+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Eremenko A.

Degree
PhD in Technique, Omsk State Transport University
E-mail
4eremenko@gmail.com
Location
Omsk
Articles

Two-factor authentication of users of computer systems on remote server using the keyboard handwriting

authentication server. The method of two-factor authentication of users of computer systems on the remote server using personal biometric data is proposed. The method based on error-correcting coding and other conversion of biometric data. The developed method is based on «fuzzy extractors» and allows to store only fragments of biometric standard on the server and does not allow to restore the standard if this fragments were stolen. As the biometric features of a person is proposed to use the keystroke dynamics: duration of retention and the time intervals between keystrokes as a person type the passphrase on the keypad. An original way to use information about the stability of biometric features is proposed. The information about biometric features stability is used to choose the best ones for preparing a cryptographic key and decrease errors of key generation. Also it is a part of a secret information that storages on the server side and used in key recovery procedure. As a part of the future research for «combining» and «subtraction» bit sequences of PRN code and biometric data for cryptographic key generation it is planned to use fuzzy implication operation, adapting one of the fuzzy inference algorithms (Tsukamoto, Sugeno, Mamdani, Larsen et al.)
Read more...

Generation of key sequences based on voice messages

The problem of the generation of the key sequences on the basis of biometric data is described. Objective: To develop a method of generating a key sequence based on the subject of voice parameters with indicators of reliability and key length exceeding achieved. Two features spaces of human voice are proposed: dependent and independent of the uttered phrase. The methods of generating keys based on voice messages on the basis of fuzzy extractors using Hadamard or Bose — Chaudhuri — Hocquenghem error correcting codes are proposed. Also the ranking procedure of most stable features individual for each subject was proposed. The effectiveness of the proposed method was defined. The optimum methods for each proposed feature space have been found. These results are superior to previously achieved by generating a key sequence based on voice. Read more...

Identification potential of keyboard handwriting considering vibration parameters and force keystrokes

The article considers the problem of data protection from unauthorized access by means of user identification by keyboard handwriting. The estimation of informativeness of different features that characterize the keyboard handwriting of subjects, including the dynamics of change in pressure when you press the keys and keyboard settings vibration. The category of new features, based on using of wavelet transform Daubechies D6 to function of the pressure fingers on the keys and keyboard functions of vibration while typing, was proposed. The laws of distribution of basic and additional features of keyboard handwriting were determined. To form the base of biometric samples a keyboard was designed with the use of special sensors. The estimation of the correlation dependence of features was made. It is determined that the correlation between basic features (temporal characteristics of keystrokes) and additional features (pressure on the keys and the keyboard vibration) in more than 80% of cases is weak. Thus, in the proposed new attributes contain information about the subject. An assessment of the probability of identification errors based on the Bayesian strategy using the various features of the spaces was made. It is found that additional features can reduce the average number of errors is more than 7 times.
Read more...