A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an Individual can be used to strengthen existing security techniques effectively and cheaply. Due to the ballistic (semi-autonomous) nature of the typing behavior it is difficult to impersonate, making it useful as a biometric. Therefore in this paper, we provide a basic background of the behavioural basis behind the use of keystroke dynamics. We also discuss the data acquisition methods, approaches and the performance of the methods used by researchers on standard computer keyboards. In this survey, we find that the use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues. Keywords: Authentication, Behavioural biometrics, Identification, keystroke dynamics, typing.
[1]
Jo Wyns,et al.
Reference architecture for holonic manufacturing systems, the key to support evolution and reconfiguration
,
1999
.
[2]
Luc Bongaerts,et al.
Reference architecture for holonic manufacturing systems: PROSA
,
1998
.
[3]
Pisal Yenradee,et al.
A master scheduling model with skilled and unskilled temporary workers
,
2006
.
[4]
Luc Bongaerts,et al.
Integration of scheduling and control in holonic manufacturing systems
,
1998
.
[5]
S. Misbah Deen,et al.
Cooperation Issues in Holonic Manufacturing Systems
,
1993,
DIISM.
[6]
Kenji Tokunaga,et al.
Holonic Manufacturing Systems
,
1994,
J. Robotics Mechatronics.
[7]
Jun Ota,et al.
Holonic assembly system with Plug and Produce
,
2001,
Comput. Ind..