Modified digraphs method in the problem of authenticating users using keystroke dynamics
DOI:
https://doi.org/10.18372/2410-7840.18.11084Keywords:
keystroke dynamics, biometric algorithms, hold time, digraphs method, biometric standartAbstract
Keystroke dynamics analysis is fairly fast growing direction of research that is due to need to ensure the security of a large park of applications and adaptation to the changing technologies. In this article proposed keystroke dynamics user authentication method which uses modified method of digraphs. In this case, it suggested the division of the keyboard keys on their functional purpose. Each zone generates its own events (double and single) which are analyzed separately. The final decision of authentication is made on the basis of all the data from all functional areas of the keyboard. For paired keyboard events is used the ratio of time parameters of digraphs. This makes it possible to analyze both static and dynamic features keystroke rhythms of a user. The main calculated parameter in a single event is hold time of key. Processing of such events gives the possibility to add unique additional user profile attributes. This integrated approach allows to improve the accuracy of authentication using keystroke dynamics without increasing the volume of data being processed.References
R.Spillane. Keyboard apparatus for personal identifica-tion. IBM Technical Disclosure Bulltin, 17(11), 1975.
R. Gaines, W. Lisowski, S. Press, and N. Shapiro. Au-thentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation, p. 51, 1980.
D. Umphress and G. Williams. Identity verification through keyboard characteristics. International Journal of Man-Machine Studies, Vol. 23(3), pp. 263–273, 1985.
K.S. Balagani, Vir V. Phoha, A.Ray, and S. Phoha. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters, Vol. 32(7), pp. 1070–1080, 2011.
R.A. Maxion and K.S. Killourhy. Keystroke biometrics with number-pad input. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 201–210, 2010.
J.A. Robinson, V.W. Liang, J.A.M. Chambers, and C.L. MacKenzie. Computer user verification using login string keystroke dynamics. IEEE Transactions on Sys-tems, Man and Cybernetics, Part A: Systems and Hu-mans, Vol. 28(2), pp. 236–241, 1998.
D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Transactions on Information and System Se-curity, Vol. 8(3), pp.312–347, 2005.
F. Bergadano, D. Gunetti, and C. Picardi. User authen-tication through keystroke dynamics. ACM Transac-tions on Information and System Security, Vol. 5(4), pp. 367–397, 2002.
D. El Menshawy, H.M.O. Mokhtar, and O. Hegazy. A keystroke dynamics based approach for continuous au-thentication. In 10th International Conference on Be-yond Databases, Architectures, and Structures (BDAS), Vol. 424 of CCIS, pp. 415–424, 2014.
T. Sim and R. Janakiraman. Are digraphs good for free-text keystroke dynamics? In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–6, 2007.
A. Messerman, T. Mustafic, S.A. Camtepe, and S. Al-bayrak. Continuous and non-intrusive identity verifica-tion in real-time environments based on free-text key-stroke dynamics. In International Joint Conference on Biometrics (IJCB), pp. 1–8, 2011.
S.Z.S. Idrus, E. Cherrier, C. Rosenberger, and P. Bours. Soft biometrics for keystroke dynamics. In 10th International Conference on Image Analysis and Recognition (ICIAR), Vol. 7950 of LNCS, pp. 11–18, 2013.
Синиця Ю.О. Автентифікація суб’єктів за клавіатурним почерком з використанням диграфів // Международная конференция "Интернет-техно-логии и программирование компьютерных мо-бильных систем": Материалы XVII Международ-ного молодежного форума "Радиоэлектроника и молодежь в XXI веке ", том 5. — Харьков, 2013. — с. 167-168.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).