
 
genuine attempts to enter the system were successful 
(FRR=0). 
The results of this simple system reveal that the 
idea of using a 3D authentication system is feasible 
with a False Acceptance Rate of 0.1167 (1-0.8833). 
This value is calculated at a zero value for False 
Rejection Rate. 
It seems that the data recorded in one session was 
more related to each other than the data recorded in 
the other session. Therefore, the data should be 
gathered at different times, as might be expected in a 
practical system.  
6 RECOMMENDATIONS FOR 
FUTURE WORK 
Behavioural authentication has the potential to be 
introduced as a powerful authentication tool where 
variables can be extracted easily. However extensive 
research is needed to improve it. This section 
provides several recommendations to improve the 
system that was studied in this paper. 
One of the drawbacks of the system implemented 
in this project was the small amount of data 
available for the analysis. Gathering more data from 
the user behaviour in the 3D environment could 
improve the results. Several ways to increase the 
amount of data are: 
1.  Adding more directions (up and down) in y 
axis. An example could be adding floors to the 
environment.  
2.  Increasing the test time. This may decrease the 
level of system acceptability among users. 
Although, ideally, these behavioural metrics 
should be extracted without the user’s 
knowledge. 
3.  Defining additional levels of behavioural 
analysis.  
4.  Using keystroke dynamics analysis similar to 
one was used in (Bergadano, Gunetti, & 
Picardi, 2002). 
Another suggestion is to improve the analytical 
methods of data analysis. As was shown in the 
results section, the analysis method has a great effect 
on the results achieved.
 
7 CONCLUSIONS 
The aim of this study was to investigate the 
feasibility of having an authentication system based 
on user's behaviour. A 3D authentication system was 
implemented for the feasibility study. The results of 
conducting the tests show an average True Rejection 
Rate of 88.33% with an average False Acceptance 
Rate of 11.67%. These rates are not perfect but it 
shows the possibility of implementing this system.  
The findings show that although more studies are 
needed, the concept of having a 3D authentication 
system is feasible.  
ACKNOWLEDGEMENTS 
We would like to express our gratitude to the 
University of Portsmouth and the Iraqi Ministry of 
Communication for allowing this research to be 
undertaken. 
REFERENCES 
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User 
authentication through keystroke dynamics. ACM 
Trans. Inf. Syst. Secur. , 5 (4), 367-397. 
Buthan, I., & Hartel, P. (2005). The state of the art in 
abuse of biometrics. Technical Report, Centre for 
Telematics and Information Technology, Enschede. 
Gamboa, H., & Fred, A. (2004). A Behavioural Biometric 
System Based on Human Computer Interaction. Proc. 
SPIE - Int. Soc. Opt. Eng. (pp. 381-92). Orlando, 
USA: SPIE-Int. Soc. Opt. Eng. 
Jin, Z., Teoh, A. B., Thian, S. O., & Tee, C. (2008). 
Typing dynamics biometric authentication through 
fuzzy logic. Proc. - Int. Symp. Inf. Technol., ITSim 
(pp. 1 - 6). Kuala Lumpur, Malaysia: IEEE. 
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). 
Enhancing security and privacy in biometrics-based 
authentication systems. IBM Systems Journal , 40 (3), 
614-34. 
Yampolskiy, R. (2008). Behavioral modeling: an 
overview.  American Journal of Applied Sciences , 5 
(5), 496--503. 
Yampolskiy, R., & Govindaraju, V. (2009). Strategy-
based behavioural biometrics: a novel approach to 
automated identification. International Journal of 
Computer Applications in Technology , 35 (1), 29-41. 
 
GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
89