2005
DOI: 10.1007/11608288_85
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics

Abstract: Abstract. This paper presents a new approach for biometric authentication based on keystroke dynamics through numerical keyboards. The input signal is generated in real time when the user enters with target string. Five features were extracted from this input signal (ASCII key code and four keystroke latencies) and four experiments using samples for genuine and impostor users were performed using two pattern classification technics. The best results were achieved by the HMM (EER=3.6%). This new approach brings… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(39 citation statements)
references
References 9 publications
0
36
0
Order By: Relevance
“…Latter, Hidden Markov Model [26] was used as a classifier to classify the feature subsets generated from user typing behaviour.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Latter, Hidden Markov Model [26] was used as a classifier to classify the feature subsets generated from user typing behaviour.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Some studies only used the numerical keyboard of a computer (Killourhy & Maxion, 2010;Rodrigues et al, 2006).…”
Section: Mandatory Hardware and Variabilitymentioning
confidence: 99%
“…We believe that it is relevant to more investigate the quality of the captured keystroke features, in order to enhance the performance of keystroke dynamics systems. Obaidat & Sadoun (1997) 8 weeks 15 112 no no 0% 0% Bleha et al (1990) 8 weeks 36 30 yes yes 2.8% 8.1% Rodrigues et al (2006) 4 sessions 20 30 / no 3.6% 3.6% Hocquet et al (2007) /3 8 / / n o 1.7% 2.1% Revett et al (2007) 14 days 30 10 / no 0.15% 0.2% Hosseinzadeh & Krishnan (2008) /4 1 3 0 n o n o 4.3% 4.8% Monrose & Rubin (1997) 7 weeks 42 / no no / 20% Revett et al (2006) 4 weeks 8 12 / / 5.58% 5.58% Killourhy & Maxion (2009) 8 sessions 51 200 yes no 9.6% 9.6% Giot et al (2009c) 5 sessions 100 5 yes no 6.96% 6.96% Table 4. Summary of the protocols used for different studies in the state-of-the-art (A: Duration of the database acquisition, B: Number of individuals in the database, C: Number of samples required to create the template, D: Is the acquisition procedure controlled?, E: Is the threshold global?).…”
mentioning
confidence: 99%
“…The keystroke biometric is a behavioral biometric using a number of measurements or features to characterize an individual such as key press duration (dwell) times, transition (latency) times, and the identity of the keys pressed. Most previous keystroke biometric studies dealt with passwords or other short input [3,10,13,15,16,17,20,22,23], and there are now a number of "password hardening" commercial products, such as [1,2,4,6,11,14]. Fewer studies have investigated longtext input [8,10,18,19,21,24,25].…”
Section: Introductionmentioning
confidence: 99%