A Chinese Continuous Keystroke Authentication Method Using Cognitive Factors

被引:0
|
作者
Lin, Tu-Liang [1 ]
Chen, Yu-Sheng [1 ]
机构
[1] Natl Chiayi Univ, Dept Management Infoimat Syst, Chiayi, Taiwan
来源
2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW) | 2019年
关键词
Authentication; Keystroke Dynamics; Cognitive Factors; one-class SVM; DYNAMICS;
D O I
10.1109/icce-tw46550.2019.8991902
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Everyone has different biometrics, so personal biometrics can be applied to authentication. Moreover, the biological characteristics are not easy to be copied, and the user does not need to memorize and does not need to carry extra things. Biometrics can be divided into two types: physiological characteristics and behavioral characteristics. This study belongs to behavioral characteristics and adopts dynamic keystroke behavior to verify the identity. Many dynamic keystroke authentication methods have been proposed, but most of them are only suitable for English. Only very small numbers of keystroke authentication research are designed for other language (such as Chinese). This study focuses on how to use Chinese keystrokes for continuous authentication. Different persons have different vocabulary usages. The main influence comes from different exposure to different "word frequency" during the learning process. "Word frequency" is the frequency at which words appear in a person's life. Frequency varies due to the individual's life experience. Therefore, if the user frequently enters a word, the user will be more familiar with the input of the word, so the familiarity will be related to the past learning cognition. This study treats this familiarity as a cognitive factor, and explores the impact of cognitive factors on identity verification in Chinese language. This study compares the keystroke authentication with cognitive factors and the keystroke authentication without considering cognitive factors. It is found that the former is more accurate than the latter.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] A study on continuous authentication using a combination of keystroke and mouse biometrics
    Mondal, Soumik
    Bours, Patrick
    NEUROCOMPUTING, 2017, 230 : 1 - 22
  • [2] Keystroke Dynamics for Continuous Authentication
    Ananya
    Singh, Saurabh
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 205 - 208
  • [3] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [4] Free Typed Text Using Keystroke Dynamics for Continuous Authentication
    Pinto, Paulo
    Patrao, Bernardo
    Santos, Henrique
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 33 - 45
  • [5] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Imane Lamiche
    Guo Bin
    Yao Jing
    Zhiwen Yu
    Abdenour Hadid
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4417 - 4430
  • [6] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Lamiche, Imane
    Bin, Guo
    Jing, Yao
    Yu, Zhiwen
    Hadid, Abdenour
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4417 - 4430
  • [7] Hybrid Method for Active Authentication using Keystroke Dynamics
    Kaganov, Vladislav
    Korolyov, Andrey
    Krylov, Mikhail
    Mashechkin, Igor
    Petrovskiy, Mikhail
    2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, : 61 - 66
  • [8] Synthetic Forgery Attack Against Continuous Keystroke Authentication Systems
    Sun, Yan
    Upadhyaya, Shambhu
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [9] A Keystroke Dynamics Based Approach for Continuous Authentication
    El Menshawy, Dina
    Mokhtar, Hoda M. O.
    Hegazy, Osman
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2014, 2014, 424 : 415 - 424
  • [10] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    CYBERSECURITY, 2021, 4 (01)