Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text

Abstract Related works for applying keystroke dynamics (KD) on free text identification indicated that applying KD can improve the accuracy of personal authentication on free text. As the result, this paper proposes a new biometrics, i.e., the keystroke clusters map (KC-Map), by clustering users’ keystrokes in order to effectively enhance the accuracy of personal authentication in free text. Since KC-Map is conducted via clustering, it is not suitable for traditional classifiers. In order to tackle this problem, the paper further proposes a keystroke clusters map similarity classifier (KCMS classifier). Experimental results positively show that the proposed KC-Map and KCMS classifier can efficiently improve the accuracy of personal authentication on free text with up to 1.27 times. In addition, one of the huge disadvantages on the current approaches in free text identification is that users are generally required to be trained for several months. Longer training time makes free text identification more impractical. Another motivation of this paper is to explore whether it is possible to shorten the training time into an acceptable range. Experimental results show that, to achieve relatively fair identification accuracy, users only need to carry out about 20 min for training.

[1]  Michael R Chernick,et al.  Bootstrap Methods: A Guide for Practitioners and Researchers , 2007 .

[2]  Kevin Warwick,et al.  Free-text keystroke dynamics authentication for Arabic language , 2016, IET Biom..

[3]  Ting-Yi Chang,et al.  Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone , 2015, J. Netw. Comput. Appl..

[4]  Orcan Alpar,et al.  Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..

[5]  Agata Kolakowska,et al.  Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition , 2018 .

[6]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[7]  Anil K. Jain Data clustering: 50 years beyond K-means , 2010, Pattern Recognit. Lett..

[8]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[9]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[10]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[11]  Kevin Warwick,et al.  Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..

[12]  Baptiste Hemery,et al.  Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..

[13]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[14]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[15]  R. Power CSI/FBI computer crime and security survey , 2001 .

[16]  Kevin Warwick,et al.  Improving the performance of free-text keystroke dynamics authentication by fusion , 2017, Appl. Soft Comput..

[17]  Soumik Mondal,et al.  A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.

[18]  J J Hopfield,et al.  Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.

[19]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2005 .

[20]  Pilsung Kang,et al.  Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection , 2018, Appl. Soft Comput..

[21]  Arshia Cont,et al.  A Coupled Duration-Focused Architecture for Real-Time Music-to-Score Alignment , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Cheng-Jung Tsai,et al.  A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..

[24]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[25]  Ting-Yi Chang,et al.  A Personalized Rhythm Click-Based Authentication System , 2010, Inf. Manag. Comput. Secur..

[26]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[27]  Sungzoon Cho,et al.  Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..

[28]  Jan H. P. Eloff,et al.  Enhanced Password Authentication through Fuzzy Logic , 1997, IEEE Expert.

[29]  Ana Carolina Lorena,et al.  Emphasizing typing signature in keystroke dynamics using immune algorithms , 2015, Appl. Soft Comput..

[30]  Ting-Yi Chang,et al.  Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.

[31]  Sung-Hyuk Cha,et al.  On the Individuality of the Iris Biometric , 2005, ICIAR.

[32]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[33]  A. Sideris,et al.  A multilayered neural network controller , 1988, IEEE Control Systems Magazine.

[34]  Li Xiu,et al.  Application of data mining techniques in customer relationship management: A literature review and classification , 2009, Expert Syst. Appl..

[35]  T. Rotovnik,et al.  Door phone embedded system for voice based user identification and verification platform , 2011, IEEE Transactions on Consumer Electronics.