A survey of keystroke dynamics biometrics
TLDR
An insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades is provided, as well as offering suggestions and possible future research directions.Abstract:
Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.read more
Citations
More filters
Journal ArticleDOI
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
TL;DR: It is concluded that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.
Journal ArticleDOI
A survey on touch dynamics authentication in mobile devices
TL;DR: The aim of this paper is to provide some insights and comparative analysis of the current state of the art in the topic area, including data acquisition protocols, feature data representations, decision making techniques, as well as experimental settings and evaluations.
Proceedings ArticleDOI
Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices
TL;DR: This paper presents the first reported study on mobile keystroke biometrics which compares touch-specific features between three different hand postures and evaluation schemes, and shows that including spatial touch features reduces implicit authentication equal error rates (EER) by 26.4 - 36.8% relative to the previously used temporal features.
Journal ArticleDOI
Wearable Medical Sensor-Based System Design: A Survey
TL;DR: Various services, applications, and systems that have been developed based on WMSs are discussed and a list of desirable design goals that WMS-based systems should satisfy are suggested.
Journal ArticleDOI
Keystroke Dynamics on Android Platform
TL;DR: Results show that these additional features added to the identification and verification performance through the dataset of 42 users enhance the accuracy of both processes.
References
More filters
Journal ArticleDOI
Keystroke dynamics as a biometric for authentication
Fabian Monrose,Aviel D. Rubin +1 more
TL;DR: This paper examines an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type in an effort to confront the new threats unveiled by the networking revolution.
Journal ArticleDOI
Identity authentication based on keystroke latencies
Rick Joyce,Gopal Gupta +1 more
TL;DR: A method of verifying the identity of a user based on a stream of latency periods between keystrokes, and results from trial usage of the system are reported.
Proceedings ArticleDOI
Authentication via keystroke dynamics
Fabian Monrose,Aviel D. Rubin +1 more
TL;DR: A database of 42 profiles was constructed based on keystroke patterns gathered from various users performing structured and unstructured tasks, and a toolkit for analyzing system performance under varying criteria is presented.
Journal ArticleDOI
User authentication through keystroke dynamics
TL;DR: This paper presents an original measure for keystroke dynamics that limits the instability of this biometric feature, and has tested this approach on 154 individuals.
Proceedings ArticleDOI
Comparing anomaly-detection algorithms for keystroke dynamics
Kevin S. Killourhy,Roy A. Maxion +1 more
TL;DR: The objective is to collect a keystroke-dynamics data set, to develop a repeatable evaluation procedure, and to measure the performance of a range of detectors so that the results can be compared soundly.
Related Papers (5)
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
Salil Banerjee,Damon L. Woodard +1 more
Comparing anomaly-detection algorithms for keystroke dynamics
Kevin S. Killourhy,Roy A. Maxion +1 more