Splitting Wolves Category in Doddington Zoo: Impacts on Keystroke Dynamics

Biometrics has for objective to identify or verify the identity of an individual based on morphological or behavioral characteristics. A biometric system can be attacked by presenting a biometric data to the capture subsystem with the goal of interfering it, that is called a presentation attack. Covid, panther, shadow monster and dragon are the investigated presentation attacks associated to the Doddington Zoo Menagerie (which classify users in different categories considering their performance behavior when using biometric systems). In this work, we examined the robustness of each genuine class of the biometric menagerie against the proposed presentation attacks. The achieved experiments are applied to the keystroke dynamics modality. Owing to the adaptive strategy, we depicted each genuine category that is most vulnerable to a specific presentation attack class. We find that the impact of covid, panther, shadow monster and dragon attempts are more pronounced when compared to chameleons, worms, doves and phantoms classes respectively. The obtained results, point out that adding imposter labels to Doddington zoo may lead to a better assessment of biometric authentication systems and promotes the interpretation of their performances.

[1]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Adaptive Biometric Systems , 2019, ACM Comput. Surv..

[2]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[3]  Sonia Garcia-Salicetti,et al.  On Hunting Animals of the Biometric Menagerie for Online Signature , 2016, PloS one.

[4]  Christophe Rosenberger,et al.  User Dependent Template Update for Keystroke Dynamics Recognition , 2018, 2018 International Conference on Cyberworlds (CW).

[5]  Tempestt J. Neal,et al.  You Are Not Acting Like Yourself: A Study on Soft Biometric Classification, Person Identification, and Mobile Device Use , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[6]  Neil Yager,et al.  Worms, Chameleons, Phantoms and Doves: New Additions to the Biometric Menagerie , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[7]  Patrick J. Flynn,et al.  On the consistency of the biometric menagerie for irises and iris matchers , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[8]  Christophe Rosenberger,et al.  Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets , 2018, 2018 International Conference on Cyberworlds (CW).

[9]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[10]  Chi-Ho Chan,et al.  Algorithm to estimate biometric performance change over time , 2015, IET Biom..

[11]  Andreas Uhl,et al.  Biometric Menagerie in Time-Span Separated Fingerprint Data , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[12]  Christophe Rosenberger,et al.  Double serial adaptation mechanism for keystroke dynamics authentication based on a single password , 2019, Comput. Secur..

[13]  Christophe Rosenberger,et al.  Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types , 2019, 2019 International Conference on Cyberworlds (CW).

[14]  Julian Fiérrez,et al.  Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics , 2014, ECCV Workshops.

[15]  Sumit Badotra,et al.  Survey of Security and Privacy Issues on Biometric System , 2020, Handbook of Computer Networks and Cyber Security.

[16]  Neil Yager,et al.  The Biometric Menagerie , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Christophe Rosenberger,et al.  Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition , 2019, Future Gener. Comput. Syst..

[18]  Christophe Rosenberger,et al.  Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[19]  Arun Ross,et al.  Relating ROC and CMC curves via the biometric menagerie , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[20]  Sungzoon Cho,et al.  Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.

[21]  Christophe Rosenberger,et al.  Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets , 2019, Future Gener. Comput. Syst..