Keystroke Biometric User Verification Using Hidden Markov Model

Biometric systems such as fingerprint, iris, DNA became popular methods in user authentication. Compared to these biometric systems, keystroke biometric authentication systems have not gained so much attention because of lower accuracy compared to other biometric systems. A number of researches have been conducted on keystroke biometric using different generative and discriminative classifiers. As Hidden Markov Models have proven a great success in voice recognition, this study investigates Hidden Markov Models in keystroke dynamic. This paper proposes a novel user verification technique using 1-substate Hidden Markov Model through keystroke dynamic. To verify the effectiveness of the proposed system, extensive experiments have been conducted and 80% accuracy was achieved by the proposed system.

[1]  John V. Monaco,et al.  Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .

[2]  Guiran Chang,et al.  Authenticating User's Keystroke Based on Statistical Models , 2010, 2010 Fourth International Conference on Genetic and Evolutionary Computing.

[3]  Charles C. Tappert,et al.  User Authentication and Identification Using Neural Network , 2015 .

[4]  Shashi Phoha,et al.  Computer User Authentication using Hidden Markov Model through Keystroke Dynamics , 2006 .

[5]  Wendy Chen,et al.  Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..

[6]  Michael I. Jordan,et al.  On Discriminative vs. Generative Classifiers: A comparison of logistic regression and naive Bayes , 2001, NIPS.

[7]  Ilkay Ulusoy,et al.  Generative versus discriminative methods for object recognition , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[8]  Steven Bathiche,et al.  A practical pressure sensitive computer keyboard , 2009, UIST '09.

[9]  Weide Chang,et al.  Improving hidden Markov models with a similarity histogram for typing pattern biometrics , 2005, IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005..

[10]  Figen Ertaş,et al.  FUNDAMENTALS OF SPEAKER RECOGNITION , 2011 .

[11]  Shiuh-Pyng Shieh,et al.  Keystroke statistical learning model for web authentication , 2007, ASIACCS '07.

[12]  Meikang Qiu,et al.  Keystroke Biometric Systems for User Authentication , 2017, J. Signal Process. Syst..

[13]  Emc Education Services Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data , 2015 .

[14]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[15]  Meikang Qiu,et al.  Authentication and Identification Methods Used in Keystroke Biometric Systems , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[16]  W. Marsden I and J , 2012 .

[17]  Homayoon Beigi Hidden Markov Modeling (HMM) , 2011 .

[18]  John V. Monaco,et al.  Spoofing key-press latencies with a generative keystroke dynamics model , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[19]  Keke Gai,et al.  An Investigation on Cyber Security Threats and Security Models , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[20]  Sung-Hyuk Cha,et al.  Developing a Keystroke Biometric System for Continual Authentication of Computer Users , 2012, 2012 European Intelligence and Security Informatics Conference.

[21]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.