Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 7 Sayı: 2, 137 - 142, 30.04.2019
https://doi.org/10.17694/bajece.502550

Öz

Kaynakça

  • Anderson GJ. U.S. Patent No. 6,509,847. Washington, DC: U.S. Patent and Trademark Office, 2003.
  • Zhong Y, Deng Y, Jain AK. “Keystroke dynamics for user authentication”, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW 2012), Rhode Island, USA, 2012.
  • Obaidat MS. Sadoun B. “Keystroke dynamics-based authentication. Biometrics”. US: Springer, 213–229, 1999.
  • Giot R, El-Abed M, Rosenberger, C. “Keystroke dynamics with low constraints svm based passphrase enrollment”. In Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on IEEE, 1-6, 2009.
  • Bender SS, Postley HJ. U.S. Patent No. 7,206,938. Washington, DC: U.S. Patent and Trademark Office, 2007.
  • Teh PS, Teoh ABJ, Tee C, Ong TS. “Keystroke dynamics in password authentication enhancement”. Expert Systems with Applications, 37(12), 8618-8627, 2010.
  • Chang TY, Tsai CJ, Yang YJ, Cheng PC. “User authentication using rhythm click characteristics for non-keyboard devices”. In Proceedings of the 2011 International Conference on Asia Agriculture and Animal IPCBEE, 13, 167-171, 2011.
  • Chang TY, Yang YJ, Peng CC. “A personalized rhythm click-based authentication system”. Information Management & Computer Security, 18(2), 72-85, 2010.
  • Ashbrook DL, Lin FX, Whtie SM. U.S. Patent Application No. 13/092,383, 2012.
  • Fedorova YV, Ruddy TR, Nunuparov MS. U.S. Patent No. 7,536,556. Washington, DC: U.S. Patent and Trademark Office, 2009.
  • Hird GR. U.S. Patent Application No. 13/484,836, 2013.
  • Wobbrock JO. “Tapsongs: tapping rhythm-based passwords on a single binary sensor”. In Proceedings of the 22nd annual ACM symposium on User interface software and technology, 93-96, 2009.
  • Chen Y, Sun J, Zhang R, Zhang Y. “Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices”. In Computer Communications (INFOCOM), 2015 IEEE Conference on, 2686-2694, 2015.
  • Lee JD, Jeong YS, Park JH. “A rhythm-based authentication scheme for smart media devices”. The Scientific World Journal, 2014.
  • Hwang SS, Cho S, Park S. (2009). “Keystroke dynamics-based authentication for mobile devices”. Computers & Security, 28 (1-2), 85-93, 2009.
  • T. Tuncer, and Y. Sönmez. "Block based data hiding method for images." European Journal of Technique 7.2 (2017): 85-95.
  • Cherifi F, Hemery B, Giot R, Pasquet M, Rosenberger C. “Performance evaluation of behavioral biometric systems”. In Behavioral Biometrics for Human Identification: Intelligent Applications, 57-74, 2010.

Unlock A Device with Pressure and Rhythm Based Password

Yıl 2019, Cilt: 7 Sayı: 2, 137 - 142, 30.04.2019
https://doi.org/10.17694/bajece.502550

Öz

When people open
their doors, they usually use the keys they carry in their pockets. As an
alternative to these used keys, it is possible to open the doors which are
authorized with RFID-enabled key holders or ID cards. But it seems that
different alternatives have not been developed much. Moreover, none of them
carries the sensory understanding dimension of the person and it is not
possible to determine whether or not the entrance request has been made by that
person. In this study, both the identification of the person and the opening of
the door are ensured by considering both the stroking rhythm and the stroke
force of a buttoner placed in the door. Thus, it is possible to open the door
according to the person's identity and authority without carrying any object
beside it, and it will have a unique original value. The milliseconds between
each stroke for the stroke of the quill are recorded in the generated database.
Comparison is made with the data obtained in the next stroke and the person is
used for verification. In addition, the pressure data of the person is also
kept in the database for each stroke and compared. In the study, the data of
two different people were recorded in the system and the information of the
people using the subjective button was recorded. Then, in addition to these two
different people, a total of 15 people, including 13 different people, were
allowed to use the system. In total, 50 door opening requests data were
recorded and 87.5% success rate was obtained. 

Kaynakça

  • Anderson GJ. U.S. Patent No. 6,509,847. Washington, DC: U.S. Patent and Trademark Office, 2003.
  • Zhong Y, Deng Y, Jain AK. “Keystroke dynamics for user authentication”, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW 2012), Rhode Island, USA, 2012.
  • Obaidat MS. Sadoun B. “Keystroke dynamics-based authentication. Biometrics”. US: Springer, 213–229, 1999.
  • Giot R, El-Abed M, Rosenberger, C. “Keystroke dynamics with low constraints svm based passphrase enrollment”. In Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on IEEE, 1-6, 2009.
  • Bender SS, Postley HJ. U.S. Patent No. 7,206,938. Washington, DC: U.S. Patent and Trademark Office, 2007.
  • Teh PS, Teoh ABJ, Tee C, Ong TS. “Keystroke dynamics in password authentication enhancement”. Expert Systems with Applications, 37(12), 8618-8627, 2010.
  • Chang TY, Tsai CJ, Yang YJ, Cheng PC. “User authentication using rhythm click characteristics for non-keyboard devices”. In Proceedings of the 2011 International Conference on Asia Agriculture and Animal IPCBEE, 13, 167-171, 2011.
  • Chang TY, Yang YJ, Peng CC. “A personalized rhythm click-based authentication system”. Information Management & Computer Security, 18(2), 72-85, 2010.
  • Ashbrook DL, Lin FX, Whtie SM. U.S. Patent Application No. 13/092,383, 2012.
  • Fedorova YV, Ruddy TR, Nunuparov MS. U.S. Patent No. 7,536,556. Washington, DC: U.S. Patent and Trademark Office, 2009.
  • Hird GR. U.S. Patent Application No. 13/484,836, 2013.
  • Wobbrock JO. “Tapsongs: tapping rhythm-based passwords on a single binary sensor”. In Proceedings of the 22nd annual ACM symposium on User interface software and technology, 93-96, 2009.
  • Chen Y, Sun J, Zhang R, Zhang Y. “Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices”. In Computer Communications (INFOCOM), 2015 IEEE Conference on, 2686-2694, 2015.
  • Lee JD, Jeong YS, Park JH. “A rhythm-based authentication scheme for smart media devices”. The Scientific World Journal, 2014.
  • Hwang SS, Cho S, Park S. (2009). “Keystroke dynamics-based authentication for mobile devices”. Computers & Security, 28 (1-2), 85-93, 2009.
  • T. Tuncer, and Y. Sönmez. "Block based data hiding method for images." European Journal of Technique 7.2 (2017): 85-95.
  • Cherifi F, Hemery B, Giot R, Pasquet M, Rosenberger C. “Performance evaluation of behavioral biometric systems”. In Behavioral Biometrics for Human Identification: Intelligent Applications, 57-74, 2010.
Toplam 17 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Emrah Aydemir 0000-0002-8380-7891

Ferhat Toslak Bu kişi benim 0000-0003-1054-379X

Yayımlanma Tarihi 30 Nisan 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 7 Sayı: 2

Kaynak Göster

APA Aydemir, E., & Toslak, F. (2019). Unlock A Device with Pressure and Rhythm Based Password. Balkan Journal of Electrical and Computer Engineering, 7(2), 137-142. https://doi.org/10.17694/bajece.502550

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı