博碩士論文 89522002 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:29 、訪客IP:3.15.206.200
姓名 蔡青峰(Ching-Feng Tsai)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 利用輸入時間結合輸入影像作個人身份之確認
(Personnel Identification Using Keystroke Dynamics and Typing Images)
相關論文
★ 使用視位與語音生物特徵作即時線上身分辨識★ 以影像為基礎之SMD包裝料帶對位系統
★ 手持式行動裝置內容偽變造偵測暨刪除內容資料復原的研究★ 基於SIFT演算法進行車牌認證
★ 基於動態線性決策函數之區域圖樣特徵於人臉辨識應用★ 基於GPU的SAR資料庫模擬器:SAR回波訊號與影像資料庫平行化架構 (PASSED)
★ 利用掌紋作個人身份之確認★ 利用色彩統計與鏡頭運鏡方式作視訊索引
★ 利用欄位群聚特徵和四個方向相鄰樹作表格文件分類★ 筆劃特徵用於離線中文字的辨認
★ 利用可調式區塊比對並結合多圖像資訊之影像運動向量估測★ 彩色影像分析及其應用於色彩量化影像搜尋及人臉偵測
★ 中英文名片商標的擷取及辨識★ 利用虛筆資訊特徵作中文簽名確認
★ 基於三角幾何學及顏色特徵作人臉偵測、人臉角度分類與人臉辨識★ 一個以膚色為基礎之互補人臉偵測策略
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著電子時代的來臨,許多的資料都數位化後儲存於電腦系統上處理。這使得電腦系統的安全性變的愈加重要,尤其是遇到機密或個人隱私的資料時。對於系統安全的第一道防線,通常就是對於使用者的身分確認。而最常見的身分確認方式就是要求使用者輸入帳號與密碼。這種方法雖然簡單、方便,但是相對的危險性也高。假如帳號和密碼被複製或遭竊,就有可能被人侵入系統裡盜取資料。因此,若能與具有難以複製或遭竊特性的生物特徵做結合,便可以提昇系統的安全性,降低被非法使用者登入的風險。
可用來作為個人身分確認的生物特徵主要可分為兩類。一是行為上的特徵,例如:簽名、打字習慣…等;另一種則是生理學上的特徵,例如:指紋、掌紋、掌型、視網膜…等。本論文將以輸入行為此項生物特徵為對象,針對打字時間及打字時手部動作的影像兩部分,做個人身分確認。進入電腦系統時輸入的帳號與密碼有可能遭到複製或盜取,但是輸入文字時的按鍵時間及手的動作、位置等動態資料卻不容易模仿及複製。因此,將輸入帳號過程中每個按鍵的按下及放開等時間作為特徵,利用倒傳遞神經網路做身分辨識。另外,以攝影機取得輸入時手部動作的影像並經由比對來確認輸入者的身分。在原本的帳號、密碼之外多一層具有生物特徵的辨認機制,以提昇識別系統的效能,有效防止非法的使用者登入系統來增加電腦系統的安全性。實驗結果驗證本論文所提出之身份辨認系統的可行性與有效性。
摘要(英) A lot of information will be digitalized and stored on computer system as the coming of electronic era. When the data was concerned with private information or commercial secrets, the security of computer system becomes more and more important. A general way to protect data against leak is to verify the identify of user. In general, it can be achieved by asking user to input a set of account and password. It is a simple and convenient way. However, it accompanies more risks. If the account and password of a user was grabbed or duplicated, data that stored in the computer system may be stolen. If we combine biometrics features that cannot be easily duplicated or stolen with account-password system, it can greatly improve the trustworthy and secure of identity verification system.
There are various kinds of biometrics that can be utilized for personal identification. In this thesis, the identity is identified of computer users by using typing biometrics. It is difficult to observe typing biometrics by naked eyes, but can be recorded by electronic devices. The identification system verifies keystroke dynamics of user’s login string as the characteristic patterns using neural network techniques both interkey and hold times were used as features for identifying computer users. The typing images that were captured by camera when users keyin their account are also adopted in our work. By combining keystroke dynamics with typing images, the performance of authentication system can be improved. Moreover, the developed system can prevent the occurring of forgery logins to certain extend. Experimental results verify the feasibility and validity of the proposed system in personal identification.
關鍵字(中) ★ 身份確認
★ 生物特徵
★ 敲鍵力學
關鍵字(英) ★ Personnel Identification
★ Keystroke Dynamics
★ Biometrics
論文目次 Abstract i
摘要 ii
目錄 ii
附圖目錄 iv
表格目錄 v
第一章 緒論 1
1.1 研究動機 1
1.2 相關研究 2
1.3 系統流程 5
1.4 論文架構 7
第二章 以鍵盤輸入時間為特徵之身分辨識 8
2.1 輸入時間之取得 9
2.2 資料建立及辨識 11
第三章 以輸入時影像為特徵抽取來源之身分辨識 16
3.1 前處理 17
3.2 特徵抽取 22
3.3 特徵比對 25
第四章 實驗結果 28
4.1 以鍵盤輸入時間為特徵之身分確認系統 29
4.2 以輸入時影像為特徵抽取來源之身分確認系統 31
4.3 結合輸入時間及影像之身分確認系統 33
第五章 結論與未來工作 36
參考文獻 38
參考文獻 [1] Daw-Tung Lin “Computer-access authentication with neural network based keystroke identity verification” Neural Networks, 1997. International Conference on, Volume: 1, 1997, Page(s): 174 -178 vol.1
[2] Fabian Monrose, Aviel D. Rubin “Keystroke dynamics as a biometric for authentication” Future Generation Computer System, Volume: 16, 2000, Page(s): 351-359
[3] Robinson, J.A.; Liang, V.W.; Chambers, J.A.M.; MacKenzie, C.L. “Computer user verification using login string keystroke dynamics” Systems, Man and Cybernetics, Part A, IEEE Transactions on,
Volume: 28 Issue: 2, March 1998, Page(s): 236 -241
[4] Obaidat, M.S.; Sadoun, B. “Verification of computer users using keystroke dynamics” Systems, Man and Cybernetics, Part B, IEEE Transactions on, Volume: 27 Issue: 2, April 1997, Page(s): 261 -269
[5] Haider, S.; Abbas, A.; Zaidi, A.K. “A multi-technique approach for user identification through keystroke dynamics” Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Volume: 2, 2000, Page(s): 1336 -1341 vol.2
[6] Maisuria, L.K.; Cheng Soon Ong; Wen Kin Lai “A comparison of artificial neural networks and cluster analysis for typing biometrics authentication” Neural Networks, 1999. IJCNN ’’99. International Joint Conference on, Volume: 5, 1999, Page(s): 3295 -3299 vol.5
[7] Ho-Sub Yoon; Byung-Woo Min; Jung Soh; Young-Iae Bae; Hyun Seung Yang “Human computer interface for gesture-based editing system” Image Analysis and Processing, 1999. Proceedings. International Conference on, 1999, Page(s): 969 –974
[8] Ying Wu; Qiong Liu; Huang, T.S. “Robust real-time human hand localization by self-organizing color segmentation” Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, 1999. Proceedings. International Workshop on, 1999, Page(s): 161 -166
[9] Azoz, Y.; Devi, L.; Sharma, R. “Tracking hand dynamics in unconstrained environments” Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on, 1998, Page(s): 274 -279
[10] Shafarenko, L.; Petrou, H.; Kittler, J. “Histogram-based segmentation in a perceptually uniform color space” Image Processing, IEEE Transactions on, Volume: 7 Issue: 9, Sept. 1998, Page(s): 1354 -1358
[11] Garcia, C.; Tziritas, G. “Face detection using quantized skin color regions merging and wavelet packet analysis” Multimedia, IEEE Transactions on, Volume: 1 Issue: 3, Sept. 1999, Page(s): 264 -277
指導教授 范國清(Kuo-Chin Fan) 審核日期 2002-7-8
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明