TY - GEN
T1 - An immunity based configuration for multilayer single featured biometric authentication algorithms
AU - Santos, Henrique
AU - Magalhães, Sérgio Tenreiro de
AU - Magalhães, Maria José
N1 - Funding Information:
This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope UID/CEC/00319/2013.
Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.
AB - Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.
KW - Authentication
KW - Bio inspired systems
KW - Biometrics
UR - http://www.scopus.com/inward/record.url?scp=84945903636&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-23276-8_21
DO - 10.1007/978-3-319-23276-8_21
M3 - Conference contribution
AN - SCOPUS:84945903636
SN - 9783319232751
T3 - Communications in Computer and Information Science
SP - 239
EP - 243
BT - Global security, safety and sustainability
A2 - Akhgar, Babak
A2 - Hessami, Ali G.
A2 - Carlile, Alex
A2 - Taal, Amie
A2 - Jahankhani, Hamid
A2 - Hosseinian-Far, Amin
PB - Springer Verlag
T2 - 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015
Y2 - 15 September 2015 through 17 September 2015
ER -