Biometric Identification in Virtual Worlds using Biometric Fusion Techniques

Ahmed Al-Khazzar, Nick Savage

2012

Abstract

The use of virtual worlds is becoming popular in many fields such as education, economy, space, and games. With the widespread use of virtual worlds, establishing the security of these systems becomes more important. In this paper a behavioural biometric system is implemented to identify users of a virtual environment. This research suggests the use of a score level fusion technique to improve the identification performance of the system. The identification is achieved by analysing user interactions within the virtual environments and comparing these interactions with the previously recorded interactions in the database. The results showed that using score level biometric fusion in behavioural biometric systems similar to the one presented in this research is a promising tool to improve the performance of these systems. The use of biometric fusion technique enhanced the performance of the implemented biometric system up to 7.5%. An average equal error rate of up to 22.7% was achieved in this work.

References

  1. Bergadano, F., Gunetti, D., and Picardi, C., (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security , 5 (4), 367-397.
  2. Buthan, I. and Hartel, P., (2005). The state of the art in abuse of biometrics. Technical Report, Centre for Telematics and Information Technology, Enschede.
  3. Cline, M., (2005). Power, Madness, and Immortality: the future of virtual reality. University Village Press.
  4. Dharmawansa, A., Nakahira, K., and Fukumura, Y., (2011). Develop a Monitoring Tool and Extract Facial Expression towards the Analyzing Student Behavior in Three Dimensional Virtual Environment. Biometrics and Kansei Engineering (ICBAKE), 2011 International Conference on (pp. 134 -139). Takamatsu, Japan: Abrasive Engineering Society.
  5. Drosou, A., Ioannidis, D., Moustakas, K., and Tzovaras, D., (2012). Spatiotemporal analysis of human activities for biometric authentication. Computer Vision and Image Understanding , 411 - 421.
  6. Gavrilova, M. L., and Yampolskiy, R. V., (2010). Applying Biometric Principles to Avatar Recognition. Proc. Int Cyberworlds (CW) Conf (pp. 179-186). Singapore: IEEE Computer Society.
  7. Golle, P., and Ducheneaut, N., (2005). Preventing bots from playing online games. Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment , 3 (3), 1-10.
  8. Gonzalez-Pardo, A., Rodriguez, F. B., Pulido, E., and Camacho, D., (2010). Using virtual worlds for behaviour clustering-based analysis. SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010, (pp. 9-14). Firenze, Italy.
  9. Harris, B., and Novobilski, A., (2008). Real currency economies: Using real money in virtual worlds. 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering, FECS 2008 (pp. 241 - 246). Las Vegas: CSREA Press.
  10. Horng, S.-J., Chen, Y.-H., Run, R.-S., Chen, R.-J., Lai, J.- L., and Sentosal, K., (2009). An Improved Score Level Fusion in Multimodal Biometric Systems. Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on (pp. 239 -246). Higashi Hiroshima : IEEE.
  11. Hube, J. (2010). Methods for estimating biometric score level fusion. Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on (pp. 1 - 6). Washington, DC, USA: IEEE.
  12. Ishikawa, N., Watanabe, Y., Nishimura, R., Umemoto, K., Okada, Y. and Murata, M., (2010). Detection of users suspected of using multiple user accounts and manipulating evaluations in a community site. 2010 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE 2010), (pp. 1-8). Beijing.
  13. Kim, B., Barua, A., and Whinston, A., (2002). Virtual field experiments for a digital economy: a new research methodology for exploring an information economy. Decision Support Systems , 215 - 231.
  14. Noor, A., (2010). Potential of virtual worlds for remote space exploration. Advances in Engineering Software , 666 - 673.
  15. Peng, H., and Xu, X., (2008). The Analysis of Arbitrage Capital Flows between Online Virtual Game and Real Economy Based on Risk Premium. Computational Intelligence for Modelling Control Automation, 2008 International Conference on (pp. 1141 -1146). Vienna, Austria: IEEE.
  16. Ratha, N. K., Connell, J. H., and Bolle, R. M., (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal , 40 (3), 614-34.
  17. Romann, J., (2007). Projective virtual reality today and in the future: Application of virtual worlds in space, industry, and at the construction site with robotic know-how to improved virtual worlds. VDI Berichte , 55-67.
  18. Ross, A., and Nandakumar, K., (2009). Score-Level Fusion. In S. Z. Li, and A. K. Jain, Encyclopeida of Biometrics (pp. 611 - 621). Springer Science+Business Media, LLC.
  19. Schuckers, S. A., (2002). Spoofing and anti-spoofing measures. Information security technical report , 7 (4), 56-62.
  20. Standing document 2. (2007, 08 22). Standing document 2, harmonized biometric vocabulary, version 8 . ISO/IEC JTC 1/SC 37 N 2263.
  21. Thawonmas, R., Kashifuji, Y., and Chen, K.-T., (2008). Detection of MMORPG bots based on behavior analysis. Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology, ACE 2008, (pp. 91-94). Yokohama, Japan.
  22. Toth, B., (2005). Biometric liveness detection. Information Security Bulletin, (pp. 291-297).
  23. Tran, Q., Liatsis, P., Zhu, B., and He, C., (2011). An approach for multimodal biometric fusion under the missing data scenario. Uncertainty Reasoning and Knowledge Engineering (URKE), 2011 International Conference on (pp. 185 -188). Bali, Indonesia: IEEE.
  24. Yampolskiy, R., and Govindaraju, V., (2007). Behavioral biometrics for recognition and verification of game bots. 8th International Conference on Intelligent Games and Simulation. GAME-ON 2007, (pp. 108- 114). Ghent-Zwijnaarde, Belgium.
Download


Paper Citation


in Harvard Style

Al-Khazzar A. and Savage N. (2012). Biometric Identification in Virtual Worlds using Biometric Fusion Techniques . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 263-269. DOI: 10.5220/0004054602630269


in Bibtex Style

@conference{secrypt12,
author={Ahmed Al-Khazzar and Nick Savage},
title={Biometric Identification in Virtual Worlds using Biometric Fusion Techniques},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={263-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004054602630269},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Biometric Identification in Virtual Worlds using Biometric Fusion Techniques
SN - 978-989-8565-24-2
AU - Al-Khazzar A.
AU - Savage N.
PY - 2012
SP - 263
EP - 269
DO - 10.5220/0004054602630269