2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium 2015
DOI: 10.1109/hpcc-css-icess.2015.66
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Identification Methods Used in Keystroke Biometric Systems

Abstract: Keystroke dynamics authentication is not as widely used compared to other biometric systems. In recent years, keystroke dynamic authentication systems have gained interest because of low cost and integration with existing security systems. Many different methods have been proposed for data collection, feature representation, classification, and performance evaluation. The work presents a detailed survey of the most recent research in keystroke dynamic authentication. Research is evaluated by the conditions und… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 72 publications
0
7
0
Order By: Relevance
“…Typing behavior can be extracted using existing hardware such as the regular standard keyboard on desktop personal computers and laptops as long as there are virtual keyboards in the touch screen devices. This makes this scheme inexpensive and extremely attractive technique …”
Section: Background Informationmentioning
confidence: 99%
See 3 more Smart Citations
“…Typing behavior can be extracted using existing hardware such as the regular standard keyboard on desktop personal computers and laptops as long as there are virtual keyboards in the touch screen devices. This makes this scheme inexpensive and extremely attractive technique …”
Section: Background Informationmentioning
confidence: 99%
“…In NN models, researchers first build a prediction model from input provided by users during enrollment, which will be later used to predict the outcome of a new trial provided by the user during authentication. Authentication in NN, similar to statistical approach, consists of comparing the users profile by the new input provided in the authentication process , Hybrid techniques…”
Section: Background Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…A number of studies have been performed in the area of keystrokes analysis since it is founded on the field of biometric based systems [10][11][12][13][14][15]. Many authors proposing good contribution trials for existing unique datasets benchmarks [14] [15]. It was difficult to compare the performance among different researches based on KSD, so different public datasets were published in this field to provide one unique evaluation research based on one reference.…”
Section: Benchmarking Datasets and Challengesmentioning
confidence: 99%