Personal identification techniques based on operational habit of cellular phone

Takamasa Isohara, Keisuke Takemori, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.

Original languageEnglish
Title of host publicationProceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT
Pages459-465
Number of pages7
Volume1
Publication statusPublished - 2006
Event1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS - Wisla, Poland
Duration: 2006 Nov 62006 Nov 10

Other

Other1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS
CountryPoland
CityWisla
Period06/11/606/11/10

Fingerprint

Authentication
Biometrics
Communication

Keywords

  • Biometrics authentication
  • Cellular phone
  • Operational habit

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems

Cite this

Isohara, T., Takemori, K., & Sasase, I. (2006). Personal identification techniques based on operational habit of cellular phone. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT (Vol. 1, pp. 459-465)

Personal identification techniques based on operational habit of cellular phone. / Isohara, Takamasa; Takemori, Keisuke; Sasase, Iwao.

Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT. Vol. 1 2006. p. 459-465.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Isohara, T, Takemori, K & Sasase, I 2006, Personal identification techniques based on operational habit of cellular phone. in Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT. vol. 1, pp. 459-465, 1st International Multiconference on Computer Science and Information Technology, IMCSIT 2006. Part of 22nd Autumn Meeting of Polish Information Processing Society, PIPS, Wisla, Poland, 06/11/6.
Isohara T, Takemori K, Sasase I. Personal identification techniques based on operational habit of cellular phone. In Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT. Vol. 1. 2006. p. 459-465
Isohara, Takamasa ; Takemori, Keisuke ; Sasase, Iwao. / Personal identification techniques based on operational habit of cellular phone. Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT. Vol. 1 2006. pp. 459-465
@inproceedings{93dcb9c2632f4a6cbf6f755c9ae2404f,
title = "Personal identification techniques based on operational habit of cellular phone",
abstract = "Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is {"}short term profile{"} which is histories from latest typing, and the other is {"}long term profile{"} which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.",
keywords = "Biometrics authentication, Cellular phone, Operational habit",
author = "Takamasa Isohara and Keisuke Takemori and Iwao Sasase",
year = "2006",
language = "English",
volume = "1",
pages = "459--465",
booktitle = "Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT",

}

TY - GEN

T1 - Personal identification techniques based on operational habit of cellular phone

AU - Isohara, Takamasa

AU - Takemori, Keisuke

AU - Sasase, Iwao

PY - 2006

Y1 - 2006

N2 - Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.

AB - Biometrics authentication which identifies a legitimate user of a cellular phone has been adopted. However, it is not used so actively, because control procedure is complicated, and a user has a resistance to provide own biological information to the communication terminal. In this paper, we propose personal identification techniques based on operational habit of cellular phone, which authenticate the legitimate user by collecting typing histories of cellular phone in a background process. The typing histories that are recorded in the ring buffer are divided into two profiles. One is "short term profile" which is histories from latest typing, and the other is "long term profile" which are older histories than the short term records. Also, we implement two authentication algorithms; first algorithm retrieves a remarkable key of the short term profile from the long term profile. Second algorithm computes weight values of keys of the short term profile by using long term profile. We evaluate the FAR (False Acceptance Rate) and FRR (False Reject Rate), and we show that our method can apply to personal identification on the cellular phone.

KW - Biometrics authentication

KW - Cellular phone

KW - Operational habit

UR - http://www.scopus.com/inward/record.url?scp=83755181746&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=83755181746&partnerID=8YFLogxK

M3 - Conference contribution

VL - 1

SP - 459

EP - 465

BT - Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT

ER -