GREYC keystroke: A benchmark for keystroke dynamics biometric systems

Even if the market penetration rate of biometric technologies is still far below its potential, many biometric systems are used in our daily real-life. One of the main reasons to its low proliferation is the lack of a generic and complete approach that quantifies the performance of biometric systems taking into account individuals' perception among the process. Among all the existing biometric modalities, authentication systems based on keystroke dynamics are particularly interesting. Many researchers proposed in the last decades some algorithms to increase the efficiency of this approach. Nevertheless, none significant benchmark is available and commonly used in the state of the art to compare them by using a similar and rigorous protocol. We propose in this paper: a benchmark testing suite composed of a database and a software that are available for the scientific community for the evaluation of keystroke dynamics based systems. Performance evaluation of various keystroke dynamics methods tested on the database is available in [1].

[1]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[2]  Christophe Rosenberger,et al.  Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[3]  Liang Wang,et al.  Behavioral Biometrics For Human Identification: Intelligent Applications , 2009 .

[4]  Mary F. Theofanos,et al.  Usability and Biometrics: Ensuring Successful Biometric Systems | NIST , 2008 .

[5]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[6]  Luís A. Alexandre,et al.  UBIRIS: A Noisy Iris Image Database , 2005, ICIAP.

[7]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[8]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[9]  Wm. Arthur Conklin,et al.  Password-based authentication: a system perspective , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[10]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[11]  Sungzoon Cho,et al.  Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.

[12]  Jugurta R. Montalvão Filho,et al.  On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..

[13]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[14]  Sungzoon Cho,et al.  Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..

[15]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[16]  Jean-Yves Ramel,et al.  User Classification for Keystroke Dynamics Authentication , 2007, ICB.

[17]  Jean-Philippe Thiran,et al.  The BANCA Database and Evaluation Protocol , 2003, AVBPA.

[18]  Jiri Matas,et al.  XM2VTSDB: The Extended M2VTS Database , 1999 .

[19]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[20]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[21]  Dario Maio,et al.  Synthetic fingerprint-database generation , 2002, Object recognition supported by user interaction for service robots.

[22]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[23]  Kenneth Revett,et al.  On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.