Research Article
BibTex RIS Cite

Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları

Year 2018, Volume: 30 Issue: 1, 345 - 364, 01.03.2018

Abstract

Mevcut biyometrik kullanıcı
doğrulama teknikleri ikiye ayrılabilir: fizyolojik ve davranışsal yaklaşımlar.
Fizyolojik biyometri, bir kişinin parmak izi, yüz, iris/retina ve el/avuç içi
gibi fiziksel özellikleri ile ilişkili iken davranış biyometrisi, bir kişinin ses,
yazılı imzalama, yürüyüş, yazım ritmi (tuş vuruş dinamikleri) ve dokunmatik
dinamikleri gibi davranış modeliyle ilgilidir. Bu çalışmada son beş yılda en
yaygın olarak incelenen davranışsal biyometri yöntemlerinin kimlik doğrulama ve
anomali tespit uygulamalarında kullanılan öznitelikler ve çalışmaların
performansları incelenmiştir. Davranışsal biyometri yöntemleri üç ana başlıkta
incelenmiştir: Vücut dinamiklerine dayalı davranışsal biyometri (yürüyüş ve üst
vücut dinamikleri, ses ve konuşma, göz hareketleri ve bakış, dudak
hareketleri), bilgisayar çevre bileşenleri ve taşınabilir cihaz etkileşimine
dayalı davranışsal biyometri (tuş vuruş dinamikleri, fare etkileşimi,
dokunmatik ekran etkileşimi, diğer taşınabilir cihaz etkileşimi), imza ve
davranış dinamikleri.

References

  • 1. Yampolskiy, R. V., ve Govindaraju, V. (2008). "Behavioural biometrics: a survey and classification", International Journal of Biometrics, 1(1): 81-113. 2. Neves, J., Narducci, F., Barra, S., ve Proença, H., (2016). "Biometric recognition in surveillance scenarios: a survey", Artificial Intelligence Review, 46(4): 515-541. 3. Gofman, M. I., ve Mitra, S., (2016). "Multimodal biometrics for enhanced mobile device security", Communications of the ACM, 59(4): 58-65. 4. Šeděnka, J., Govindarajan, S., Gasti, P., ve Balagani, K. S., (2015). "Secure outsourced biometric authentication with performance evaluation on smartphones", IEEE Transactions on Information Forensics and Security, 10(2): 384-396. 5. Meng, W., Wong, D. S., Furnell, S., ve Zhou, J., (2015). "Surveying the development of biometric user authentication on mobile phones", IEEE Communications Surveys & Tutorials, 17(3): 1268-1293. 6. Precise Biometrics, Understanding Biometric Performance Evaluation, Teknik Rapor, https://goo.gl/AbirLE, Son Erişim: Nisan 2017. 7. Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D. (2013). "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication", IEEE transactions on information forensics and security, 8(1): 136-148. 8. Sultana, M., Paul, P. P., ve Gavrilova, M. (2014, October). "A concept of social behavioral biometrics: motivation, current developments, and future trends", In Cyberworlds (CW), 2014 International Conference on (pp. 271-278). IEEE. 9. Peng, J., Choo, K. K. R., ve Ashman, H. (2016). "User profiling in intrusion detection: A review", Journal of Network and Computer Applications, 72: 14-27. 10. Murmuria, R., Stavrou, A., Barbará, D., & Fleck, D. (2015, November). "Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users", In International Workshop on Recent Advances in Intrusion Detection (pp. 405-424). Springer International Publishing. 11. Alzubaidi, A., ve Kalita, J., (2016). "Authentication of smartphone users using behavioral biometrics", IEEE Communications Surveys & Tutorials, 18(3): 1998-2026. 12. Ali, M. L., Monaco, J. V., Tappert, C. C., ve Qiu, M., (2016). "Keystroke biometric systems for user authentication", Journal of Signal Processing Systems, 86(2): 1-16. 13. Jain, A. K., Nandakumar, K., ve Ross, A., (2016). "50 years of biometric research: Accomplishments, challenges, and opportunities", Pattern Recognition Letters, 79: 80-10. 14. Salakhutdinov, R., ve Hinton, G., (2009). "Deep boltzmann machines", Artificial Intelligence and Statistics, 448-455. 15. Prabha, R. S., ve Vidhyapriya, R., (2017). "Intruder Detection System Based on Behavioral Biometric Security", Journal Of Scıentıfıc & Industrıal Research, 76: 90-94. 16. Kim, E., Hong, S., ve Lee, H. (2012). "Human Identıfıcation By Fusion Of Multiple Gait Representations", Advanced Topics in Biometrics, 229. 17. Galajdová, A., Šimšík, D., ve Rákay, R., (2016). "An automated procedure for identification of a person using gait analysis", International Journal of Advanced Robotic Systems, 13(5): 1-5. 18. Liang, Y., Li, C. T., Guan, Y., ve Hu, Y., (2016). "Gait recognition based on the golden ratio", EURASIP Journal on Image and Video Processing, 2016(1): 22. 19. Man, J., ve Bhanu, B. (2006). "Individual recognition using gait energy image", IEEE transactions on pattern analysis and machine intelligence, 28(2): 316-322. 20. Liu, Z., Zhang, Z., Wu, Q., ve Wang, Y., (2015). "Enhancing person re-identification by integrating gait biometric", Neurocomputing, 168: 1144-1156. 21. Bouchrika, I., Carter, J. N., ve Nixon, M. S., (2016). "Towards automated visual surveillance using gait for identity recognition and tracking across multiple non-intersecting cameras", Multimedia Tools and Applications, 75(2): 1201-1221. 22. Ngo, T. T., Makihara, Y., Nagahara, H., Mukaigawa, Y., ve Yagi, Y., (2014). "The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication", Pattern Recognition, 47(1): 228-237. 23. Bimbot, F., Bonastre, J. F., Fredouille, C., Gravier, G., Magrin-Chagnolleau, I., Meignier, S., ... & Reynolds, D. A. (2004), "A tutorial on text-independent speaker verification. EURASIP journal on applied signal processing", 2004, 430-451. 24. Kanagasundaram, A., Vogt, R., Dean, D. B., Sridharan, S., & Mason, M. W. (2011, August). "I-vector based speaker recognition on short utterances", Proceedings of the 12th Annual Conference of the International Speech Communication Association (pp. 2341-2344). International Speech Communication Association (ISCA). 25. Hansen, J. H., ve Hasan, T., (2015). "Speaker recognition by machines and humans: A tutorial review", IEEE Signal processing magazine, 32(6): 74-99. 26. Sarkar, A. K., Do, C. T., Le, V. B., ve Barras, C., (2014). "Combination of cepstral and phonetically discriminative features for speaker verification", IEEE Signal Processing Letters, 21(9): 1040-1044. 27. Liu, Y., Qian, Y., Chen, N., Fu, T., Zhang, Y., ve Yu, K., (2015). "Deep feature for text-dependent speaker verification", Speech Communication, 73: 1-13. 28. Cai, Y., Li, X., Gong, Z., ve Codina, T. R., (2014). "Speaker verification for multi-task interactions", Interacting with Computers, 26(2): 135-144. 29. Rigas, I., Economou, G., ve Fotopoulos, S., (2012). "Biometric identification based on the eye movements and graph matching techniques", Pattern Recognition Letters, 33(6): 786-792. 30. Cantoni, V., Galdi, C., Nappi, M., Porta, M., ve Riccio, D., (2015). "GANT: Gaze analysis technique for human identification", Pattern Recognition, 48(4): 1027-1038. 31. Juhola, M., Zhang, Y., ve Rasku, J., (2013). "Biometric verification of a subject through eye movements", Computers in biology and medicine, 43(1): 42-50. 32. Kasprowski, P., ve Harezlak, K., (2016). "Fusion of eye movement and mouse dynamics for reliable behavioral biometrics", Pattern Analysis and Applications, 1-13. 33. Wang, S. L., ve Liew, A. W. C., (2012). "Physiological and behavioral lip biometrics: A comprehensive study of their discriminative power", Pattern Recognition, 45(9): 3328-3335. 34. Liu, X., ve Cheung, Y. M., (2014). "Learning multi-boosted HMMs for lip-password based speaker verification", IEEE Transactions on Information Forensics and Security, 9(2): 233-246. 35. Wang, L., Tan, T., Ning, H., ve Hu, W. (2003). "Silhouette analysis-based gait recognition for human identification", IEEE transactions on pattern analysis and machine intelligence, 25(12): 1505-1518. 36. Zheng, S., Zhang, J., Huang, K., He, R., ve Tan, T. (2011). "Robust view transformation model for gait recognition", 2011 18th IEEE International Conference on Image Processing (ICIP), 2073-2076. 37. Stolcke, A., Kajarekar, S. S., Ferrer, L., & Shrinberg, E. (2007)., "Speaker recognition with session variability normalization based on MLLR adaptation transforms", IEEE Transactions on Audio, Speech, and Language Processing, 15(7): 1987-1998. 38. Banerjee, S. P., & Woodard, D. L. (2012). "Biometric authentication and identification using keystroke dynamics: A survey", Journal of Pattern Recognition Research, 7(1): 116-139. 39. Chandrasekar, V., ve Suresh Kumar, S., (2016). "A dexterous feature selection artificial immune system algorithm for keystroke dynamics", Stochastic Analysis and Applications, 34(1): 147-154. 40. Chandrasekar, V., Kumar, S. S., ve Maheswari, T., (2016). "Authentication based on keystroke dynamics using stochastic diffusion algorithm", Stochastic Analysis and Applications, 34(1): 155-164. 41. Chu, Z., Gianvecchio, S., Koehl, A., Wang, H., ve Jajodia, S., (2013). "Blog or block: Detecting blog bots through behavioral biometrics", Computer Networks, 57(3), 634-646. 42. Deutschmann, I., Nordström, P., ve Nilsson, L., (2013). "Continuous authentication using behavioral biometrics", IT Professional, 15(4): 12-15. 43. Schclar, A., Rokach, L., Abramson, A., ve Elovici, Y., (2012). "User authentication based on representative users", IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6): 1669-1678. 44. Shen, C., Cai, Z., Guan, X., ve Maxion, R., (2014). "Performance evaluation of anomaly-detection algorithms for mouse dynamics", Computers & Security, 45: 156-171. 45. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., ve Schclar, A., (2012). "User identity verification via mouse dynamics", Information Sciences, 201: 19-36. 46. Sayed, B., Traore, I., Woungang, I., ve Obaidat, M. S., (2013). "Biometric authentication using mouse gesture dynamics", IEEE Systems Journal, 7(2): 262-274. 47. Robertson, J., ve Guest, R., (2015), "A feature based comparison of pen and swipe based signature characteristics", Human Movement Science, 43, 169-182. 48. Peng, G., Zhou, G., Nguyen, D. T., Qi, X., Yang, Q., ve Wang, S., (2016). "Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses", IEEE Transactions on Human-Machine Systems, 99: 1-13. 49. Bevan, C., ve Fraser, D. S., (2016). "Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures", International Journal of Human-Computer Studies, 88: 51-61. 50. Zhou, L., Kang, Y., Zhang, D., ve Lai, J., (2016). "Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones", Decision Support Systems, 92: 14-24. 51. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., ve Pavlidakis, E., (2014). "Introducing touchstroke: keystroke‐based authentication system for smartphones", Security and Communication Networks, 9(6): 542–554. 52. Sae-Bae, N., Memon, N., Isbister, K., ve Ahmed, K., (2014). "Multitouch gesture-based authentication", IEEE transactions on information forensics and security, 9(4): 568-582. 53. SenthilPrabha, R., Vidhyapriya, R., ve RavithaRajalakshmi, N., (2016). "Performance analysis for a Touch dynamic authentication system with reduced feature set using neural networks", IETE Journal of Research, 62(2): 198-204. 54. Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., ve Balagani, K. S., (2016). "HMOG: New behavioral biometric features for continuous authentication of smartphone users", IEEE Transactions on Information Forensics and Security, 11(5): 877-892. 55. Peng, H., Long, F., & Ding, C. (2005). "Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy", IEEE Transactions on pattern analysis and machine intelligence, 27(8): 1226-1238. 56.Khan, S., ve Dhole, A. (2014). "A Review on Offline Signature Recognition and Verification Techniques", International Journal of Advanced Research in Computer and Communication Engineering, 3(6): 6879-6882. 57.Saikia, H., ve Sarma, K. C. (2012). "Approaches and issues in offline signature verification system", International Journal of Computer Applications, 42(16): 45-52. 58.Hafemann, L. G., Sabourin, R., ve Oliveira, L. S. (2015). "Offline handwritten signature verification-literature review", arXiv preprint arXiv:1507.07909. 59. Neamah, K., Mohamad, D., Saba, T., & Rehman, A. (2014). "Discriminative features mining for offline handwritten signature verification", 3D Research: 5(1), 2. 60. Baltzakis, H., ve Papamarkos, N. (2001). "A new signature verification technique based on a two-stage neural network classifier", Engineering applications of Artificial intelligence, 14(1): 95-103. 61. Batista, L., Granger, E., ve Sabourin, R. (2012). "Dynamic selection of generative–discriminative ensembles for off-line signature verification", Pattern Recognition, 45(4): 1326-1340. 62. Skurichina, M., ve Duin, R. P. (2002). "Bagging, boosting and the random subspace method for linear classifiers", Pattern Analysis & Applications, 5(2): 121-135. 63. Ko, A. H., Sabourin, R., ve Britto Jr, A. S. (2008). "From dynamic classifier selection to dynamic ensemble selection", Pattern Recognition, 41(5): 1718-1731. 64. Cavalin, P. R., Sabourin, R., & Suen, C. Y. (2010). "Dynamic selection of ensembles of classifiers using contextual information", International Workshop on Multiple Classifier Systems, 7-9 Nisan 2010, Cairo, 145-154. 65. Batista, L., Granger, E., ve Sabourin, R. (2010). "Improving performance of HMM-based off-line signature verification systems through a multi-hypothesis approach", International Journal on Document Analysis and Recognition (IJDAR), 13(1): 33-47. 66. Vargas, F., Ferrer, M., Travieso, C., ve Alonso, J. (2007). "Off-line handwritten signature GPDS-960 corpus", Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), 23-26 Eylül 2007, Parana, IEEE, 764-768. 67. Kumar, R., Sharma, J. D., ve Chanda, B., (2012). "Writer-independent off-line signature verification using surroundedness feature", Pattern recognition letters, 33(3): 301-308. 68. Kalera, M. K., Srihari, S., ve Xu, A., (2004). "Offline signature verification and identification using distance statistics", International Journal of Pattern Recognition and Artificial Intelligence, 18(07), 1339-1360. 69. Guerbai, Y., Chibani, Y., ve Hadjadji, B. (2015). "The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters", Pattern Recognition, 48(1): 103-113. 70. Donoho, D. L., ve Duncan, M. R., (2000). "Digital curvelet transform: strategy, implementation, and experiments", Wavelet Applications VII, 5 Nisan 2000, Orlando, FL. 71. Sultana, M., Paul, P. P., ve Gavrilova, M., (2015). "Social behavioral biometrics: an emerging trend", International Journal of Pattern Recognition and Artificial Intelligence, 29(08): 1556013. 72. Lim, M., Teoh, A. B. J., ve Kim, J., (2015). "Biometric feature-type transformation: Making templates compatible for secret protection", IEEE Signal Processing Magazine, 32(5): 77-87. 73. Sizov, A., Khoury, E., Kinnunen, T., Wu, Z., ve Marcel, S., (2015). "Joint Speaker Verification and Antispoofing in the i-Vector Space", IEEE Transactions on Information Forensics and Security, 10(4): 821-832. 74. Ichino, M., Yamazaki, Y., ve Yoshiura, H., (2015). "Speaker verification method for operation system of consumer electronic devices", IEEE Transactions on Consumer Electronics, 61(1): 96-102. 75. Al-Rubaie, M., ve Chang, J. M., (2016). "Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud", IEEE Transactions on Information Forensics and Security, 11(12): 2648-2663.
Year 2018, Volume: 30 Issue: 1, 345 - 364, 01.03.2018

Abstract

References

  • 1. Yampolskiy, R. V., ve Govindaraju, V. (2008). "Behavioural biometrics: a survey and classification", International Journal of Biometrics, 1(1): 81-113. 2. Neves, J., Narducci, F., Barra, S., ve Proença, H., (2016). "Biometric recognition in surveillance scenarios: a survey", Artificial Intelligence Review, 46(4): 515-541. 3. Gofman, M. I., ve Mitra, S., (2016). "Multimodal biometrics for enhanced mobile device security", Communications of the ACM, 59(4): 58-65. 4. Šeděnka, J., Govindarajan, S., Gasti, P., ve Balagani, K. S., (2015). "Secure outsourced biometric authentication with performance evaluation on smartphones", IEEE Transactions on Information Forensics and Security, 10(2): 384-396. 5. Meng, W., Wong, D. S., Furnell, S., ve Zhou, J., (2015). "Surveying the development of biometric user authentication on mobile phones", IEEE Communications Surveys & Tutorials, 17(3): 1268-1293. 6. Precise Biometrics, Understanding Biometric Performance Evaluation, Teknik Rapor, https://goo.gl/AbirLE, Son Erişim: Nisan 2017. 7. Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D. (2013). "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication", IEEE transactions on information forensics and security, 8(1): 136-148. 8. Sultana, M., Paul, P. P., ve Gavrilova, M. (2014, October). "A concept of social behavioral biometrics: motivation, current developments, and future trends", In Cyberworlds (CW), 2014 International Conference on (pp. 271-278). IEEE. 9. Peng, J., Choo, K. K. R., ve Ashman, H. (2016). "User profiling in intrusion detection: A review", Journal of Network and Computer Applications, 72: 14-27. 10. Murmuria, R., Stavrou, A., Barbará, D., & Fleck, D. (2015, November). "Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users", In International Workshop on Recent Advances in Intrusion Detection (pp. 405-424). Springer International Publishing. 11. Alzubaidi, A., ve Kalita, J., (2016). "Authentication of smartphone users using behavioral biometrics", IEEE Communications Surveys & Tutorials, 18(3): 1998-2026. 12. Ali, M. L., Monaco, J. V., Tappert, C. C., ve Qiu, M., (2016). "Keystroke biometric systems for user authentication", Journal of Signal Processing Systems, 86(2): 1-16. 13. Jain, A. K., Nandakumar, K., ve Ross, A., (2016). "50 years of biometric research: Accomplishments, challenges, and opportunities", Pattern Recognition Letters, 79: 80-10. 14. Salakhutdinov, R., ve Hinton, G., (2009). "Deep boltzmann machines", Artificial Intelligence and Statistics, 448-455. 15. Prabha, R. S., ve Vidhyapriya, R., (2017). "Intruder Detection System Based on Behavioral Biometric Security", Journal Of Scıentıfıc & Industrıal Research, 76: 90-94. 16. Kim, E., Hong, S., ve Lee, H. (2012). "Human Identıfıcation By Fusion Of Multiple Gait Representations", Advanced Topics in Biometrics, 229. 17. Galajdová, A., Šimšík, D., ve Rákay, R., (2016). "An automated procedure for identification of a person using gait analysis", International Journal of Advanced Robotic Systems, 13(5): 1-5. 18. Liang, Y., Li, C. T., Guan, Y., ve Hu, Y., (2016). "Gait recognition based on the golden ratio", EURASIP Journal on Image and Video Processing, 2016(1): 22. 19. Man, J., ve Bhanu, B. (2006). "Individual recognition using gait energy image", IEEE transactions on pattern analysis and machine intelligence, 28(2): 316-322. 20. Liu, Z., Zhang, Z., Wu, Q., ve Wang, Y., (2015). "Enhancing person re-identification by integrating gait biometric", Neurocomputing, 168: 1144-1156. 21. Bouchrika, I., Carter, J. N., ve Nixon, M. S., (2016). "Towards automated visual surveillance using gait for identity recognition and tracking across multiple non-intersecting cameras", Multimedia Tools and Applications, 75(2): 1201-1221. 22. Ngo, T. T., Makihara, Y., Nagahara, H., Mukaigawa, Y., ve Yagi, Y., (2014). "The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication", Pattern Recognition, 47(1): 228-237. 23. Bimbot, F., Bonastre, J. F., Fredouille, C., Gravier, G., Magrin-Chagnolleau, I., Meignier, S., ... & Reynolds, D. A. (2004), "A tutorial on text-independent speaker verification. EURASIP journal on applied signal processing", 2004, 430-451. 24. Kanagasundaram, A., Vogt, R., Dean, D. B., Sridharan, S., & Mason, M. W. (2011, August). "I-vector based speaker recognition on short utterances", Proceedings of the 12th Annual Conference of the International Speech Communication Association (pp. 2341-2344). International Speech Communication Association (ISCA). 25. Hansen, J. H., ve Hasan, T., (2015). "Speaker recognition by machines and humans: A tutorial review", IEEE Signal processing magazine, 32(6): 74-99. 26. Sarkar, A. K., Do, C. T., Le, V. B., ve Barras, C., (2014). "Combination of cepstral and phonetically discriminative features for speaker verification", IEEE Signal Processing Letters, 21(9): 1040-1044. 27. Liu, Y., Qian, Y., Chen, N., Fu, T., Zhang, Y., ve Yu, K., (2015). "Deep feature for text-dependent speaker verification", Speech Communication, 73: 1-13. 28. Cai, Y., Li, X., Gong, Z., ve Codina, T. R., (2014). "Speaker verification for multi-task interactions", Interacting with Computers, 26(2): 135-144. 29. Rigas, I., Economou, G., ve Fotopoulos, S., (2012). "Biometric identification based on the eye movements and graph matching techniques", Pattern Recognition Letters, 33(6): 786-792. 30. Cantoni, V., Galdi, C., Nappi, M., Porta, M., ve Riccio, D., (2015). "GANT: Gaze analysis technique for human identification", Pattern Recognition, 48(4): 1027-1038. 31. Juhola, M., Zhang, Y., ve Rasku, J., (2013). "Biometric verification of a subject through eye movements", Computers in biology and medicine, 43(1): 42-50. 32. Kasprowski, P., ve Harezlak, K., (2016). "Fusion of eye movement and mouse dynamics for reliable behavioral biometrics", Pattern Analysis and Applications, 1-13. 33. Wang, S. L., ve Liew, A. W. C., (2012). "Physiological and behavioral lip biometrics: A comprehensive study of their discriminative power", Pattern Recognition, 45(9): 3328-3335. 34. Liu, X., ve Cheung, Y. M., (2014). "Learning multi-boosted HMMs for lip-password based speaker verification", IEEE Transactions on Information Forensics and Security, 9(2): 233-246. 35. Wang, L., Tan, T., Ning, H., ve Hu, W. (2003). "Silhouette analysis-based gait recognition for human identification", IEEE transactions on pattern analysis and machine intelligence, 25(12): 1505-1518. 36. Zheng, S., Zhang, J., Huang, K., He, R., ve Tan, T. (2011). "Robust view transformation model for gait recognition", 2011 18th IEEE International Conference on Image Processing (ICIP), 2073-2076. 37. Stolcke, A., Kajarekar, S. S., Ferrer, L., & Shrinberg, E. (2007)., "Speaker recognition with session variability normalization based on MLLR adaptation transforms", IEEE Transactions on Audio, Speech, and Language Processing, 15(7): 1987-1998. 38. Banerjee, S. P., & Woodard, D. L. (2012). "Biometric authentication and identification using keystroke dynamics: A survey", Journal of Pattern Recognition Research, 7(1): 116-139. 39. Chandrasekar, V., ve Suresh Kumar, S., (2016). "A dexterous feature selection artificial immune system algorithm for keystroke dynamics", Stochastic Analysis and Applications, 34(1): 147-154. 40. Chandrasekar, V., Kumar, S. S., ve Maheswari, T., (2016). "Authentication based on keystroke dynamics using stochastic diffusion algorithm", Stochastic Analysis and Applications, 34(1): 155-164. 41. Chu, Z., Gianvecchio, S., Koehl, A., Wang, H., ve Jajodia, S., (2013). "Blog or block: Detecting blog bots through behavioral biometrics", Computer Networks, 57(3), 634-646. 42. Deutschmann, I., Nordström, P., ve Nilsson, L., (2013). "Continuous authentication using behavioral biometrics", IT Professional, 15(4): 12-15. 43. Schclar, A., Rokach, L., Abramson, A., ve Elovici, Y., (2012). "User authentication based on representative users", IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6): 1669-1678. 44. Shen, C., Cai, Z., Guan, X., ve Maxion, R., (2014). "Performance evaluation of anomaly-detection algorithms for mouse dynamics", Computers & Security, 45: 156-171. 45. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., ve Schclar, A., (2012). "User identity verification via mouse dynamics", Information Sciences, 201: 19-36. 46. Sayed, B., Traore, I., Woungang, I., ve Obaidat, M. S., (2013). "Biometric authentication using mouse gesture dynamics", IEEE Systems Journal, 7(2): 262-274. 47. Robertson, J., ve Guest, R., (2015), "A feature based comparison of pen and swipe based signature characteristics", Human Movement Science, 43, 169-182. 48. Peng, G., Zhou, G., Nguyen, D. T., Qi, X., Yang, Q., ve Wang, S., (2016). "Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses", IEEE Transactions on Human-Machine Systems, 99: 1-13. 49. Bevan, C., ve Fraser, D. S., (2016). "Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures", International Journal of Human-Computer Studies, 88: 51-61. 50. Zhou, L., Kang, Y., Zhang, D., ve Lai, J., (2016). "Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones", Decision Support Systems, 92: 14-24. 51. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., ve Pavlidakis, E., (2014). "Introducing touchstroke: keystroke‐based authentication system for smartphones", Security and Communication Networks, 9(6): 542–554. 52. Sae-Bae, N., Memon, N., Isbister, K., ve Ahmed, K., (2014). "Multitouch gesture-based authentication", IEEE transactions on information forensics and security, 9(4): 568-582. 53. SenthilPrabha, R., Vidhyapriya, R., ve RavithaRajalakshmi, N., (2016). "Performance analysis for a Touch dynamic authentication system with reduced feature set using neural networks", IETE Journal of Research, 62(2): 198-204. 54. Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., ve Balagani, K. S., (2016). "HMOG: New behavioral biometric features for continuous authentication of smartphone users", IEEE Transactions on Information Forensics and Security, 11(5): 877-892. 55. Peng, H., Long, F., & Ding, C. (2005). "Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy", IEEE Transactions on pattern analysis and machine intelligence, 27(8): 1226-1238. 56.Khan, S., ve Dhole, A. (2014). "A Review on Offline Signature Recognition and Verification Techniques", International Journal of Advanced Research in Computer and Communication Engineering, 3(6): 6879-6882. 57.Saikia, H., ve Sarma, K. C. (2012). "Approaches and issues in offline signature verification system", International Journal of Computer Applications, 42(16): 45-52. 58.Hafemann, L. G., Sabourin, R., ve Oliveira, L. S. (2015). "Offline handwritten signature verification-literature review", arXiv preprint arXiv:1507.07909. 59. Neamah, K., Mohamad, D., Saba, T., & Rehman, A. (2014). "Discriminative features mining for offline handwritten signature verification", 3D Research: 5(1), 2. 60. Baltzakis, H., ve Papamarkos, N. (2001). "A new signature verification technique based on a two-stage neural network classifier", Engineering applications of Artificial intelligence, 14(1): 95-103. 61. Batista, L., Granger, E., ve Sabourin, R. (2012). "Dynamic selection of generative–discriminative ensembles for off-line signature verification", Pattern Recognition, 45(4): 1326-1340. 62. Skurichina, M., ve Duin, R. P. (2002). "Bagging, boosting and the random subspace method for linear classifiers", Pattern Analysis & Applications, 5(2): 121-135. 63. Ko, A. H., Sabourin, R., ve Britto Jr, A. S. (2008). "From dynamic classifier selection to dynamic ensemble selection", Pattern Recognition, 41(5): 1718-1731. 64. Cavalin, P. R., Sabourin, R., & Suen, C. Y. (2010). "Dynamic selection of ensembles of classifiers using contextual information", International Workshop on Multiple Classifier Systems, 7-9 Nisan 2010, Cairo, 145-154. 65. Batista, L., Granger, E., ve Sabourin, R. (2010). "Improving performance of HMM-based off-line signature verification systems through a multi-hypothesis approach", International Journal on Document Analysis and Recognition (IJDAR), 13(1): 33-47. 66. Vargas, F., Ferrer, M., Travieso, C., ve Alonso, J. (2007). "Off-line handwritten signature GPDS-960 corpus", Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), 23-26 Eylül 2007, Parana, IEEE, 764-768. 67. Kumar, R., Sharma, J. D., ve Chanda, B., (2012). "Writer-independent off-line signature verification using surroundedness feature", Pattern recognition letters, 33(3): 301-308. 68. Kalera, M. K., Srihari, S., ve Xu, A., (2004). "Offline signature verification and identification using distance statistics", International Journal of Pattern Recognition and Artificial Intelligence, 18(07), 1339-1360. 69. Guerbai, Y., Chibani, Y., ve Hadjadji, B. (2015). "The effective use of the one-class SVM classifier for handwritten signature verification based on writer-independent parameters", Pattern Recognition, 48(1): 103-113. 70. Donoho, D. L., ve Duncan, M. R., (2000). "Digital curvelet transform: strategy, implementation, and experiments", Wavelet Applications VII, 5 Nisan 2000, Orlando, FL. 71. Sultana, M., Paul, P. P., ve Gavrilova, M., (2015). "Social behavioral biometrics: an emerging trend", International Journal of Pattern Recognition and Artificial Intelligence, 29(08): 1556013. 72. Lim, M., Teoh, A. B. J., ve Kim, J., (2015). "Biometric feature-type transformation: Making templates compatible for secret protection", IEEE Signal Processing Magazine, 32(5): 77-87. 73. Sizov, A., Khoury, E., Kinnunen, T., Wu, Z., ve Marcel, S., (2015). "Joint Speaker Verification and Antispoofing in the i-Vector Space", IEEE Transactions on Information Forensics and Security, 10(4): 821-832. 74. Ichino, M., Yamazaki, Y., ve Yoshiura, H., (2015). "Speaker verification method for operation system of consumer electronic devices", IEEE Transactions on Consumer Electronics, 61(1): 96-102. 75. Al-Rubaie, M., ve Chang, J. M., (2016). "Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud", IEEE Transactions on Information Forensics and Security, 11(12): 2648-2663.
There are 1 citations in total.

Details

Primary Language Turkish
Journal Section MBD
Authors

Fatma Gümüş This is me

Oğuz Ata This is me

Hasan Hüseyin Balık

Publication Date March 1, 2018
Submission Date July 5, 2017
Published in Issue Year 2018 Volume: 30 Issue: 1

Cite

APA Gümüş, F., Ata, O., & Balık, H. H. (2018). Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, 30(1), 345-364.
AMA Gümüş F, Ata O, Balık HH. Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. March 2018;30(1):345-364.
Chicago Gümüş, Fatma, Oğuz Ata, and Hasan Hüseyin Balık. “Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama Ve Anomali Tespit Uygulamaları”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30, no. 1 (March 2018): 345-64.
EndNote Gümüş F, Ata O, Balık HH (March 1, 2018) Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30 1 345–364.
IEEE F. Gümüş, O. Ata, and H. H. Balık, “Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları”, Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 30, no. 1, pp. 345–364, 2018.
ISNAD Gümüş, Fatma et al. “Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama Ve Anomali Tespit Uygulamaları”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 30/1 (March 2018), 345-364.
JAMA Gümüş F, Ata O, Balık HH. Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2018;30:345–364.
MLA Gümüş, Fatma et al. “Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama Ve Anomali Tespit Uygulamaları”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 30, no. 1, 2018, pp. 345-64.
Vancouver Gümüş F, Ata O, Balık HH. Davranışsal Biyometrinin 5 Yılı: Kimlik Doğrulama ve Anomali Tespit Uygulamaları. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2018;30(1):345-64.