User authentication through typing biometrics features

被引:136
作者
Araújo, LCF [1 ]
Sucupira, LHR [1 ]
Lizárraga, MG [1 ]
Ling, LL [1 ]
Yabu-Uti, JBT [1 ]
机构
[1] Univ Estadual Campinas, Sch Elect & Comp Engn, Campinas, SP, Brazil
基金
巴西圣保罗研究基金会;
关键词
biometrics; keystroke dynamics; pattern recognition; typing biometrics;
D O I
10.1109/TSP.2004.839903
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper uses a static keystroke dynamics in user authentication. The inputs are the key down and up times and the key ASCII codes captured while the user is typing a string. Four features (key code, two keystroke latencies, and key duration) were analyzed and seven experiments were performed combining these features. The results of the experiments were evaluated with three types of user: the legitimate, the impostor and the observer impostor users. The best results were achieved utilizing all features, obtaining a false rejection rate of 1.45% and a false acceptance rate of 1.89%. This approach can be used to improve the usual login-password authentication when the password is no more a secret. This paper innovates using four features to authenticate users.
引用
收藏
页码:851 / 855
页数:5
相关论文
共 16 条
  • [1] [Anonymous], 1999, Biometrics: personal identification in networked society
  • [2] [Anonymous], USING RDTSC INSTRUCT
  • [3] ARAUJO LCF, 2003, P 1 INF INT C ART IN, P1038
  • [4] COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS
    BLEHA, S
    SLIVINSKY, C
    HUSSIEN, B
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) : 1217 - 1222
  • [5] DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS
    BLEHA, SA
    OBAIDAT, MS
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1991, 21 (02): : 452 - 456
  • [6] Coltell O., 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), P203, DOI 10.1109/CCST.1999.797915
  • [7] Enhanced password authentication through fuzzy logic
    deRu, WG
    Eloff, JHP
    [J]. IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1997, 12 (06): : 38 - 45
  • [8] Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039
  • [9] IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES
    JOYCE, R
    GUPTA, G
    [J]. COMMUNICATIONS OF THE ACM, 1990, 33 (02) : 168 - 176
  • [10] Lin DT, 1997, 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, P174, DOI 10.1109/ICNN.1997.611659