The partially observable hidden Markov model and its application to keystroke dynamics

The partially observable hidden Markov model (POHMM) is introduced.In keystroke dynamics, the key names partially reveal typist behavior.The POHMM hidden state is conditioned on an independent Markov chain.The marginalized POHMM is equivalent to the HMM.A method of POHMM parameter smoothing is described.We perform user identification, verification, and continuous verification. The partially observable hidden Markov model is an extension of the hidden Markov Model in which the hidden state is conditioned on an independent Markov chain. This structure is motivated by the presence of discrete metadata, such as an event type, that may partially reveal the hidden state but itself emanates from a separate process. Such a scenario is encountered in keystroke dynamics whereby a users typing behavior is dependent on the text that is typed. Under the assumption that the user can be in either an active or passive state of typing, the keyboard key names are event types that partially reveal the hidden state due to the presence of relatively longer time intervals between words and sentences than between letters of a word. Using five public datasets, the proposed model is shown to consistently outperform other anomaly detectors, including the standard HMM, in biometric identification and verification tasks and is generally preferred over the HMM in a Monte Carlo goodness of fit test.

[1]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[2]  T. Salthouse Perceptual, cognitive, and motoric aspects of transcription typing. , 1986, Psychological bulletin.

[3]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Rik Farrow TIMING ANALYSIS OF KEYSTROKES AND TIMING ATTACKS ON SSH , 2001 .

[5]  Adilson E. Motter,et al.  A Poissonian explanation for heavy tails in e-mail communication , 2008, Proceedings of the National Academy of Sciences.

[6]  Robert P. W. Duin,et al.  Component-based discriminative classification for hidden Markov models , 2009, Pattern Recognit..

[7]  Sung-Hyuk Cha,et al.  Keystroke Biometric Studies on Password and Numeric Keypad Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[8]  Albert-László Barabási,et al.  The origin of bursts and heavy tails in human dynamics , 2005, Nature.

[9]  Junji Yamato,et al.  Recognizing human action in time-sequential images using hidden Markov model , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[10]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[11]  Jugurta R. Montalvão Filho,et al.  Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..

[12]  Oendrila Samanta,et al.  Smoothing of HMM parameters for efficient recognition of online handwriting , 2014, Pattern Recognit..

[13]  Soumik Mondal,et al.  Performance evaluation of continuous authentication systems , 2015, IET Biom..

[14]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[15]  Huseyin Ozkan,et al.  A novel and robust parameter training approach for HMMs under noisy and partial access to states , 2014, Signal Process..

[16]  Søren Forchhammer,et al.  Adaptive partially hidden Markov models with application to bilevel image coding , 1999, IEEE Trans. Image Process..

[17]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[18]  Bernard Mérialdo,et al.  Tagging English Text with a Probabilistic Model , 1994, CL.

[19]  Pau-Choo Chung,et al.  A daily behavior enabled hidden Markov model for human behavior understanding , 2008, Pattern Recognit..

[20]  Chafic Mokbel,et al.  Dynamic and Contextual Information in HMM Modeling for Handwritten Word Recognition , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[22]  Salvador España Boquera,et al.  Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  Sung-Hyuk Cha,et al.  Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[24]  Piet Van Mieghem,et al.  Are human interactivity times lognormal? , 2016, ArXiv.

[25]  Hsiao-Wuen Hon,et al.  Speaker-independent phone recognition using hidden Markov models , 1989, IEEE Trans. Acoust. Speech Signal Process..

[26]  Ling Shao,et al.  Deep Dynamic Neural Networks for Multimodal Gesture Segmentation and Recognition , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  He Wang,et al.  MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.

[28]  T. Kobayashi,et al.  Partly-hidden Markov model and its application to gesture recognition , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[29]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[30]  Yi Lu,et al.  A Nonhomogeneous Poisson Hidden Markov Model for Claim Counts , 2012, ASTIN Bulletin.

[31]  Jugurta R. Montalvão Filho,et al.  On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..

[32]  John V. Monaco,et al.  Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .

[33]  Jianying Hu,et al.  HMM Based On-Line Handwriting Recognition , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[34]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[35]  L. R. Rabiner,et al.  An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition , 1983, The Bell System Technical Journal.

[36]  Yujian Li Hidden Markov models with states depending on observations , 2005, Pattern Recognit. Lett..

[37]  Wei Wang,et al.  Keystroke Recognition Using WiFi Signals , 2015, MobiCom.

[38]  Sung-Hyuk Cha,et al.  A Keystroke Biometric System for Long-Text Input , 2013 .

[39]  Stefanos Zafeiriou,et al.  Use of random time-intervals (RTIs) generation for biometric verification , 2009, Pattern Recognit..

[40]  L. Prasanth,et al.  HMM-Based Online Handwriting Recognition System for Telugu Symbols , 2007 .

[41]  Rupert G. Miller Simultaneous Statistical Inference , 1966 .

[42]  James H. Martin,et al.  Speech and language processing: an introduction to natural language processing , 2000 .

[43]  R. L. Stratonovich CONDITIONAL MARKOV PROCESSES , 1960 .

[44]  Roy A. Maxion,et al.  The Effect of Clock Resolution on Keystroke Dynamics , 2008, RAID.

[45]  W. Newey,et al.  Large sample estimation and hypothesis testing , 1986 .

[46]  Vasanthan Raghavan,et al.  Hidden Markov Models for the Activity Profile of Terrorist Groups , 2012, ArXiv.

[47]  H. Zelaznik,et al.  Dissociation of explicit and implicit timing in repetitive tapping and drawing movements. , 2002 .

[48]  Dan Tsafrir,et al.  Effects of clock resolution on the scheduling of interactive and soft real-time processes , 2003, SIGMETRICS '03.

[49]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[50]  John V. Monaco,et al.  Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation , 2016, ArXiv.

[51]  Shunzheng Yu,et al.  Hidden semi-Markov models , 2010, Artif. Intell..

[52]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[53]  Nikolaus Mutsam,et al.  Maximum margin hidden Markov models for sequence classification , 2016, Pattern Recognit. Lett..

[54]  Tetsunori Kobayashi,et al.  Partly hidden Markov model and its application to speech recognition , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[55]  Andrew Y. Ng,et al.  Offering Verified Credentials in Massive Open Online Courses: MOOCs and technology to advance learning and learning research (Ubiquity symposium) , 2014, UBIQ.

[56]  Thorsten Dickhaus,et al.  Simultaneous Statistical Inference , 2014, Springer Berlin Heidelberg.

[57]  L. Baum,et al.  Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .

[58]  James H. Martin,et al.  Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .

[59]  Vir V. Phoha,et al.  Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..

[60]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[61]  John V. Monaco,et al.  Keystroke biometric studies with short numeric input on smartphones , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[62]  Anneli Folkesson European Intelligence and Security Informatics Conference (EISIC 2013) , 2015 .

[63]  Jorma Rissanen,et al.  Partially hidden Markov models , 1996, IEEE Trans. Inf. Theory.

[64]  Sung-Hyuk Cha,et al.  Keystroke Biometric Identification and Authentication on Long-Text Input , 2010 .