A Chinese Continuous Keystroke Authentication Method Using Cognitive Factors

被引:0
作者
Lin, Tu-Liang [1 ]
Chen, Yu-Sheng [1 ]
机构
[1] Natl Chiayi Univ, Dept Management Infoimat Syst, Chiayi, Taiwan
来源
2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW) | 2019年
关键词
Authentication; Keystroke Dynamics; Cognitive Factors; one-class SVM; DYNAMICS;
D O I
10.1109/icce-tw46550.2019.8991902
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Everyone has different biometrics, so personal biometrics can be applied to authentication. Moreover, the biological characteristics are not easy to be copied, and the user does not need to memorize and does not need to carry extra things. Biometrics can be divided into two types: physiological characteristics and behavioral characteristics. This study belongs to behavioral characteristics and adopts dynamic keystroke behavior to verify the identity. Many dynamic keystroke authentication methods have been proposed, but most of them are only suitable for English. Only very small numbers of keystroke authentication research are designed for other language (such as Chinese). This study focuses on how to use Chinese keystrokes for continuous authentication. Different persons have different vocabulary usages. The main influence comes from different exposure to different "word frequency" during the learning process. "Word frequency" is the frequency at which words appear in a person's life. Frequency varies due to the individual's life experience. Therefore, if the user frequently enters a word, the user will be more familiar with the input of the word, so the familiarity will be related to the past learning cognition. This study treats this familiarity as a cognitive factor, and explores the impact of cognitive factors on identity verification in Chinese language. This study compares the keystroke authentication with cognitive factors and the keystroke authentication without considering cognitive factors. It is found that the former is more accurate than the latter.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Continuous authentication by free-text keystroke based on CNN plus RNN
    Lu Xiaofeng
    Zhang Shengfei
    Yi Shengwei
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 314 - 318
  • [22] Identity authentication model from continuous keystroke pattern using CSO and LSTM network
    Tewari, Anurag
    Verma, Prabhat
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (3-4) : 217 - 235
  • [23] Continuous Keystroke Dynamics-Based User Authentication Using Modified Hausdorff Distance
    Zhuravskii, Maksim
    Kazachuk, Maria
    Petrovskiy, Mikhail
    Mashechkin, Igor
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 223 - 236
  • [24] Keystroke Dynamics-Based Authentication Using Unique Keypad
    Choi, Maro
    Lee, Shincheol
    Jo, Minjae
    Shin, Ji Sun
    SENSORS, 2021, 21 (06)
  • [25] Keystroke Authentication with a Capacitive Display using Different Mobile Devices
    Trojahn, Matthias
    Schadewald, Christian
    Ortmeier, Frank
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 580 - 585
  • [26] Multi-Model authentication using keystroke dynamics for Smartphones
    Cilia, Darren
    Inguanez, Frankie
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2018,
  • [27] Scan-Based Evaluation of Continuous Keystroke Authentication Systems
    Serwadda, Abdul
    Wang, Zibo
    Koch, Patrick
    Govindarajan, Sathya
    Pokala, Raviteja
    Goodkind, Adam
    Brizan, David-Guy
    Rosenberg, Andrew
    Phoha, Vir V.
    Balagani, Kiran
    IT PROFESSIONAL, 2013, 15 (04) : 20 - 23
  • [28] Modular Logic of Authentication Using Dynamic Keystroke Pattern Analysis
    Bhattasali, Tapalina
    Panasiuk, Piotr
    Saeed, Khalid
    Chaki, Nabendu
    Chaki, Rituparna
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
  • [29] Behavioural Biometric Authentication using Keystroke Features with Machine Learning
    Chandok, Rhea
    Bhoir, Vishwajeet
    Chinnaswamy, Santhanakrishnan
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [30] User authentication method based on keystroke dynamics and mouse dynamics using HDA
    Yutong Shi
    Xiujuan Wang
    Kangfeng Zheng
    Siwei Cao
    Multimedia Systems, 2023, 29 : 653 - 668