
Computer security is a process that controls the entire information system, including network, system and hardware. Important information that must be controlled in a system is the data or information contained in a system. Various methods have been used to ensure that only users with legitimate access to data can use a system. Usernames and passwords have been a common practice by many systems as the first requirement to be fulfilled to access the system, but some systems use the secondary verification for additional confirmation. In this article, Keystroke Dynamics has been used as the user's second level authentication for the systems that use the keyboard to login into a system. A common problem of system intrusions is that the system fails to identify the user who signs in using the keyboard when the login is correct. There is a possibility that someone else tries to break into the system. To ensure and improve users' recognition who use the keyboard to enter their logins into the system, Keystroke Dynamics is used as a next-level verification if the login is correct. Soft biometrics is used in the user authentication process using KD method in this study. The soft biometric elements used in this study are culture, gender, educational level (CGPA - Cumulative Grade Point Average) and region of birth (ROB). All of these four soft biometric elements are expected to enhance capabilities in the user authentication process.
File(s)
Research repository notification.pdf (4.4 MB)
google-scholar
Views
Downloads
  • About Us
  • Contact Us
  • Policies