Skip to main content

An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 191))

Included in the following conference series:

  • 1419 Accesses

Abstract

This paper proposes an algorithm to use mouse gestures as an optional login facility which can be integrated into existing systems that require an additional level of security. The aim of this facility is to eliminate the problem of login using the traditional keyboard in public systems by incorporating a real time user signature. The main advantage of this facility is that no additional hardware component or device is required apart from a standard mouse. This implies that this algorithm will make existing systems more secure at no additional cost. This system works by accepting mouse gestures as inputs from the user. The gestures are then interpreted as patterns of mouse motions and are converted to strings based on change of directions. These strings can be further improved in complexity and fed as password to the system authentication module via a pluggable authentication module (PAM).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Freeman, W.T., Roth, M.: Orientation histograms for hand gesture recognition. In: Intl. Workshop on Automatic Face- and Gesture- Recognition, pp. 296–301. IEEE Computer Society, Zurich (1995)

    Google Scholar 

  2. Hong, P., Turk, M., Huang, T.S.: Gesture Modelling and Recognition Using Finite State Machines. In: Proceedings of the IEEE conference on Face and Gesture Recognition (March 2000)

    Google Scholar 

  3. Lee, H.-K., Kim, J.-H.: A HMM Based threshold model approach for gesture recognition. IEEE Transactions on Pattern Anaylsis and Machine Intelligence 21(10), 961–973 (1999)

    Article  Google Scholar 

  4. Shilbayeh, N.F., Raho, G., Alkhateeb, M.: An efficient Structural Mouse Gesture approach for recognizing Hindi digits. Journal of Applied Sciences (2009)

    Google Scholar 

  5. Erickson, K.: Different methods of interpreting mouse gestures, www.cs.mtu.edu/~rpastel/Research/Code/KyleEricksen/gestures.pdf

  6. Shilbayeh, N.F., Iskadaran, M.Z.: An intelligent multilingual mouse gesture recognistion system. Journal of Computer Science 1(3), 346–350, doi:10.3844/jcssp.2005.346.350

    Google Scholar 

  7. Gafurov, D., Snekkkenes, E.: Arm Swing as a Weak Biometric for Unobtrusive User Authentication. Intelligent Information Hiding and Multimedia Signal Processing, 1080–1087 (2008)

    Google Scholar 

  8. Conklin, A., Dietrich, G., Walz, D.: Password-based authentication: a system perspective. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 10 (2004)

    Google Scholar 

  9. Gandossi, A.J., Liu, W., Tjahyadi, R.: A Biometric Approach to Linux Login Access Control. In: 9th International Conference on Control, Automation, Robotics and Vision, ICARCV 2006, December 5-8 (2006)

    Google Scholar 

  10. Harn, L., Lin, H.-Y.: Integration of user authentication and access control” Computers and Digital Techniques. IEE Proceedings 139(2), 139–144 (1992)

    Google Scholar 

  11. Hofman, P.: Selected Issues of Artificial Intelligence in the Construction of User Interface to a CASE System. MSc Thesis, Wroclaw Uniwersity of Technology (2005)

    Google Scholar 

  12. Newman, W., Lamming, M.: Interactive System Design. Addison-Wesley, Publisher (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Banerjee, U., Swaminathan, A. (2011). An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22714-1_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22713-4

  • Online ISBN: 978-3-642-22714-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics