Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
International Journal of Human-Computer Studies
Fuzzy sets, fuzzy logic, and fuzzy systems
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Evolutionary Optimization in Dynamic Environments
Evolutionary Optimization in Dynamic Environments
Biometric Recognition: Our Hands, Eyes, and Faces Give Us Away
IEEE Computer Graphics and Applications
Hacked, Attacked and Abused: Digital Crime Exposed
Hacked, Attacked and Abused: Digital Crime Exposed
An Intrusion-Tolerant Password Authentication System
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Fundamentals of Computational Swarm Intelligence
Fundamentals of Computational Swarm Intelligence
Authenticating mobile phone users using keystroke analysis
International Journal of Information Security
Developing Software for Symbian OS 2nd Edition: A Beginner's Guide to Creating Symbian OS v9 Smartphone Applications in C++
A hybrid GA-PSO fuzzy system for user identification on smart phones
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
Identification system based on color sequence and mobile phones
Journal of Ambient Intelligence and Smart Environments
Proceedings of the 19th annual international conference on Mobile computing & networking
Electronic Commerce Research
Hi-index | 0.00 |
Smart phones are now being used to store users' identities and sensitive information/data. Therefore, it is important to authenticate legitimate users of a smart phone and to block imposters. In this paper, we demonstrate that keystroke dynamics of a smart phone user can be translated into a viable features' set for accurate user identification. To this end, we collect and analyze keystroke data of 25 diverse smart phone users. Based on this analysis, we select six distinguishing keystroke features that can be used for user identification. We show that these keystroke features for different users are diffused and therefore a fuzzy classifier is well-suited to cluster and classify them. We then optimize the front-end fuzzy classifier using Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) as back-end dynamic optimizers to adapt to variations in usage patterns. Finally, we provide a novel keystroke dynamics based PIN (Personal Identification Number) verification mode to ensure information security on smart phones. The results of our experiments show that the proposed user identification system has an average error rate of 2% after the detection mode and the error rate of rejecting legitimate users drops to zero in the PIN verification mode. We also compare error rates (in terms of detecting both legitimate users and imposters) of our proposed classifier with 5 existing state-of-the-art techniques for user identification on desktop computers. Our results show that the proposed technique consistently and considerably outperforms existing schemes.