April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
262 Synthesis and Analysis in Biometrics
identity verification and detection applications. As those biometrics gain
high acceptability they also gain a relatively high accuracy. In experiments
conducted in our lab, we achieve an overall accuracy of FAR =0.00651,
and FRR =0.01312. This is based on a number of experiments conducted
locally and remotely through our lab involving a set of 22 participants.
Acknowledgments
This work was partly supported by the Natural Science and Engineering
Research Council of Canada (NSERC) through an Idea-to-Innovation grant.
We would like to thank all the participants in the experimental evaluation
of our framework, as well the Innovation Development Corporation of the
University of Victoria for their support. We would like also to thank Dr
Svetlana Yanushkevich for her review and valuable comments on this work.
Bibliography
1. Ahmed, A. A. E. and Traor´e, I. (2005). Detecting computer intrusions using
behavioural biometrics, Proc. 3rd Annual Conf. Privacy, Security and Trust,
New Brunswick, Canada, pp. 91–98.
2. Ahmed, A. A. E. and Traor´e, I. (2003). System and method for determining
a computer user profile from a motion-based input device. PCT patent
application with the World Intellectual Property Organization,filedbythe
University of Victoria (PCT/CA2004/000669) filing date: 3 May 2004
priority date: 2 May 2003.
3. Bergadano, F., Guneti, D. and Picardi, C. (2002). User authentication
through keystroke dynamics, ACM Trans. Information and System Security,
5, 4 pp. 367–397.
4. Bleha, S., Slivinsky, C. and Hussein, B. (1990). Computer-access security
systems using keystroke dynamics, IEEE Trans. Patt. Anal. Mach. Int. 12,
pp. 1217–1222.
5. Brown, M. and Rogers, S. J. (1993). User Identification Via Keystroke
Characteristics of Typed Names Using Neural Networks. Int. J. Man-
Machine Studies, 39, pp. 999–1014.
6. Coello Coello, C. A. (2006). Evolutionary algorithms: basic concepts and
applications in biometrics, this issue.
7. Denning, D. (1987). An intrusion detection model, IEEE Trans. Software
Engineering, 13, 2, pp. 222–232.
8. Gaines, R., Lisowski, W., Press, S. and Shapiro, N. (1980). Authentication by
keystroke timing: some preliminary results, Rand. Report R-256-NSF. Rand
Corporation.