This Article 
 Bibliographic References 
 Add to: 
Java-Based Internet Biometric Authentication System
September 2003 (vol. 25 no. 9)
pp. 1166-1172

Abstract—An online biometric verification system for use over the Internet and requiring no specialist equipment is presented. Combining two distinct tests to ensure authenticity, a typing style test and a mouse-based signature test, achieves a fraudulent access rate of ≈ 4.4 percent, while authentic users access with a rate of ≈ 99 percent.

[1] R. Clarke, Human Identification in Information Systems: Management Challenges and Public Policy Issues Information Technology and People, vol. 7, no. 4, pp. 6-37, Dec. 1994.
[2] B. Miller, "Vital Signs of Identity," IEEE Spectrum, Feb. 1994, pp. 22-30.
[3] A.R. Roddy and J.D. Stosz, “Fingerprint Features—Statistical Analysis and System Performance Estimates” Proc. IEEE, vol. 85, no. 9, pp. 1390-1421, 1997.
[4] S. Gordon, Ocular Biometrics: For Your Eyes Only Opto&Laser Europe, no. 84, May 2001.
[5] Y. Zhu, T. Tan, and Y. Wang, Biometric Personal Identification Based on Handwriting Proc. 15th Int'l Conf. Pattern Recognition, pp. 801-804, 2000.
[6] R. Sanchez-Reillo, C. Sanchez-Avilla, and A. Gonzalez-Marcos, Biometric Identification through Hand Geometry Measurements IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 10, pp. 1168-1171, 2000.
[7] S. Hangai, S. Yamanaka, and T. Hamamoto, On-Line Signature Verification Based on Altitude and Direction of Pen Movement Proc. IEEE Int'l Conf. Multimedia and Expo, vol. 1, pp. 489-492, 2000.
[8] B. Herbst and D. Richards, On an Automated Signature Verification System Proc.IEEE Int'l Symp. Industrial Electronics, vol. 2, pp. 600-604, July 1998.
[9] G.B. Hesketh, Countermatch: A Neural Network Approach to Automatic Signature Verification Proc. IEE Colloquium on Neural Networks for Industrial Applications, pp. 2/1-2/2, Feb. 1997.
[10] J. Higashino, Signature Verification System on Neuro-Computer Proc. 11th IAPR Int'l Conf. Pattern Recognition, vol. III-C, pp. 517-521, 1992.
[11] T. Clarkson et al., Speaker Identification for Security Systems Using Reinforcement-Trained pRAM IEEE Trans. Systems, Man, and Cybernetics Part C: Applications and Reviews, vol. 31, no. 1, pp. 65-76, Feb. 2001.
[12] M. George and R. King, A Robust Speaker Verification Biometric Proc. IEEE 29th Ann. Int'l Carnahan Conf. Security Technology, pp. 41-46, 1995.
[13] S. Haider, A. Abbas, and A. Zaidi, A Multi-Technique Approach for User Identification through Keystroke Dynamics Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 2, pp. 1336-1341, 2000.
[14] Z. Changshui and S. Yanhua, AR Model for Keystroker Dynamics Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 4, pp. 2887-2890, 2000.
[15] J.A. Robinson, Computer User Verification Using Login String Keystroke Dynamics IEEE Trans. Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 28, no. 2, pp. 236-241, Mar. 1998.
[16] S.A. Bleha and M.S. Obaidat, Dimensionality Reduction and Feature Extraction Applications in Identifying Computer Users IEEE Trans.Systems, Man, and Cybernetics, vol. 21, no. 2, pp. 452-456, Mar./Apr. 1991.
[17] J. Brault and R. Plamondon, Segmenting Handwritten Signatures at Their Perceptually Important Points IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 9, pp. 953-957, Sept. 1993.
[18] L. Lee, Neural Approaches for Human Signature Verification Proc. Third Int'l Conf. Document Analysis and Recognition, vol. 2 pp. 1055-1058, 1995.
[19] R. Martens and L. Claesen, Automatic On-Line Signature Verification: Discrimination Emphasised Proc. Fourth Int'l Conf. Document Analysis and Recognition, pp. 657-660, 1997.
[20] M. Mingming and W. Wijesoma, On-Line Signature Verification Based on Multiple Models Proc. IEEE/IAFE/INFORMS Conf. Computational Intelligence for Financial Eng., pp. 30-33, Mar. 2000.
[21] T. Wessels and C. Omlin, A Hybrid System for Signature Verification Proc. South African Telecommunications Networks and Applications Conf., pp. 5509-5514, 2000.
[22] Y. Xuhua et al., A Study on Signature Verification Using a New Approach to Genetic Based Machine Learning Proc. IEEE Int'l Conf. Intelligent Systems for the 21st Century, vol. 5, pp. 4383-4386, Oct. 1995.
[23] K. Yue and W. Wijesome, Improved Segmentation and Segment Association for On-Line Signature Verification Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 4, pp. 2752-2756, Oct. 2000.
[24] E. Ozcan and C. Mohan, Shape Recognition Using Genetic Algorithms Proc. IEEE Int'l Conf. Evolutionary Computation, pp. 414-420, May 1996.
[25] E. Ozcan and C. Mohan, Steady State Memetic Algorithm for Partial Shape Matching Proc. IEEE Seventh Ann. Conf. Evolutionary Programming, pp. 527-536, Mar. 1998.
[26] D.E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning. Reading, Mass.: Addison-Wesley, 1989.
[27] C.M. Bishop, Neural Networks for Pattern Recognition. Clarendon Press, 1995.
[28] A. Zwieseleet, A. Munde, C. Busch, and H. Daum, Comparative Study of Biometric Identification Systems Proc. 34th Ann. IEEE Int'l Carnahan Conf. Security Technology, pp. 60-63, 2000.

Index Terms:
Authentication, biometric, Internet, Java, keyboard dynamics, signature, verification.
Ross A.J. Everitt, Peter W. McOwan, "Java-Based Internet Biometric Authentication System," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1166-1172, Sept. 2003, doi:10.1109/TPAMI.2003.1227991
Usage of this product signifies your acceptance of the Terms of Use.