Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics

Securing personal, professional and even official data is a very critical issue nowadays, giving that these informations are safeguarded in different devices (mobile, computer) and various accounts (social networks, e-mails). To protect them from unauthorized access, users generally are asked to use passwords. But using only this authentication solution is no longer efficient against hacker attacks. Keystroke dynamics is a biometric promising modality that guarantees the recognition of the user’s characteristics; his typing manner on the keyboard. Regarding that the typing rhythm of the user changes over time, adaptive biometric strategies help to take into consideration these variations during the authentication system. In this paper we classify users into multiple categories according to Doddington Zoo classification. Afterwards, we apply an adaptive strategy specific to each category of users. The achieved experiments demonstrate that an update strategy specific to the user class significantly improves the obtained performances.

[1]  Essaid Sabir,et al.  AMBAS: An Autonomous Multimodal Biometric Authentication System , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Judith Liu-Jimenez,et al.  Small fingerprint scanners used in mobile devices: the impact on biometric performance , 2016, IET Biom..

[3]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[4]  Marlies Rybnicek,et al.  A roadmap to continuous biometric authentication on mobile devices , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[5]  Fabio Roli,et al.  Critical analysis of adaptive biometric systems , 2012, IET Biom..

[6]  Sonia Garcia-Salicetti,et al.  On Hunting Animals of the Biometric Menagerie for Online Signature , 2016, PloS one.

[7]  Massimo Tistarelli,et al.  Exploiting the “doddington zoo” effect in biometric fusion , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[8]  Brian C. Lovell,et al.  Face Recognition on Consumer Devices: Reflections on Replay Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Md. Kamrul Hasan,et al.  Identifying emotion by keystroke dynamics and text pattern analysis , 2014, Behav. Inf. Technol..

[10]  Gian Luca Marcialis,et al.  Biometric system adaptation by self-update and graph-based techniques , 2013, J. Vis. Lang. Comput..

[11]  Roy A. Maxion,et al.  Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.

[12]  Christophe Rosenberger,et al.  Towards a Secured Authentication Based on an Online Double Serial Adaptive Mechanism of Users' Keystroke Dynamics , 2018 .

[13]  Julian Fiérrez,et al.  Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics , 2014, ECCV Workshops.

[14]  Gian Luca Marcialis,et al.  Analysis of unsupervised template update in biometric recognition systems , 2014, Pattern Recognit. Lett..

[15]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[16]  Gian Luca Marcialis,et al.  Replacement Algorithms for Fingerprint Template Update , 2008, ICIAR.

[17]  Sungzoon Cho,et al.  Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.

[18]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[19]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[20]  Andrey Makrushin,et al.  Automatic Template Update Strategies for Biometrics , 2007 .

[21]  Christophe Rosenberger,et al.  Keystroke template update with adapted thresholds , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[22]  Chi-Ho Chan,et al.  Algorithm to estimate biometric performance change over time , 2015, IET Biom..

[23]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .