User authentication through typing biometrics features

被引:135
|
作者
Araújo, LCF [1 ]
Sucupira, LHR [1 ]
Lizárraga, MG [1 ]
Ling, LL [1 ]
Yabu-Uti, JBT [1 ]
机构
[1] Univ Estadual Campinas, Sch Elect & Comp Engn, Campinas, SP, Brazil
基金
巴西圣保罗研究基金会;
关键词
biometrics; keystroke dynamics; pattern recognition; typing biometrics;
D O I
10.1109/TSP.2004.839903
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper uses a static keystroke dynamics in user authentication. The inputs are the key down and up times and the key ASCII codes captured while the user is typing a string. Four features (key code, two keystroke latencies, and key duration) were analyzed and seven experiments were performed combining these features. The results of the experiments were evaluated with three types of user: the legitimate, the impostor and the observer impostor users. The best results were achieved utilizing all features, obtaining a false rejection rate of 1.45% and a false acceptance rate of 1.89%. This approach can be used to improve the usual login-password authentication when the password is no more a secret. This paper innovates using four features to authenticate users.
引用
收藏
页码:851 / 855
页数:5
相关论文
共 50 条
  • [21] A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (5A): : 3173 - 3188
  • [22] Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching
    Fong, Simon
    Zhuang, Yan
    JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
  • [23] On Continuous User Authentication via Typing Behavior
    Roth, Joseph
    Liu, Xiaoming
    Metaxas, Dimitris
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (10) : 4611 - 4624
  • [24] An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
    Khan, Muhammad Khurram
    Kumari, Saru
    BIOMED RESEARCH INTERNATIONAL, 2013, 2013
  • [25] Accessing Cloud Services through Biometrics Authentication
    Ruiu, Pietro
    Caragnano, Giuseppe
    Masala, Giovanni L.
    Grosso, Enrico
    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS), 2016, : 38 - 43
  • [26] Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems
    Zhao, Guozhu
    Zhang, Pinchang
    Shen, Yulong
    Jiang, Xiaohong
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12783 - 12798
  • [27] Augmented PIN Authentication through Behavioral Biometrics
    Nerini, Matteo
    Favarelli, Elia
    Chiani, Marco
    SENSORS, 2022, 22 (13)
  • [28] A First Approach to Contact-Based Biometrics for User Authentication
    Vogiannou, Athanasios
    Moustakas, Konstantinos
    Tzovaras, Dimitrios
    Strintzis, Michael G.
    ADVANCES IN BIOMETRICS, 2009, 5558 : 838 - +
  • [29] Keystroke Dynamics Biometrics, A tool for User Authentication-Review
    Quraishi, Suhail Javed
    Bedi, S. S.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 248 - 254
  • [30] Exploring EEG-based Biometrics for User Identification and Authentication
    Gui, Qiong
    Jin, Zhanpeng
    Xu, Wenyao
    2014 IEEE SIGNAL PROCESSING IN MEDICINE AND BIOLOGY SYMPOSIUM (SPMB), 2014,