Applying Computational Intelligence Techniques for Personal Authentication using Keystroke Dynamics

dc.categoryJournal Article
dc.contributor.authorShanmugapriya, D
dc.date.accessioned2017-04-18T19:26:49Z
dc.date.available2017-04-18T19:26:49Z
dc.date.issued2013
dc.departmentInformation Technologyen_US
dc.description.abstractABSTRACTUsername -with password is the commonly used authentication mechanism for securing huge data transactions being carried out everj' day via Internet. Most of the text based authentication methods arc vulnerable to manv attacks as thev depend on text and can be strengthened more by combining password with key typing manner of the user. Keystroke Dynamics is one of the inexpensive and strong beliavioral biometric technologies, which identifies the authenticity of a user when the u.ser is working via a keyboard. Tlic paper uses computational intelligence tcehnkiues such as Genetic algorithm. Ant Colony Optimization and Particle Swarm Optimization for feature sub.set selection and back propagation Neural Nebvork for classification. From the results, it is observed that ACO wrapped with BPN outperforms the other methods.en_US
dc.identifier.urihttps://ir.avinuty.ac.in/handle/avu/3239
dc.langEnglishen_US
dc.publisher.nameInternational Journal of Advanced Networking And Applicationen_US
dc.publisher.typeInternationalen_US
dc.titleApplying Computational Intelligence Techniques for Personal Authentication using Keystroke Dynamicsen_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
IT.DOC_11.pdf
Size:
2.52 MB
Format:
Adobe Portable Document Format
Collections