User-friendly free-text keystroke dynamics authentication for practical applications
Alsultan, A. and Warwick, K. (2013) User-friendly free-text keystroke dynamics authentication for practical applications. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, 17 October 2013, Manchester, pp. 4658-4663.
Full text not archived in this repository.
Official URL: https://dx.doi.org/10.1109/SMC.2013.793
This paper introduces a novel approach for free-text keystroke dynamics authentication which incorporates the use of the keyboard’s key-layout. The method extracts timing features from specific key-pairs. The Euclidean distance is then utilized to find the level of similarity between a user’s profile data and his/her test data. The results obtained from this method are reasonable for free-text authentication while maintaining the maximum level of user relaxation. Moreover, it has been proven in this study that flight time yields better authentication results when compared with dwell time. In particular, the results were obtained with only one training sample for the purpose of practicality and ease of real life application.
 F. Monrose and A. Rubin, “Authentication via keystroke dynamics,” in the 4th ACM conference on Computer and communications security, New York, USA, 1997, pp. 48 - 56.  S. P. Banerjee and D. L. Woodard, “Biometric authentication and identification using keystroke dynamics: a survey,” Journal of Pattern Recognition Research, vol. 7, no. 1, pp. 116-139, 2012.  M. Karnan, M. Akila and N. Krishnaraj, “Biometric personal authentication using keystroke dynamics: a review,” Applied Soft Computing, vol. 11, no. 2, pp. 1565-1573, 2011.  E. Lau, X. Liu, C. Xiao and X. Yu, “Enhanced user authentication through keystroke biometrics,” in Computer and Network Security, Massachusetts Institute of Technology, 2004.  R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Communications of the ACM, vol. 33, no. 2, pp. 168-176 ,1990.  D. Gunetti and C. Picardi, “Keystroke analysis of free text,” ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312-347, 2005.  S. Sing and K.V. Arya, “Key classification: a new approach in free text keystroke authentication system,” in Third Pacific-Asia Conference on Circuits, Communications and System, China, 2011, pp. 1-5.  J. Hu, D. Gingrich and A. Sentosa, “A k-nearest neighbor approach for user authentication through biometric keystroke dynamics,” in IEEE International Conference on Communications, Beijing, 2008, pp. 1556–1560.  D. Raghu, C. H. R. Jacob and Y. V. K. D. Bhavani, “Neural network based authentication and verification for web based keystroke dynamics,” International Journal of Computer Science and Information Technologies, vol. 2, pp. 2765-2772, 2011.  R. Giot, A. Ninassi, M. El-Abed and C. Rosenberger, “Analysis of the acquisition krocess for keystroke dynamics,” in International Conference of the Biometrics Special Interest Group, Germany, 2012, pp. 1-6.  P. S. Teh, A. B. J. Teoh, T. S. Ong and H. F. Neo, “Statistical fusion approach on keystroke dynamics,” in Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, Shanghai, 2007, pp. 918 – 923.  K. Hempstalk, E. Frank and I. H. Witten, “One-class classification by combining density and class probability estimation,” in European Conference on Machine Learning and Knowledge Discovery in Databases, Berlin, 2008, pp. 505-519.  K. Xi, Y. Tang and J. Hu, “Correlation keystroke verification scheme for user access control,” Computer Journal, vol. 54, no. 10, pp. 1632- 1644, 2011.  M. Curtin , C. Tappert, M. Villani, G. Ngo, J. Simone, H. St. Fort, and S.-H. Cha, “Keystroke Biometric Recognition on Long-text Input: a Feasibility Study”, in IMECS, 2006.  S. Park, J. Park and S. Cho, “User Authentication Based on Keystroke Analysis of Long Free Texts with a Reduced Number of Features”, in the Second International Conference on Communication Systems, Networks and Applications, 2010.  A. Alsultan and K. Warwick,”Keystroke Dynamics Authentication: A Survey of Free-text Methods’, International Journal of Computer Science Issues, Vol. 10, no. 4, 2013.