Modification of the relative distance for free text keystroke authentication

被引:3
作者
Davoudi H. [1 ]
Kabir E. [1 ]
机构
[1] Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran
来源
2010 5th International Symposium on Telecommunications, IST 2010 | 2010年
关键词
Biometrics; Distance measure; Free text; Keystroke patterns; Relative distance; User authentication;
D O I
10.1109/ISTEL.2010.5734085
中图分类号
学科分类号
摘要
Unlike many other biometrics, keystroke authentication does not require any additional hardware. Pressing time of keystrokes is the main source of information and can be extracted continuously during an ongoing session, even after the login time. The relative distance, which is a common measure in this field, is defined based on the relative typing speed of different digraphs. To improve the accuracy of authentication based on this measure, we propose to assign a weight to each digraph depending on its typing speed reliability; this expands the effectiveness of reliable digraphs in distance computation. The proposed method is tested on 315 typing samples of 21 users. The results show that our method will improve the accuracy in both forms of FAR and FRR measures. © 2010 IEEE.
引用
收藏
页码:547 / 551
页数:4
相关论文
共 16 条
  • [1] Bolle R.M., Connell J.H., Pankanti S., Ratha N.K., Sr. A., Guide to Biometrics, (2004)
  • [2] Authentication Basics IOSoftware, (2005)
  • [3] Jin L., Ke X., Manuel R., Wilkerson M., Keystroke dynamics: A software based biometric solution, Proc. of 13th USENIX Security Symposium, (2004)
  • [4] Loy C.C., Lai W.K., Lim C.P., Keystroke patterns classification using the ARTMAP-FD neural network, Proc. of the 3rd Int. Conf. on Intelligent Information, Hiding and Multimedia Signal Processing, pp. 61-64, (2007)
  • [5] Joshi S.S., Phoha V.V., Competition between SOM clusters to model user authentication system in computer networks, Proc. of 2nd Int. Conf. on Communication Systems Software and Middleware, CSOMSWARE, pp. 1-8, (2007)
  • [6] Cho T.H., Pattern classification methods for keystroke analysis, Int. Joint Conf. SICE-ICASE, pp. 3812-3815, (2006)
  • [7] Chen W., Chang W., Applying hidden Markov models to keystroke pattern analysis for password verification, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI-2004, pp. 467-474, (2004)
  • [8] Chang W., Improving hidden Markov models with a similarity histogram for typing pattern biometrics, Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, 2005, pp. 487-493, (2005)
  • [9] Hosseinzadeh D., Krishnan S., Khademi A., Keystroke identification based on Gaussian mixture models, Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, (2006)
  • [10] Sim T., Janakiraman R., Are digraphs good for free-text keystroke dynamics?, Proc. of the IEEE Conf. in Computer Vision and Pattern Recognition (CVPR), pp. 1-6, (2007)