|Author's Email Address
||This thesis had been viewed 5350 times. Download 1264 times.|
||Computer Science and Engineering|
|Type of Document
||A Comparison of Three Verification Methods for Keystroke Dynamic|
|Date of Defense
||In login systems, a user is asked to enter his correct account and password|
in order to be allowed to enter to the system. The safety of systems is at the
risk of leaking out the information, hence, the single mechanism of identity
verification has not filled the bill at present. We study the personal typing
behavior to get one’s own specific features.
In our thesis , we compare three methods and anlysis the advantages and
shortcomings of those three. First one is to sort the twenty study data, and
distribute the weights into the proper region. If the total weights is less than
the threshold then this test data will be accepted, otherwise, it will be rejected.
The second and third method are similar. Both of them are trying to rescale
the data. The spirit of them is that the typing rate of a person will be faster
when they type frequently and will be sloer when they are out of practice.
However the relative positions of those keys, the lengths of ons’s fingers, and
the time that people making pauses in reading unpunctuated are unique.
Those factors can be one’s typing rhythm.
There are twenty two individuals involved in this experiment. Each one
choose his own proficient account and password to type and set up his typing
model. The imposters are randomly choose legal user to imitate.
||Chia-Mei Chen - chair|
Chun-I Fan - co-chair
D. J. Guan - advisor
indicate access worldwide|
|Date of Submission