Keystroke dynamics authentication for mobile phones

In this paper we discuss the feasibility of employing keystroke dynamics to perform user verification on mobile phones. Specifically, after having introduced a new statistical classifier, we analyze the discriminative capabilities of the features extracted from the acquired patterns, in order to determine which ones guarantee the best authentication performances. The effectiveness of using template selection techniques for keystroke verification is also investigated. The obtained experimental results indicate that the proposed method can be effectively employed to authenticate mobile phones users, even in operational contexts where the number of enrollment acquisition is kept low.

[1]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[2]  Jani Mäntyjärvi,et al.  Keystroke recognition for virtual keyboard , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[3]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Roy A. Maxion,et al.  Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[5]  G. Padmavathi,et al.  A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.

[6]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[7]  Stewart Kowalski,et al.  Consumers ’ Awareness of , Attitudes Towards and Adoption of Mobile Phone Security , 2006 .

[8]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[9]  A. Shiozaki,et al.  Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.

[10]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[11]  Hui Chen,et al.  Score Based Biometric Template Selection and Update , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[12]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[13]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[14]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[15]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[16]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[17]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[18]  Steven Furnell,et al.  Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..

[19]  P. Suganthi,et al.  Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[20]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[21]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[22]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[23]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[24]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[25]  Loris Nanni,et al.  A clustering method for automatic biometric template selection , 2006, Pattern Recognit..

[26]  Sabah Jassim,et al.  SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly , 2006, SPIE Defense + Commercial Sensing.

[27]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[28]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[29]  Berrin A. Yanikoglu,et al.  Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..