Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Writer Identification: Statistical Analysis and Dichotomizer
Proceedings of the Joint IAPR International Workshops on Advances in Pattern Recognition
Biometrics
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Guide to Biometrics
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Keystroke biometric identification studies on long-text input
Keystroke biometric identification studies on long-text input
GREYC keystroke: a benchmark for keystroke dynamics biometric systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Biometric access control through numerical keyboards based on keystroke dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Hi-index | 0.00 |
A novel keystroke biometric system for long-text input was developed and evaluated for user identification and authentication applications. The system consists of a Java applet to collect raw keystroke data over the Internet, a feature extractor, and pattern classifiers to make identification or authentication decisions. Experiments on more than 100 participants investigated two input modes脙¢â聜卢"copy and free-text脙¢â聜卢"and two keyboard types脙¢â聜卢"desktop and laptop. The system can accurately identify or authenticate individuals if the same type of keyboard is used to produce the enrollment and questioned input samples. Longitudinal experiments quantified performance degradation over intervals of several weeks and two years. Additional experiments investigated the system脙¢â聜卢TMs hierarchical model, parameter settings, assumptions, and sufficiency of enrollment samples and input-text length. Although evaluated on input texts up to 650 keystrokes, the authors found that input of 300 keystrokes, roughly four lines of text, is sufficient for the important applications described.