A Chinese Continuous Keystroke Authentication Method Using Cognitive Factors

被引:0
作者
Lin, Tu-Liang [1 ]
Chen, Yu-Sheng [1 ]
机构
[1] Natl Chiayi Univ, Dept Management Infoimat Syst, Chiayi, Taiwan
来源
2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW) | 2019年
关键词
Authentication; Keystroke Dynamics; Cognitive Factors; one-class SVM; DYNAMICS;
D O I
10.1109/icce-tw46550.2019.8991902
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Everyone has different biometrics, so personal biometrics can be applied to authentication. Moreover, the biological characteristics are not easy to be copied, and the user does not need to memorize and does not need to carry extra things. Biometrics can be divided into two types: physiological characteristics and behavioral characteristics. This study belongs to behavioral characteristics and adopts dynamic keystroke behavior to verify the identity. Many dynamic keystroke authentication methods have been proposed, but most of them are only suitable for English. Only very small numbers of keystroke authentication research are designed for other language (such as Chinese). This study focuses on how to use Chinese keystrokes for continuous authentication. Different persons have different vocabulary usages. The main influence comes from different exposure to different "word frequency" during the learning process. "Word frequency" is the frequency at which words appear in a person's life. Frequency varies due to the individual's life experience. Therefore, if the user frequently enters a word, the user will be more familiar with the input of the word, so the familiarity will be related to the past learning cognition. This study treats this familiarity as a cognitive factor, and explores the impact of cognitive factors on identity verification in Chinese language. This study compares the keystroke authentication with cognitive factors and the keystroke authentication without considering cognitive factors. It is found that the former is more accurate than the latter.
引用
收藏
页数:2
相关论文
共 50 条
  • [31] User authentication method based on keystroke dynamics and mouse dynamics using HDA
    Shi, Yutong
    Wang, Xiujuan
    Zheng, Kangfeng
    Cao, Siwei
    [J]. MULTIMEDIA SYSTEMS, 2023, 29 (02) : 653 - 668
  • [32] A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics
    Gedikli, Ahmet Melih
    Efe, Mehmet Onder
    [J]. PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 1144 : 9 - 23
  • [33] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    [J]. Cybersecurity, 4
  • [34] One-Class Models for Continuous Authentication Based on Keystroke Dynamics
    Kazachuk, Maria
    Kovalchuk, Alexander
    Mashechkin, Igor
    Orpanen, Igor
    Petrovskiy, Mikhail
    Popov, Ivan
    Zakliakov, Roman
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016, 2016, 9937 : 416 - 425
  • [35] A Continuous Fusion Authentication for Android based on Keystroke Dynamics and Touch Gesture
    Putri, Alifa Nurani
    Asnar, Yudistira Dwi Wardhana
    Akbar, Saiful
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,
  • [36] ©Multilayered authentication for ATM transaction using keystroke dynamics and touch dynamics
    Vaishnav, Pragya
    Raja, Linesh
    Singh, Poonam
    Vairavasamy, Ramakrishnan
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04) : 1357 - 1365
  • [37] Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics`
    Kumar, T. Senthil
    Suresh, Abhijit
    Karumathil, Aadarsh
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 885 - 893
  • [38] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    [J]. JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [39] CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication
    Yang, Haitian
    Meng, Xiang
    Zhao, Xuan
    Wang, Yan
    Liu, Yuejun
    Kang, Xiaoyu
    Shen, Jiahui
    Huang, Weiqing
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [40] Keystroke-based Continuous Authentication while Listening to Music on Your Smart-phone
    Primo, Abena
    [J]. 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 217 - 225