Skip to main content

Inconspicuous personal computer protection with touch-mouse

Publication ,  Conference
Huang, MC; Xu, W; Liu, JJ; Su, Y; He, L; Sarrafzadeh, M
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
January 1, 2013

We present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touchmouse [1] under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pressure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action primitives. This design serves as an assistive method to enhance existing password and biometric based security mechanisms, enabling continuous and unobtrusive personal identity monitoring. Commercialized windows-based systems can be seamlessly integrated with the proposed system and this design can offer a convenient and lightweight solution for physical computer intrusion detection. © 2013 Springer-Verlag Berlin Heidelberg.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2013

Volume

8030 LNCS

Start / End Page

29 / 38

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Huang, M. C., Xu, W., Liu, J. J., Su, Y., He, L., & Sarrafzadeh, M. (2013). Inconspicuous personal computer protection with touch-mouse. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8030 LNCS, pp. 29–38). https://doi.org/10.1007/978-3-642-39345-7_4
Huang, M. C., W. Xu, J. J. Liu, Y. Su, L. He, and M. Sarrafzadeh. “Inconspicuous personal computer protection with touch-mouse.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8030 LNCS:29–38, 2013. https://doi.org/10.1007/978-3-642-39345-7_4.
Huang MC, Xu W, Liu JJ, Su Y, He L, Sarrafzadeh M. Inconspicuous personal computer protection with touch-mouse. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 29–38.
Huang, M. C., et al. “Inconspicuous personal computer protection with touch-mouse.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8030 LNCS, 2013, pp. 29–38. Scopus, doi:10.1007/978-3-642-39345-7_4.
Huang MC, Xu W, Liu JJ, Su Y, He L, Sarrafzadeh M. Inconspicuous personal computer protection with touch-mouse. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 29–38.

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2013

Volume

8030 LNCS

Start / End Page

29 / 38

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences