User-Friendly Free-text Keystroke Dynamics Authentication for Practical Applications

被引:12
作者
Alsultan, Arwa [1 ]
Warwick, Kevin [1 ]
机构
[1] Univ Reading, Sch Syst Engn, Reading, Berks, England
来源
2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013) | 2013年
关键词
Keystroke Dynamics; Free-text; Authentication; Keyboard Key-layout; key-pair; Euclidian Distance;
D O I
10.1109/SMC.2013.793
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a novel approach for free-text keystroke dynamics authentication which incorporates the use of the keyboard's key-layout. The method extracts timing features from specific key-pairs. The Euclidean distance is then utilized to find the level of similarity between a user's profile data and his/her test data. The results obtained from this method are reasonable for free-text authentication while maintaining the maximum level of user relaxation. Moreover, it has been proven in this study that flight time yields better authentication results when compared with dwell time. In particular, the results were obtained with only one training sample for the purpose of practicality and ease of real life application.
引用
收藏
页码:4658 / 4663
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2011, CLIMATE CHANGE HINDU, DOI DOI 10.1109/PACCS.2011.5990168
[2]  
[Anonymous], 2011, IJCSIT INT J COMPUTE
[3]  
[Anonymous], INT J COMPUTER SCI I
[4]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[5]  
Curtin M., 2006, IMECS
[6]  
Giot R., 2012, 2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2012), P1, DOI 10.1109/BTAS.2012.6374539
[7]  
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[8]  
Hempstalk K, 2008, LECT NOTES ARTIF INT, V5211, P505, DOI 10.1007/978-3-540-87479-9_51
[9]   A k-nearest neighbor approach for user authentication through biometric keystroke dynamics [J].
Hu, J. ;
Gingrich, D. ;
Sentosa, A. .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1556-+
[10]   IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J].
JOYCE, R ;
GUPTA, G .
COMMUNICATIONS OF THE ACM, 1990, 33 (02) :168-176