메뉴 건너뛰기




Volumn 1, Issue 1, 2008, Pages 81-113

Behavioural biometrics: a survey and classification

Author keywords

behavioural biometrics; features; motor skill; privacy; user verification

Indexed keywords


EID: 70350234989     PISSN: 17558301     EISSN: 1755831X     Source Type: Journal    
DOI: 10.1504/IJBM.2008.018665     Document Type: Article
Times cited : (260)

References (177)
  • 4
    • 84860283359 scopus 로고    scopus 로고
    • Using an active shape structural model for biometric sketch recognition
    • Magdeburg, Germany
    • Al-Zubi, S., Brömme, A., and Tönnies, K. (2003) ‘Using an active shape structural model for biometric sketch recognition’, Proceedings of DAGM, Magdeburg, Germany.
    • (2003) Proceedings of DAGM
    • Al-Zubi, S.1    Brömme, A.2    Tönnies, K.3
  • 5
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Company, Fort Washington, Pennsylvania
    • Anderson, J.P. (1980) ‘Computer security threat monitoring and surveillance’, Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 7
    • 3943082567 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • CUCS Technical Report
    • Apap, F., Honig, A., Hershkop, S., Eskin, E., and Stolfo, S. (2001) ‘Detecting malicious software by monitoring anomalous windows registry accesses’, Technical Report, CUCS Technical Report.
    • (2001) Technical Report
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 9
    • 84876806083 scopus 로고    scopus 로고
    • Biometric authentication revisited: understanding the impact of wolves in sheep’s clothing
    • Vancouver, BC, Canada
    • Ballard, L., Monrose, F., and Lopresti, D.P. (2006b) ‘Biometric authentication revisited: understanding the impact of wolves in sheep’s clothing’, Fifteenth USENIX Security Symposium, Vancouver, BC, Canada.
    • (2006) Fifteenth USENIX Security Symposium
    • Ballard, L.1    Monrose, F.2    Lopresti, D.P.3
  • 12
    • 84901551283 scopus 로고    scopus 로고
    • Personal identifiers in musicians’ finger movement dynamics
    • Bella, S.D. and Palmer, C. (2006) ‘Personal identifiers in musicians’ finger movement dynamics’, Journal of Cognitive Neuroscience, Vol. 18.
    • (2006) Journal of Cognitive Neuroscience , vol.18
    • Bella, S.D.1    Palmer, C.2
  • 16
    • 84947881488 scopus 로고    scopus 로고
    • FAQ
    • retrieved July 22, 2005
    • BioPrivacy Initiative (2005) ‘FAQ’, BioPrivacy Initiative, retrieved July 22, 2005 from http://www.bioprivacy.org/faqmain.htm.
    • (2005) BioPrivacy Initiative
    • BioPrivacy Initiative1
  • 20
    • 84860278177 scopus 로고    scopus 로고
    • Multifactor biometric sketch authentication
    • A. Brömme and C. Busch eds. Darmstadt, Germany
    • Brömme, A. and Al-Zubi, S. (2003) ‘Multifactor biometric sketch authentication’, in A. Brömme and C. Busch, eds., Proceedings of the BIOSIG 2003, Darmstadt, Germany.
    • (2003) Proceedings of the BIOSIG 2003
    • Brömme, A.1    Al-Zubi, S.2
  • 21
    • 0036875048 scopus 로고    scopus 로고
    • Automatic speechreading with applications to speaker verification
    • Special Issue on Joint Audio-Visual Speech Processing
    • Broun, C.C., Zhang, X., Mersereau, R.M. and Clements, M.A. (2002) ‘Automatic speechreading with applications to speaker verification’, Eurasip Journal on Applied Signal Processing, Special Issue on Joint Audio-Visual Speech Processing.
    • (2002) Eurasip Journal on Applied Signal Processing
    • Broun, C.C.1    Zhang, X.2    Mersereau, R.M.3    Clements, M.A.4
  • 23
    • 0031233424 scopus 로고    scopus 로고
    • Speaker recognition: a tutorial
    • Campbell, J.P. (1997) ‘Speaker recognition: a tutorial’, Proceedings of the IEEE, Vol. 85, No. 9, pp.1437–1462.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1437-1462
    • Campbell, J.P.1
  • 25
    • 84947880300 scopus 로고    scopus 로고
    • retrieved October 2, 2005
    • Caslon Analytics (2005) Caslon-Analytics, retrieved October 2, 2005 from http://www.caslon.com.au/biometricsnote6.htm.
    • (2005) Caslon-Analytics
    • Caslon Analytics1
  • 33
    • 84947881493 scopus 로고    scopus 로고
    • TV that watches you: the prying eyes of interactive television
    • Democratic Media (2001) ‘TV that watches you: the prying eyes of interactive television’, A Report by the Center for Digital Democracy, retrieved from http://www.democraticmedia.org/privacyreport.pdf.
    • (2001) A Report by the Center for Digital Democracy
    • Democratic Media1
  • 37
    • 26444499551 scopus 로고    scopus 로고
    • Multi-modal person recognition for vehicular applications
    • N.C. Oza et al. (eds.) LNCS 3541, Monterey, CA
    • Erdogan, H., Ercil, A., Ekenel, H., Bilgin, S., Eden, I., Kirisci, M. and Abut, H. (2005a) ‘Multi-modal person recognition for vehicular applications’, N.C. Oza et al. (eds.) MCS 2005, LNCS 3541, Monterey, CA.
    • (2005) MCS 2005
    • Erdogan, H.1    Ercil, A.2    Ekenel, H.3    Bilgin, S.4    Eden, I.5    Kirisci, M.6    Abut, H.7
  • 45
    • 8844279221 scopus 로고    scopus 로고
    • A behavioural biometric system based on human computer interaction
    • Gamboa, H. and Fred, A. (2004) ‘A behavioural biometric system based on human computer interaction’, Proceedings of SPIE.
    • (2004) Proceedings of SPIE
    • Gamboa, H.1    Fred, A.2
  • 50
    • 34548122028 scopus 로고    scopus 로고
    • User profiling for intrusion detection in Windows NT
    • Goldring, T. (2003) ‘User profiling for intrusion detection in Windows NT’, Computing Science and Statistics, Vol. 35.
    • (2003) Computing Science and Statistics , vol.35
    • Goldring, T.1
  • 56
    • 85149113847 scopus 로고    scopus 로고
    • Linguistic profiling for author recognition and verification
    • Halteren, H.V. (2004) ‘Linguistic profiling for author recognition and verification’, Proceedings of ACL-2004.
    • (2004) Proceedings of ACL-2004
    • Halteren, H.V.1
  • 64
    • 0029267472 scopus 로고
    • State transition analysis: a rule-based intrusion detection approach
    • Ilgun, K., Kemmerer, R.A. and Porras, P.A. (1995) ‘State transition analysis: a rule-based intrusion detection approach’, Software Engineering.
    • (1995) Software Engineering
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 65
    • 34147151570 scopus 로고    scopus 로고
    • retrieved July 12, 2006
    • Ilonen, J. (2006) ‘Keystroke dynamics’, retrieved July 12, 2006) from www.it.lut.fi/kurssit/03-04/010970000/seminars/Ilonen.pdf.
    • (2006) Keystroke dynamics
    • Ilonen, J.1
  • 74
  • 83
    • 78651566234 scopus 로고    scopus 로고
    • An application of symbolic learning to intrusion detection: preliminary results from the LUS methodology
    • George Mason University, Fairfax, VA
    • Kaufman, K., Cervone, G., and Michalski, R.S. (2003) ‘An application of symbolic learning to intrusion detection: preliminary results from the LUS methodology’, Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA.
    • (2003) Reports of the Machine Learning and Inference Laboratory, MLI 03-2
    • Kaufman, K.1    Cervone, G.2    Michalski, R.S.3
  • 92
    • 0013378353 scopus 로고    scopus 로고
    • Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette
    • Lane, T. and Brodley, C.E. (1997b) ‘Detecting the abnormal: machine learning in computer security’, Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette.
    • (1997) Detecting the abnormal: machine learning in computer security
    • Lane, T.1    Brodley, C.E.2
  • 93
    • 0242323507 scopus 로고    scopus 로고
    • A new similarity measure based on intra-class statistics for biometric systems
    • Lee, K. and Park, H. (2003) ‘A new similarity measure based on intra-class statistics for biometric systems’, ETRI Journal.
    • (2003) ETRI Journal
    • Lee, K.1    Park, H.2
  • 94
  • 105
    • 84901513294 scopus 로고    scopus 로고
    • retrieved July 28, 2006
    • Mainguet, J-F. (2006) ‘Biometrics’, retrieved July 28, 2006 from http://perso.orange.fr/fingerchip/biometrics/biometrics.htm.
    • (2006) Biometrics
    • Mainguet, J.-F.1
  • 106
    • 0034593307 scopus 로고    scopus 로고
    • Characterising the behaviour of a program using multiple-length n-grams
    • Cork, Ireland
    • Marceau, C. (2000) ‘Characterising the behaviour of a program using multiple-length n-grams’, Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland.
    • (2000) Proceedings of the New Security Paradigms Workshop 2000
    • Marceau, C.1
  • 115
    • 0031070158 scopus 로고    scopus 로고
    • Automatic online signature verification
    • Nalwa, V.S. (1997) ‘Automatic online signature verification’, Proceedings of the IEEE.
    • (1997) Proceedings of the IEEE
    • Nalwa, V.S.1
  • 120
  • 126
    • 0024861588 scopus 로고
    • Automatic signature verification and writer identification: the state of the art
    • Plamondon, R. and Lorette, G. (1989) ‘Automatic signature verification and writer identification: the state of the art’, Pattern Recognition, Vol. 22, No. 2, pp.107–131.
    • (1989) Pattern Recognition , vol.22 , Issue.2 , pp. 107-131
    • Plamondon, R.1    Lorette, G.2
  • 127
    • 84947881512 scopus 로고    scopus 로고
    • Stats and analysis
    • Poker-edge retrieved June 7, 2006
    • Poker-edge (2006) ‘Stats and analysis’, Poker-edge.com, retrieved June 7, 2006 from http://www.poker-edge.com/stats.php.
    • (2006) Poker-edge.com
  • 133
    • 33751109662 scopus 로고    scopus 로고
    • Quantifying the quality of web authentication mechanisms: a usability perspective
    • Rinton Press
    • Renaud, K. (2003) ‘Quantifying the quality of web authentication mechanisms: a usability perspective’, Journal of Web Engineering, Rinton Press, retrieved from http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf.
    • (2003) Journal of Web Engineering
    • Renaud, K.1
  • 143
    • 66149159137 scopus 로고    scopus 로고
    • A survey of unimodal biometric methods
    • Las Vegas, Nevada, USA
    • Solayappan, N. and Latifi, S. (2006) ‘A survey of unimodal biometric methods’, Security and Management, Las Vegas, Nevada, USA.
    • (2006) Security and Management
    • Solayappan, N.1    Latifi, S.2
  • 152
    • 0031274649 scopus 로고    scopus 로고
    • Wide-area internet traffic patterns and characteristics
    • Thompson, K., Miller, G., and Wilder, R. (1997) ‘Wide-area internet traffic patterns and characteristics’, IEEE Network.
    • (1997) IEEE Network
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 154
    • 33744976289 scopus 로고    scopus 로고
    • Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
    • Tsai, W-H. and Wang, H-M. (2006) ‘Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals’, IEEE Transactions on Audio, Speech and Language Processing.
    • (2006) IEEE Transactions on Audio, Speech and Language Processing
    • Tsai, W.-H.1    Wang, H.-M.2
  • 155
    • 26444562687 scopus 로고    scopus 로고
    • Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland
    • Tsymbal, A. (2004) ‘The problem of concept drift: definitions and related work’, Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland.
    • (2004) The problem of concept drift: definitions and related work
    • Tsymbal, A.1
  • 169
    • 84947881522 scopus 로고    scopus 로고
    • Motor-skill based biometrics
    • G. Dhillon (ed), Global Publishing, Las Vegas, NV, USA
    • th Annual Security Conference, G. Dhillon (ed), Global Publishing, Las Vegas, NV, USA.
    • (2007) th Annual Security Conference
    • Yampolskiy, R.V.1
  • 171
    • 37349076344 scopus 로고    scopus 로고
    • Use of behavioural biometrics in intrusion detection and online gaming. biometric technology for human identification III
    • Orlando, Florida
    • Yampolskiy, R.V. and Govindaraju, V. (2006b) ‘Use of behavioural biometrics in intrusion detection and online gaming. biometric technology for human identification III’, SPIE Defense and Security Symposium, Orlando, Florida.
    • (2006) SPIE Defense and Security Symposium
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 174
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioural models
    • Yeung, D.Y. and Ding, Y. (2002) ‘Host-based intrusion detection using dynamic and static behavioural models’, Pattern Recognition, Vol. 36, pp.229–243.
    • (2002) Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.