T. Kutzner, Fanyu Ye, Ingrid Bönninger, C. Travieso-González, M. Dutta, Anushikha Singh
{"title":"在智能手机上使用安全的手写密码进行用户验证","authors":"T. Kutzner, Fanyu Ye, Ingrid Bönninger, C. Travieso-González, M. Dutta, Anushikha Singh","doi":"10.1109/IC3.2015.7346651","DOIUrl":null,"url":null,"abstract":"This article focuses on the writer verification using safe handwritten passwords on smartphones. We extract and select 25 static and dynamic biometric features from a handwritten character password sequence on an android touch-screen device. For the writer verification we use the classification algorithms of WEKA framework. Our 32 test persons wrote generated safe passwords with a length of 8 characters. Each person wrote their password 12 times. The approach works with 384 training samples on a supervised system. The best result of 98.72% success rate for a correct classification, the proposal reached with the KStar and k- Nearest Neighbor classifier after ranking with Fisher Score feature selection. The best result of 10.42% false accepted rate is reached with KStar classifier.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"User verification using safe handwritten passwords on smartphones\",\"authors\":\"T. Kutzner, Fanyu Ye, Ingrid Bönninger, C. Travieso-González, M. Dutta, Anushikha Singh\",\"doi\":\"10.1109/IC3.2015.7346651\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article focuses on the writer verification using safe handwritten passwords on smartphones. We extract and select 25 static and dynamic biometric features from a handwritten character password sequence on an android touch-screen device. For the writer verification we use the classification algorithms of WEKA framework. Our 32 test persons wrote generated safe passwords with a length of 8 characters. Each person wrote their password 12 times. The approach works with 384 training samples on a supervised system. The best result of 98.72% success rate for a correct classification, the proposal reached with the KStar and k- Nearest Neighbor classifier after ranking with Fisher Score feature selection. The best result of 10.42% false accepted rate is reached with KStar classifier.\",\"PeriodicalId\":217950,\"journal\":{\"name\":\"2015 Eighth International Conference on Contemporary Computing (IC3)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Eighth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2015.7346651\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Eighth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2015.7346651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User verification using safe handwritten passwords on smartphones
This article focuses on the writer verification using safe handwritten passwords on smartphones. We extract and select 25 static and dynamic biometric features from a handwritten character password sequence on an android touch-screen device. For the writer verification we use the classification algorithms of WEKA framework. Our 32 test persons wrote generated safe passwords with a length of 8 characters. Each person wrote their password 12 times. The approach works with 384 training samples on a supervised system. The best result of 98.72% success rate for a correct classification, the proposal reached with the KStar and k- Nearest Neighbor classifier after ranking with Fisher Score feature selection. The best result of 10.42% false accepted rate is reached with KStar classifier.