U-stroke pattern modeling for end user identity verification through ubiquitous input device

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Identity verification on ubiquitous input devices is a major concern to validate end-users, because of mobility of the devices. User device interaction (UDI) is capable to capture end-users’ behavioral nature from their device usage pattern. The primary goal of this paper is to collect heterogeneous parameters of usage patterns from any device and build personal profile with good-recognition capability. This work mainly focuses on finding multiple features captured from the usage of smart devices; so that parameters could be used to compose hybrid profile to verify end-users accurately. In this paper, U-Stroke modeling is proposed to capture behavioral data mainly from smart input devices in ubiquitous environment. In addition to this, concept of CCDA (capture, checking, decision, and action) model is proposed to process U-Stroke data efficiently to verify enduser’s identity. This proposal can draw attention of many researchers working on this domain to extend their research towards this direction.

Cite

CITATION STYLE

APA

Bhattasali, T., Chaki, N., Saeed, K., & Chaki, R. (2015). U-stroke pattern modeling for end user identity verification through ubiquitous input device. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9339, 219–230. https://doi.org/10.1007/978-3-319-24369-6_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free