Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC

This paper evaluates authentication based on sounds emitted while typing on a laptop’s keyboard only with the help of the integrated microphones and a smartphone placed nearby. The sound samples of 26 individuals were recorded in a novel real-world scenario using only web technologies. The data of laptop and the smartphone was compared based on existing approaches. They can reach Equal-Error-Rates (EERs) of 11.2% on the laptop data and 9.3% on the smartphone data.

[1]  S. J. Shepherd Continuous authentication by analysis of keyboard typing characteristics , 1995 .

[2]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[3]  Steven Furnell,et al.  Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.

[4]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[5]  Jozef Juhar,et al.  Acoustical User Identification Based on MFCC Analysis of Keystrokes , 2015 .

[6]  Bruno Crispo,et al.  Mobile biometrics: Towards a comprehensive evaluation methodology , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).

[7]  Eva Kiktova,et al.  Acoustical keystroke analysis for user identification and authentication , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).

[8]  Patrick Bours,et al.  Improving static audio keystroke analysis by score fusion of acoustic and timing data , 2017, Multimedia Tools and Applications.

[9]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[10]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[11]  Brianna S Fjeldsoe,et al.  Reducing sitting time in office workers: short-term efficacy of a multicomponent intervention. , 2013, Preventive medicine.

[12]  Steven Furnell,et al.  A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies , 2004, SEC.

[13]  Anil K. Jain,et al.  Continuous user authentication using temporal information , 2010, Defense + Commercial Sensing.

[14]  Mauro Conti,et al.  Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP , 2016, AsiaCCS.

[15]  George D. C. Cavalcanti,et al.  Hybrid Solution for the Feature Selection in Personal Identification Problems through Keystroke Dynamics , 2007, 2007 International Joint Conference on Neural Networks.

[16]  Paul Johns,et al.  Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker , 2009, Pervasive.

[17]  Arun Ross,et al.  Biometric authentication via keystroke sound , 2013, 2013 International Conference on Biometrics (ICB).

[18]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[19]  Elena N. Zaitseva,et al.  A Review of Continuous Authentication Using Behavioral Biometrics , 2016, SEEDA-CECNSM '16.

[20]  A. Kelly Cracking Passwords using Keyboard Acoustics and Language Modeling , 2010 .

[21]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[22]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[23]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[24]  Arun Ross,et al.  Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Bruno Crispo,et al.  ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones , 2015, PASSWORDS.

[26]  Christoph Meinel,et al.  Beware of SMOMBIES: Verification of Users Based on Activities While Walking , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[27]  Kenneth Revett,et al.  A machine learning approach to keystroke dynamics based user authentication , 2007, Int. J. Electron. Secur. Digit. Forensics.

[28]  Sungzoon Cho,et al.  Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..

[29]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[30]  Michal Choras,et al.  Recognizing Individual Typing Patterns , 2007, IbPRIA.