Biometric Recognition Based on Free-Text Keystroke Dynamics

Accurate recognition of free text keystroke dynamics is challenging due to the unstructured and sparse nature of the data and its underlying variability. As a result, most of the approaches published in the literature on free text recognition, except for one recent one, have reported extremely high error rates. In this paper, we present a new approach for the free text analysis of keystrokes that combines monograph and digraph analysis, and uses a neural network to predict missing digraphs based on the relation between the monitored keystrokes. Our proposed approach achieves an accuracy level comparable to the best results obtained through related techniques in the literature, while achieving a far lower processing time. Experimental evaluation involving 53 users in a heterogeneous environment yields a false acceptance ratio (FAR) of 0.0152% and a false rejection ratio (FRR) of 4.82%, at an equal error rate (EER) of 2.46%. Our follow-up experiment, in a homogeneous environment with 17 users, yields FAR=0% and FRR=5.01%, at EER=2.13%.

[1]  Samy Bengio,et al.  A statistical significance test for person authentication , 2004, Odyssey.

[2]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[3]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[4]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[5]  Maria Papadaki,et al.  Keystroke Analysis as a Method of Advanced User Authentication and Response , 2002, SEC.

[6]  Baptiste Hemery,et al.  Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..

[7]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[8]  Marcus Brown,et al.  User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..

[9]  D. Polemi “BIOMETRIC TECHNIQUES: REVIEW AND EVALUATION OF BIOMETRIC TECHNIQUES FOR IDENTIFICATION AND AUTHENTICATION, INCLUDING AN APPRAISAL OF THE AREAS WHERE THEY ARE MOST APPLICABLE” , 2009 .

[10]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[11]  Daniel P. Lopresti,et al.  Forgery Quality and Its Implications for Behavioral Biometric Security , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).