A Tharwat
Personal identification based on mobile-based keystroke dynamics
Tharwat, A; Ibrahim, A; Gaber, T; Hassanien, AE
Authors
A Ibrahim
T Gaber
AE Hassanien
Abstract
This paper is addressing the personal identification problem by using mobile-based keystroke dynamics of touch mobile phone. The proposed approach consists of two main phases, namely feature selection and classification. The most important features are selected using Genetic Algorithm (GA). Moreover, Bagging classifier used the selected features to identify persons by matching the features of the unknown person with the labeled features. The outputs of all Bagging classifiers are fused to determine the final decision. In this experiment, a keystroke dynamics database for touch mobile phones is used. The database, which consists of four sets of features, is collected from 51 individuals and consists of 985 samples collected from males and females with different ages. The results of the proposed model conclude that the third subset of features achieved the best accuracy while the second subset achieved the worst accuracy. Moreover, the fusion of all classifiers of all ensembles will improve the accuracy and achieved results better than the individual classifiers and individual ensembles.
Citation
Tharwat, A., Ibrahim, A., Gaber, T., & Hassanien, A. Personal identification based on mobile-based keystroke dynamics. Presented at International Conference on Advanced Intelligent Systems and Informatics
Presentation Conference Type | Other |
---|---|
Conference Name | International Conference on Advanced Intelligent Systems and Informatics |
Publication Date | Aug 29, 2018 |
Deposit Date | Sep 11, 2019 |
Publicly Available Date | Sep 26, 2019 |
DOI | https://doi.org/10.1007/978-3-319-99010-1_42 |
Publisher URL | https://doi.org/10.1007/978-3-319-99010-1_42 |
Related Public URLs | https://link.springer.com/conference/aisi |
Additional Information | Event Type : Conference |
Files
Personal Identification Based on Mobile-based Keystroke Dynamics_Tarek_AMLTA19.pdf
(339 Kb)
PDF
You might also like
Empowering Business Leaders with AI and Cybersecurity Education
(2025)
Presentation / Conference Contribution
Adversarial-aware Machine Learning for Enhancing Smart Grid Security
(2024)
Presentation / Conference Contribution
How universities teach cybersecurity courses online: a systematic literature review
(2024)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search