Soft Biometrics for Keystroke Dynamics

Keystroke dynamics is a viable and practical way as an addition to security for identity verification. It can be combined with passphrases authentication resulting in a more secure verification system. This paper presents a new soft biometric approach for keystroke dynamics. Soft biometrics traits are physical, behavioral or adhered human characteristics, which have been derived from the way human beings normally distinguish their peers (e.g. height, gender, hair color etc.). Those attributes have a low discriminating power, thus not capable of identification performance. Additionally, they are fully available to everyone which makes them privacy-safe. Thus, in this study, it consists of extracting information from the keystroke dynamics templates with the ability to recognise the hand(s) used (i.e. one/two hand(s)); the gender; the age category; and the handedness of a user when he/she types a given password or passphrase on a keyboard. Experiments were conducted on a keystroke dynamics database of 110 users and our experimental results show that the proposed methods are promising.

[1]  Sung-Hyuk Cha,et al.  An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[2]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Sungzoon Cho,et al.  GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[4]  Christophe Rosenberger,et al.  Keystroke Dynamics Overview , 2011 .

[5]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[6]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[7]  Maolin Tang A Hybrid , 2010 .

[8]  Sebastiano Impedovo,et al.  Verification of Handwritten Signatures: an Overview , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).

[9]  Toshinori Suzuki,et al.  The authentication system , 1995 .

[10]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[11]  William Stafford Noble,et al.  Support vector machine , 2013 .

[12]  Thomas B. Moeslund,et al.  Face Quality Assessment System in Video Sequences , 2008, BIOID.

[13]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[14]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[15]  Saurabh Singh,et al.  Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).

[16]  Anil K. Jain,et al.  Multibiometric systems: fusion strategies and template security , 2008 .

[17]  Andrew Beng Jin Teoh,et al.  Keystroke dynamics in password authentication enhancement , 2010, Expert Syst. Appl..

[18]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[19]  Jean-Luc Dugelay,et al.  Bag of soft biometrics for person identification , 2010, Multimedia Tools and Applications.

[20]  Michael N Jones,et al.  Case-sensitive letter and bigram frequency counts from large-scale English corpora , 2004, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[21]  E. Kabir,et al.  A new distance measure for free text keystroke authentication , 2009, 2009 14th International CSI Computer Conference.

[22]  M. S. Obaidat,et al.  Keystroke Dynamics Based Authentication , 1996 .

[23]  Tieniu Tan,et al.  A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.

[24]  Andrew Beng Jin Teoh,et al.  A multiple layer fusion approach on keystroke dynamics , 2009, Pattern Analysis and Applications.

[25]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[26]  P. Sanders,et al.  On the Manhattan-Distance Between Points on Space-Filling Mesh-Indexings , 1996 .

[27]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[28]  G.C. Boechat,et al.  Authentication personal , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[29]  Raymond J Staron,et al.  Personal Attributes Authentication Techniques. , 1977 .

[30]  P. I. Fierens,et al.  User clustering based on keystroke dynamics , 2010 .

[31]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[32]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[33]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[34]  Thomas B. Moeslund,et al.  On soft biometrics , 2015, Pattern Recognit. Lett..

[35]  Sungzoon Cho,et al.  GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication , 2006, ICB.

[36]  Asok Ray,et al.  On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..

[37]  Karl Rihaczek,et al.  1. WHAT IS DATA MINING? , 2019, Data Mining for the Social Sciences.

[38]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[39]  Terence Sim,et al.  Keystroke Dynamics in a General Setting , 2007, ICB.

[40]  Anil K. Jain,et al.  Fingerprint Quality Indices for Predicting Authentication Performance , 2005, AVBPA.

[41]  Wahyudi,et al.  Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.

[42]  Jarmo Ilonen Keystroke Dynamics , 2009, Encyclopedia of Biometrics.

[43]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[44]  Christophe Rosenberger,et al.  Analysis of the acquisition process for keystroke dynamics , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[45]  Z Shang,et al.  An Approach On , 2003 .

[46]  Yujie Dong,et al.  Eyebrow shape-based features for biometric recognition and gender classification: A feasibility study , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[47]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[48]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[49]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[50]  Jeffrey D. Allen,et al.  An analysis of pressure-based keystroke dynamics algorithms , 2010 .

[51]  Bojan Cukic,et al.  Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.

[52]  斯特凡娜·布隆德奥 Biometric personal authentication , 2013 .

[53]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[54]  Mohammad S. Obaidat,et al.  A verification methodology for computer systems users , 1995, SAC '95.

[55]  Christophe Rosenberger,et al.  A Preliminary Study of a New Soft Biometric Finger Recognition for Keystroke Dynamics , 2012 .

[56]  Christophe Rosenberger,et al.  A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..

[57]  Sungzoon Cho,et al.  Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.

[58]  George D. C. Cavalcanti,et al.  Hybrid Solution for the Feature Selection in Personal Identification Problems through Keystroke Dynamics , 2007, 2007 International Joint Conference on Neural Networks.

[59]  Christophe Rosenberger,et al.  Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[60]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[61]  Christophe Rosenberger,et al.  Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[62]  D. Polemi “BIOMETRIC TECHNIQUES: REVIEW AND EVALUATION OF BIOMETRIC TECHNIQUES FOR IDENTIFICATION AND AUTHENTICATION, INCLUDING AN APPRAISAL OF THE AREAS WHERE THEY ARE MOST APPLICABLE” , 2009 .

[63]  Ron Kohavi,et al.  Irrelevant Features and the Subset Selection Problem , 1994, ICML.

[64]  Sungzoon Cho,et al.  Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication , 2009, Expert Syst. Appl..