An introduction to Kolmogorov complexity and its applications (2nd ed.)
An introduction to Kolmogorov complexity and its applications (2nd ed.)
SSVM: A Smooth Support Vector Machine for Classification
Computational Optimization and Applications
Visual Identification by Signature Tracking
IEEE Transactions on Pattern Analysis and Machine Intelligence
A symbolic representation of time series, with implications for streaming algorithms
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Gaussian Mixture Models for on-line signature verification
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Towards parameter-free data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Two-factor authentication: too little, too late
Communications of the ACM - Transforming China
Handbook of Biometrics
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering
Proceedings of the VLDB Endowment
Game Bot Detection Based on Avatar Trajectory
ICEC '08 Proceedings of the 7th International Conference on Entertainment Computing
Intelligent human interface based on mental cloning-based software
Knowledge-Based Systems
Game bot identification based on manifold learning
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Understanding behaviors of a constructive memory agent: A markov chain analysis
Knowledge-Based Systems
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Explaining how to play real-time strategy games
Knowledge-Based Systems
Trajectory based behavior analysis for user verification
IDEAL'10 Proceedings of the 11th international conference on Intelligent data engineering and automated learning
DevilTyper: a game for CAPTCHA usability evaluation
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Hi-index | 0.00 |
For many computer activities, user verification is necessary before the system will authorize access. The objective of verification is to separate genuine account owners from intruders or miscreants. In this paper, we propose a general user verification approach based on user trajectories. A trajectory consists of a sequence of coordinated inputs. We study several kinds of trajectories, including on-line game traces, mouse traces, handwritten characters, and traces of the movements of animals in their natural environments. The proposed approach, which does not require any extra action by account users, is designed to prevent the possible copying or duplication of information by unauthorized users or automatic programs, such as bots. Specifically, the approach focuses on finding the hidden patterns embedded in the trajectories produced by account users. We utilize a Markov chain model with a Gaussian distribution in its transition to describe trajectory behavior. To distinguish between two trajectories, we introduce a novel dissimilarity measure combined with a manifold learned tuning technique to capture the pairwise relationship between the two trajectories. Based on that pairwise relationship, we plug-in effective classification or clustering methods to detect attempts to gain unauthorized access. The method can also be applied to the task of recognition, and used to predict the type of trajectory without the user's pre-defined identity. Our experiment results demonstrate that, the proposed method can perform better, or is competitive to existing state-of-the-art approaches, for both of the verification and recognition tasks.