A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics

被引:5
作者
Gedikli, Ahmet Melih [1 ]
Efe, Mehmet Onder [1 ]
机构
[1] Hacettepe Univ, Dept Comp Engn, Ankara, Turkey
来源
PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE | 2020年 / 1144卷
关键词
Feed forward multilayer neural networks; Keystroke dynamics; User recognition and authentication; Biometrics; Resilient backpropagation;
D O I
10.1007/978-3-030-37548-5_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Keystroke dynamics is a widely accepted user recognition and verification behavioral biometric, which has been studied nearly for a century. Intrinsically, this biometric is used together with id/password authentication forming multi-factor authentication. There are several anomaly detection algorithms that have been proposed for this task. While some proposals handle this problem with measuring data distance by taking correlation and dependence into account, some models use complex and time-consuming models deep neural networks to train to reach the right approximation. Our paper addresses a simple, accurate and lightweight method for user authentication. We show the effectiveness of our approach through comparisons with existing methods, which have also used the CMU keystroke dynamics benchmark dataset used here too. Using feed forward multilayer neural network with resilient backpropagation, we obtained an Equal Error Rate (ERR) equal to 0.049 for authentication with overall identification accuracy of 94.7%.
引用
收藏
页码:9 / 23
页数:15
相关论文
共 37 条
  • [1] Akil M., 2016, 2016 13 INT MULT SYS
  • [2] Al-Jarrah M.M., 2012, Journal of Emerging Trends in Computing and Information Sciences, V3, P988
  • [3] The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
    Albakri, Ghazel
    Alghowinem, Sharifa
    [J]. SENSORS, 2019, 19 (08)
  • [4] Alsultan Arwa, 2013, International Journal of Computer Science Issues (IJCSI), V10, P1
  • [5] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    [J]. JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [6] Bhatt S, 2013, 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME)
  • [7] Blanco-Gonzalo R., 2018, WIREL COMMUN MOB COM, V2018, P1
  • [8] COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS
    BLEHA, S
    SLIVINSKY, C
    HUSSIEN, B
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) : 1217 - 1222
  • [9] Keystroke Dynamics: Characteristics and Opportunities
    Crawford, Heather
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 205 - 212
  • [10] Dealey W, 1936, TYPEWRITING BEHAV