Abstract
Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.
Original language | English |
---|---|
Pages | 459-465 |
Number of pages | 7 |
Publication status | Published - 2006 Dec 1 |
Event | 1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS - Wisla, Poland Duration: 2006 Nov 6 → 2006 Nov 10 |
Other
Other | 1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS |
---|---|
Country/Territory | Poland |
City | Wisla |
Period | 06/11/6 → 06/11/10 |
Keywords
- Biometrics authentication
- Cellular phone
- Operational habit
ASJC Scopus subject areas
- Computer Science (miscellaneous)
- Information Systems