2019
DOI: 10.1002/spy2.64
|View full text |Cite
|
Sign up to set email alerts
|

A novel security scheme for behavioral authentication systems based on keystroke dynamics

Abstract: This article presents a comprehensive analysis behavioral authentication systems based on keystroke dynamics using android mobile devices. Behavioral security authentication is an efficient biometric‐based security system that can be used to authenticate users. It is exploited to strengthen password authentication efficiently and inexpensively because no extra hardware is required in most of these schemes. Keystroke dynamic rhythm uses combinations of timing features and nontiming features that are extracted a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 40 publications
0
10
0
Order By: Relevance
“…Physiological biometrics, such as fingerprints, iris, and face, have already drawn considerable attention in academia and have been implemented widely in industry . Behavioral biometrics, such as mouse movements, keystroke dynamics, graphical passwords, though not widely utilized, have also gained popularity in the research community . Similar to MFA systems with possession factors , MFA systems with physiological biometrics suffer from relatively low usability and deployability due to the implementation cost of biometrics recognition devices.…”
Section: Related Workmentioning
confidence: 99%
“…Physiological biometrics, such as fingerprints, iris, and face, have already drawn considerable attention in academia and have been implemented widely in industry . Behavioral biometrics, such as mouse movements, keystroke dynamics, graphical passwords, though not widely utilized, have also gained popularity in the research community . Similar to MFA systems with possession factors , MFA systems with physiological biometrics suffer from relatively low usability and deployability due to the implementation cost of biometrics recognition devices.…”
Section: Related Workmentioning
confidence: 99%
“…Over the last six decades, many classification methods have been applied in keystroke dynamics study. Keystroke dynamics can be perceived as a pattern recognition problem, and the most commonly deployed methods can be broadly categorized as statistical and machine learning approaches [12].…”
Section: Discussionmentioning
confidence: 99%
“…[11]. Authors also focus on comprehensive analysis using KSD using Neural network; different neural network classifiers are used in this work in order to find different performance parameters like false acceptance rate, low error rate, and equal error rate [12].…”
Section: • User's Situation and Emotionsmentioning
confidence: 99%
“…[15]. Moreover, in [16] researchers had combined the timing features with non-timing features i.e., pressure, position, finger placement and finger choice for tying behaviour analysis.…”
Section: Literature Reviewmentioning
confidence: 99%