Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics

Doddington zoo defines four categories of users when using a biometric system related to their difficulty to be recognized or attacked. In this paper, we propose an original work consisting in predicting for any biometric modality the associated animal in the Doddington menagerie related to a user given few captured biometric samples. Such a prediction could be useful for many applications, as for example, to adapt the behavior of biometric systems to each user. In this work, we apply this methodology to keystroke dynamics as it is an interesting behavioral biometric modality for user authentication. It consists in analyzing the way of typing of a user in order to recognize him/her. We use a significant keystroke dynamics dataset and we demonstrate through experimental results the benefit of the proposed approach.

[1]  Denis Migdal Contributions to keystroke dynamics for privacy and security on the Internet. (Contributions à la ligne de frappe au clavier pour la vie privée et la sécurité sur Internet) , 2019 .

[2]  P. Jonathon Phillips,et al.  An Introduction to Evaluating Biometric Systems , 2000, Computer.

[3]  Christophe Rosenberger,et al.  Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[4]  Neil Yager,et al.  The Biometric Menagerie , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Stephanie Schuckers,et al.  The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[6]  Norman Poh User-specific Score Normalization and Fusion for Biometric Person Recognition , 2009 .

[7]  Massimo Tistarelli,et al.  Exploiting the “doddington zoo” effect in biometric fusion , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[8]  Eduardo José da S. Luz,et al.  Chimerical Dataset Creation Protocol Based on Doddington Zoo: A Biometric Application with Face, Eye, and ECG , 2019, Sensors.

[9]  Francis Butler,et al.  Assessment of retinal recognition technology as a biometric method for sheep identification , 2008 .

[10]  Christophe Rosenberger,et al.  Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.

[11]  Julian Fiérrez,et al.  Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics , 2014, ECCV Workshops.

[12]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[13]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[14]  Judith Liu-Jimenez,et al.  How to assess user interaction effects in Biometric performance , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[15]  Andreas Uhl,et al.  Biometric Menagerie in Time-Span Separated Fingerprint Data , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[16]  Bruce A. Draper,et al.  Biometric zoos: Theory and experimental evidence , 2011, 2011 International Joint Conference on Biometrics (IJCB).