IMT6121 - Behavioural Biometrics


Examination arrangement

Examination arrangement: Portfolio assessment
Grade: Passed/Failed

Evaluation form Weighting Duration Examination aids Grade deviation
Portfolio assessment 100/100 ALLE

Course content

Authentication methods in general

Password Security

Behavioural biometric system evaluation

Gait recognition

Keystroke Dynamics

Signature verification 

Mouse Dynamics

Continuous Authentication Systems

Evaluation of Continuous Authentication Systems

Learning outcome

Give the candidates an improved understanding of 

Different general authentication mechanisms

Selected authentication methods: passwods/PIN, gait, signature, keystroke dynamics, mouse dynamics

The concept of Continuous Authentication

Technics to test autentication methods


The candidate possesses thorough knowledge of the security of knowledge based authentication systems.

The candidate possesses advanced knowledge in the theory, design and evaluation of Behavioural Biometric Systems.

The candidate possesses advanced knowledge in the theory, design, and evaluation of Continuous Authentication Systems.

The candidate is capable of applying his/her knowledge in the field of IT-security.

The candidate is capable of updating his/her own knowledge in authentication related topics.


The candidate is capable of using relevant scientific methods in independent research and analysis in biometrics.

The candidate is capable of performing critical analysis of various literature sources on authentication methods.

The candidate know relevant authentication methods and terminology.

General competence:

The candidate is capable of taking part in debates in national and international fora within the field of authentication and behavioural biometrics.

The candidate is capable of working independently in the field of biometrics and is familiar with biometric terminology.

The candidate is capable of analyzing relevant professional and research publications in behavioural biometrics.

Learning methods and activities

-Project work

Additional information: This course will be mainly self-study with some supervision of the lecturer.

Compulsory requirements: None

Further on evaluation

Utfyllende om kontinuasjon:

The whole course needs to be repeated


The final grade is based upon written report and an oral examination.

The student must provide a report on a topic that is chosen by the lecturer.

The oral exam will focus on both the report and the course content.

Specific conditions

Admission to a programme of study is required:
Computer Science (PHD-CS)
Information Security (PHD-IS)
Information Security and Communication Technology (PHISCT)

Course materials

A reader written by the lecturer is handed out to the candidates at the beginning of the course. Additional course material is availble in Blackboard.

More on the course



Version: 1
Credits:  5.0 SP
Study level: Doctoral degree level


Term no.: 1
Teaching semester:  AUTUMN 2020

Term no.: 1
Teaching semester:  SPRING 2021

Language of instruction: English

Location: Gjøvik

Subject area(s)
  • Informatics
Contact information
Course coordinator:

Department with academic responsibility
Department of Information Security and Communication Technology



Examination arrangement: Portfolio assessment

Term Status code Evaluation form Weighting Examination aids Date Time Digital exam Room *
Spring ORD Portfolio assessment 100/100 ALLE

Submission 2021-06-03

Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU