User-Friendly Free-Text Keystroke Dynamics Authentication for Practical Applications

This paper introduces a novel approach for free-text keystroke dynamics authentication which incorporates the use of the keyboard's key-layout. The method extracts timing features from specific key-pairs. The Euclidean distance is then utilized to find the level of similarity between a user's profile data and his/her test data. The results obtained from this method are reasonable for free-text authentication while maintaining the maximum level of user relaxation. Moreover, it has been proven in this study that flight time yields better authentication results when compared with dwell time. In particular, the results were obtained with only one training sample for the purpose of practicality and ease of real life application.

[1]  Jiankun Hu,et al.  A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics , 2008, 2008 IEEE International Conference on Communications.

[2]  Xia Liu,et al.  Enhanced User Authentication Through Keystroke Biometrics , 2004 .

[3]  Andrew Beng Jin Teoh,et al.  Statistical Fusion Approach on Keystroke Dynamics , 2007, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.

[4]  Saurabh Singh,et al.  Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).

[5]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[6]  Sungzoon Cho,et al.  User authentication based on keystroke analysis of long free texts with a reduced number of features , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.

[7]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study , 2006 .

[8]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[9]  Kevin Warwick,et al.  Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .

[10]  Ian H. Witten,et al.  One-Class Classification by Combining Density and Class Probability Estimation , 2008, ECML/PKDD.

[11]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[12]  Christophe Rosenberger,et al.  Analysis of the acquisition process for keystroke dynamics , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[13]  Jiankun Hu,et al.  Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment , 2011, Comput. J..

[14]  Prof. D. Raghu,et al.  Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics , 2011 .

[15]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[16]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.