Chris Pollett >
Students > [Bio] [Del1] [Del2] [Del3] |
CS298 ProposalAuthentication by Mouse MovementsShivani Hashia (shivani_hash@hotmail.com) Advisor: Dr. Chris Pollett(pollett@cs.sjsu.edu) Committee Members: Dr.Mark Stamp(stamp@cs.sjsu.edu) Dr.Robert Chun (ProfessorChun@aol.com) Abstract:Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in Internet. There are various techniques that can authenticate a user. One of these techniques is biometrics. In the project, we plan to use mouse movements as the biometric for user authentication. The mouse is used for verifying the authenticity of the user by validating the mouse movements of that person. There will be two modes of identification. First will be initial login where the user will be given a set of points on which he has to move the mouse. Based on the pattern of mouse movements on the screen for those random points, he will be authenticated and allowed to login. After the initial login, his movements will be continuously monitored to check if he is the specified user. Three parameters will be used for the identification: speed of the mouse, deviation from a straight line and the angle of the devia tion. There will be two stages of the software model. In the first stage, various mouse movement patterns are recorded for each user till we find the threshold within which the user's mouse movement properties fall and a template file is made. In the second stage, actual verification will be done based on the template file created in the first stage. The software will compare the real time statistics with the template file and decide the authenticity of the user. If none of the three parameters match the user's template file data, he will be forced to logout. CS297 Results
Proposed Schedule
Key Deliverables:
Innovations and Challenges
References:[CE93] Statistical Language Learning. Eugene Charniak. MIT. 1993. [PI02] Circuit complexity and Neural Networks. Ian Parberry. MIT 1994 [RP03] Java-Based Internet Biometric Authentication System. Ross A.J and Peter W. McOwan. IEEE Transactions on Pattern and Machine Intelligence. Vol 25(9).Page 1166-1172. 2003. [HR02] Movement Awareness for Ubiquitous Game Control. Robert Headon & Rupert Curwen. Personal and Ubiquitious Computing. Springer-Verlag. Vol 6. Page 407-415. 2002. [RS02] Artificial Intelligence.Stuart J.Russell , Peter Norvig. Prentice Hall. 2002 |