Reference Hub2
A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques

A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques

Shanmugapriya D., Padmavathi Ganapathi
ISBN13: 9781522507031|ISBN10: 1522507035|EISBN13: 9781522507048
DOI: 10.4018/978-1-5225-0703-1.ch015
Cite Chapter Cite Chapter

MLA

Shanmugapriya D., and Padmavathi Ganapathi. "A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques." Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, edited by Maurice Dawson, et al., IGI Global, 2017, pp. 330-353. https://doi.org/10.4018/978-1-5225-0703-1.ch015

APA

Shanmugapriya D. & Ganapathi, P. (2017). A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques. In M. Dawson, D. Kisku, P. Gupta, J. Sing, & W. Li (Eds.), Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (pp. 330-353). IGI Global. https://doi.org/10.4018/978-1-5225-0703-1.ch015

Chicago

Shanmugapriya D., and Padmavathi Ganapathi. "A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques." In Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, edited by Maurice Dawson, et al., 330-353. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0703-1.ch015

Export Reference

Mendeley
Favorite

Abstract

The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with password. Keystroke dynamics is one of the behavioural biometric approaches which is cheaper and does not require any sophisticated hardware other than the keyboard. The chapter uses a new feature called Virtual Key Force along with the commonly extracted timing features. Features are normalized using Z-Score method. For feature subset selection, Particle Swarm Optimization wrapped with Extreme Learning Machine is proposed. Classification is done with wrapper based PSO-ELM approach. The proposed methodology is tested with publically available benchmark dataset and real time dataset. The proposed method yields the average accuracy of 97.92% and takes less training and testing time when compared with the traditional Back Propagation Neural Network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.