2013 International Conference on Biometrics and Kansei Engineering 2013
DOI: 10.1109/icbake.2013.48
|View full text |Cite
|
Sign up to set email alerts
|

An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Many existing solutions are based on statistical data on the specific events, the number of their occurrences in time, or simultaneous occurrences of a chosen set of them [11]. The most frequently used characteristics include: the duration of a specific keypress and intervals between keypresses, typing speed (the average number of keystrokes in a given time), overlapping of a certain key combinations, ratio of Shift or Capslock buttons usage to type upper/lowercase letters, number of errors, error correction methods, and the use of the navigation (arrow) keys for the cursor.…”
Section: The State Of the Art In Keystroke Dynamics Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Many existing solutions are based on statistical data on the specific events, the number of their occurrences in time, or simultaneous occurrences of a chosen set of them [11]. The most frequently used characteristics include: the duration of a specific keypress and intervals between keypresses, typing speed (the average number of keystrokes in a given time), overlapping of a certain key combinations, ratio of Shift or Capslock buttons usage to type upper/lowercase letters, number of errors, error correction methods, and the use of the navigation (arrow) keys for the cursor.…”
Section: The State Of the Art In Keystroke Dynamics Identificationmentioning
confidence: 99%
“…The most frequently used characteristics include: the duration of a specific keypress and intervals between keypresses, typing speed (the average number of keystrokes in a given time), overlapping of a certain key combinations, ratio of Shift or Capslock buttons usage to type upper/lowercase letters, number of errors, error correction methods, and the use of the navigation (arrow) keys for the cursor. Only two features and a simple classifier can allow for quite effective authorization or identification of the user [11].…”
Section: The State Of the Art In Keystroke Dynamics Identificationmentioning
confidence: 99%
“…However, after nearly ten years of development, Shimpshon et al [22] proposed a clustering method based on graph in 2010 which added a similar continuous keystroke to form a fixed length of the session, and the experimental results in 21 real users and 165 counterfeiters showed that it has a False Accept Rate (FAR) of 3.47% just by using 250 keystrokes. More specifically, Rybnik et al [23] explored keystrokes in different lengths of nonfixed text in 2013, providing a reliable basis for the authentication of free text. After that, Song et al [24] constructed a Gaussian model for the user's recent input characters sequence based on the Gaussian probability density function in 2016, which shortened the authentication cycle and reached FAR of 5.3% under 30 characters.…”
Section: Keystroke-based Authentication Schemesmentioning
confidence: 99%
“…The datasets in the literature contain keystroke data, which in most cases, are collected from users typing 2-3 sentences only [36]. Rybnik et al [37] created a free text dataset, which contains keystrokes from 9 volunteers. Each volunteer typed a long text of more than 250 characters twice in five sessions.…”
Section: Related Workmentioning
confidence: 99%