A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations

In this review paper we present a comprehensive survey of research efforts in the past couple of decades on keystroke dynamics biometrics. We review the literature in light of various feature extraction, feature matching and classification methods for keystroke dynamics. We also discuss recent trends in keystroke dynamics research, including its use in mobile environments, as a soft biometrics, and its fusion with other biometric modalities. We further address the evaluation of keystroke biometric systems, including traditional and new performance metrics, and list publicly available keystroke datasets for performance benchmarks to promote synergy in the research community.

[1]  Linus Nilsson,et al.  Continuous Authentication Using Behavioral Biometrics , 2013, IT Professional.

[2]  Raymond J Staron,et al.  Personal Attributes Authentication Techniques. , 1977 .

[3]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[4]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[5]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[6]  Baptiste Hemery,et al.  Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition , 2010, 2010 20th International Conference on Pattern Recognition.

[7]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..

[8]  Anil K. Jain,et al.  Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[9]  Stephanie Schuckers,et al.  Shared research dataset to support development of keystroke authentication , 2014, IEEE International Joint Conference on Biometrics.

[10]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[11]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[13]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[14]  Marilyn Tremaine,et al.  Typing Biometrics: Impact of Human Learning on Performance Quality , 2011, JDIQ.

[15]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[16]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[17]  Debin Gao,et al.  Keystroke biometrics: the user perspective , 2014, CODASPY '14.

[18]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[19]  Kentaro Kotani,et al.  Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..

[20]  H. Saevanee,et al.  User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.

[21]  John V. Monaco,et al.  Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .

[22]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[23]  Christophe Rosenberger,et al.  Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.

[24]  Hafizah Husain,et al.  Implementation of Emotional-Aware Computer Systems Using Typical Input Devices , 2014, ACIIDS.

[25]  Yu Zhong,et al.  Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets , 2013 .

[26]  James S. Okolica,et al.  User identification and authentication using multi-modal behavioral biometrics , 2014 .

[27]  Christophe Rosenberger,et al.  Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[28]  Sajjad Haider,et al.  A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[29]  Sungzoon Cho,et al.  GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[30]  Md. Kamrul Hasan,et al.  Identifying emotion by keystroke dynamics and text pattern analysis , 2014, Behav. Inf. Technol..

[31]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[32]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[33]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[34]  Sung-Hyuk Cha,et al.  Developing a Keystroke Biometric System for Continual Authentication of Computer Users , 2012, 2012 European Intelligence and Security Informatics Conference.

[35]  Konrad Rieck,et al.  Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.

[36]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[37]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[38]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[39]  Asok Ray,et al.  On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..

[40]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[41]  M. Sasikumar,et al.  Recognising Emotions from Keyboard Stroke Pattern , 2010 .

[42]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[43]  Arun Ross,et al.  Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.

[44]  Cheng-Jung Tsai,et al.  A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..

[45]  Terence Sim,et al.  Are Digraphs Good for Free-Text Keystroke Dynamics? , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[46]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[47]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[48]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[49]  Baochang Zhang,et al.  Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[50]  P. Zimmermann,et al.  Affective Computing—A Rationale for Measuring Mood With Mouse and Keyboard , 2003, International journal of occupational safety and ergonomics : JOSE.

[51]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[52]  Marjory Da Costa-Abreu,et al.  Using keystroke dynamics for gender identification in social network environment , 2011, ICDP.

[53]  S. J. Shepherd Continuous authentication by analysis of keyboard typing characteristics , 1995 .

[54]  Christophe Rosenberger,et al.  A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..

[55]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[56]  Chee Peng Lim,et al.  Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[57]  Steven Furnell,et al.  From desktop to mobile: Examining the security experience , 2009, Comput. Secur..

[58]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[59]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[60]  Kevin Warwick,et al.  Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .

[61]  Sidney K. D'Mello,et al.  Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits , 2013, IUI '13.

[62]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[63]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[64]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[65]  Matthias Trojahn BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES , 2012 .

[66]  Sung-Hyuk Cha,et al.  Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[67]  Jeffrey D. Allen,et al.  An analysis of pressure-based keystroke dynamics algorithms , 2010 .

[68]  Matthias Trojahn,et al.  KeyGait: Framework for Continuously Biometric Authentication during Usage of a Smartphone , 2013 .

[69]  Mauro Conti,et al.  I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.

[70]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[71]  Alexis Kirke,et al.  Towards using expressive performance algorithms for typist emotion detection , 2011, ICMC.

[72]  Marcus Brown,et al.  User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..

[73]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[74]  Marcelo Cipriano,et al.  Collection and Publication of a Fixed Text Keystroke Dynamics Dataset , 2010 .

[75]  Shiuh-Pyng Shieh,et al.  Keystroke statistical learning model for web authentication , 2007, ASIACCS '07.

[76]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[77]  Alessandro Neri,et al.  Keystroke dynamics authentication for mobile phones , 2011, SAC.

[78]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[79]  Colin Boyd,et al.  Continuous Biometric Authentication: Can It Be More Practical? , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[80]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[81]  M. van Zaanen,et al.  Vibration Sensitive Keystroke Analysis , 2009 .

[82]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[83]  Steven Furnell,et al.  Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..

[84]  Osman Hegazy,et al.  A Keystroke Dynamics Based Approach for Continuous Authentication , 2014, BDAS.

[85]  Sungzoon Cho,et al.  Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..

[86]  Maria Virvou,et al.  Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern Information , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[87]  Roy A. Maxion,et al.  Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[88]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[89]  G. Padmavathi,et al.  A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.

[90]  Agata Kolakowska,et al.  A review of emotion recognition methods based on keystroke dynamics and mouse movements , 2013, 2013 6th International Conference on Human System Interactions (HSI).

[91]  Jan R. Magnus,et al.  The reliability of user authentication through keystroke dynamics , 2009 .

[92]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[93]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[94]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[95]  Bojan Cukic,et al.  Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.

[96]  Wahyudi,et al.  Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines , 2007, ICCSA.

[97]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[98]  Sungzoon Cho,et al.  Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.

[99]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[100]  Wendy Chen,et al.  Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..

[101]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2004, IEEE Transactions on Signal Processing.

[102]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[103]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[104]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[105]  Sung-Hyuk Cha,et al.  Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[106]  Andrew Sears,et al.  Automated stress detection using keystroke and linguistic features: An exploratory study , 2009, Int. J. Hum. Comput. Stud..

[107]  T. Santhanam,et al.  Keystroke dynamics for biometric authentication — A survey , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[108]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[109]  Bojan Cukic,et al.  Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.