Improving static audio keystroke analysis by score fusion of acoustic and timing data

In this paper we investigate the capacity of sound & timing information during typing of a password for the user identification and authentication task. The novelty of this paper lies in the comparison of performance between improved timing-based and audio-based keystroke dynamics analysis and the fusion for the keystroke authentication. We collected data of 50 people typing the same given password 100 times, divided into 4 sessions of 25 typings and tested how well the system could recognize the correct typist. Using fusion of timing (9.73%) and audio calibration scores (8.99%) described in the paper we achieved 4.65% EER (Equal Error Rate) for the authentication task. The results show the potential of using Audio Keystroke Dynamics information as a way to authenticate or identify users during log-on.

[1]  Patrick Bours,et al.  Static Audio Keystroke Dynamics , 2015, MCSS.

[2]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[3]  Ming-Hour Yang,et al.  A mobile authentication system resists to shoulder-surfing attacks , 2016, Multimedia Tools and Applications.

[4]  Hiroshi Dozono,et al.  Comparison of the Adaptive Authentication Systems for Behavior Biometrics using the Variations of Self Organizing Maps , 2008 .

[5]  Steve Young,et al.  The HTK book version 3.4 , 2006 .

[6]  Lukás Burget,et al.  Analysis of Speaker Recognition Systems in Realistic Scenarios of the SITW 2016 Challenge , 2016, INTERSPEECH.

[7]  Soumik Mondal,et al.  A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.

[8]  Mireia Díez,et al.  GTTS Systems for the SWS Task at MediaEval 2013 , 2013, MediaEval.

[9]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[10]  Ahmed A. Abd El-Latif,et al.  Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics , 2013, Multimedia Tools and Applications.

[11]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[12]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[13]  Hiroshi Dozono,et al.  Adaptive authentication system for behavior biometrics using supervised pareto self organizing maps , 2008 .

[14]  K. Rajasekhara Rao,et al.  Inclination and Pressure Based Authentication for Touch Devices , 2014 .

[15]  Arun Ross,et al.  Biometric authentication via keystroke sound , 2013, 2013 International Conference on Biometrics (ICB).

[16]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[17]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2009 .

[18]  Niko Brümmer,et al.  The BOSARIS Toolkit: Theory, Algorithms and Code for Surviving the New DCF , 2013, ArXiv.

[19]  Martin Lojka,et al.  Comparison of Different Feature Types for Acoustic Event Detection System , 2013, MCSS.

[20]  Arun Ross,et al.  Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Mohammad S. Obaidat,et al.  Online risk-based authentication using behavioral biometrics , 2013, Multimedia Tools and Applications.

[22]  Patrick Bours,et al.  Content Reconstruction Using Keystroke Dynamics: Preliminary Results , 2014, 2014 Fifth International Conference on Emerging Security Technologies.

[23]  Ting-Yi Chang,et al.  Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.

[24]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.