Keystroke Authentication with a Capacitive Display using Different Mobile Devices

被引:0
作者
Trojahn, Matthias [1 ]
Schadewald, Christian [1 ]
Ortmeier, Frank [2 ]
机构
[1] Volkswagen AG, Wolfsburg, Germany
[2] Otto von Guericke Univ, Comp Syst Engn, Magdeburg, Germany
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) | 2013年
关键词
Keystroke Dynamics; Capacitive Display; Device Dependencies; DYNAMICS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This study investigates keystroke dynamics as biometric authentication on different smartphones. We analysed different sensors in the smartphones which affect the error rates of the authentication. We also evaluate the effectiveness of different features based on the error rates. In addition, a framework is presented for using one device as a base model to authenticate the same person on other devices. We conduct with an experiment with three devices and three different keywords to assess how well different devices can be used (error rates smaller than 3.5 %) and suitable combinations of devices. Moreover, our experiment results showed that passwords spread over the whole keyboard have lower error rates.
引用
收藏
页码:580 / 585
页数:6
相关论文
共 13 条
  • [1] [Anonymous], P 6 AUSTR INF SEC MA
  • [2] [Anonymous], 2012, P 10 INT C MOB SYST, DOI [10.1145/2307636.2307666, DOI 10.1145/2307636.2307666]
  • [3] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    [J]. JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [4] User authentication using keystroke dynamics for cellular phones
    Campisi, P.
    Maiorana, E.
    Lo Bosco, M.
    Neri, A.
    [J]. IET SIGNAL PROCESSING, 2009, 3 (04) : 333 - 341
  • [5] Choras M, 2007, LECT NOTES COMPUT SC, V4432, P424
  • [6] Authenticating mobile phone users using keystroke analysis
    Clarke, N. L.
    Furnell, S. M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) : 1 - 14
  • [7] De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
  • [8] Comparing passwords, tokens, and biometrics for user atithentication
    O'Gorman, L
    [J]. PROCEEDINGS OF THE IEEE, 2003, 91 (12) : 2021 - 2040
  • [9] Verification of computer users using keystroke dynamics
    Obaidat, MS
    Sadoun, B
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1997, 27 (02): : 261 - 269
  • [10] Trojahn M., 2013, 7 INT S SEC MULT PER