2017 International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2017
DOI: 10.1109/i-smac.2017.8058304
|View full text |Cite
|
Sign up to set email alerts
|

Biometrie authentication using keystroke dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Six kinds of features are applied to represent keystroke behaviors: dwelling time (DT), flying time (FT), lifting time (LT), recovering time (RT), pressure value (P), and the pressure release speed (N). DT, FT, and P were popularly used in previous keystroke studies [45,[68][69][70]. LT, RT, and N are added because they represent the degree of energy concentration [71][72].…”
Section: Feature Extractionmentioning
confidence: 99%
“…Six kinds of features are applied to represent keystroke behaviors: dwelling time (DT), flying time (FT), lifting time (LT), recovering time (RT), pressure value (P), and the pressure release speed (N). DT, FT, and P were popularly used in previous keystroke studies [45,[68][69][70]. LT, RT, and N are added because they represent the degree of energy concentration [71][72].…”
Section: Feature Extractionmentioning
confidence: 99%
“…Factors such as -what the user knows‖ (inherent), -what the user has‖ (possession), and -what the user is‖ (biometric) have served as additional authentication methods [32]. In this regard, biometric features unique to individuals, ranging from physiological characteristics (e.g., fingerprints and iris, hand, and face patterns) to behavioral characteristics (e.g., KD, www.ijacsa.thesai.org mouse movements, gait, and handwriting), have served to identify users [3]. Many such biometric approaches tend either to be expensive or to place heavy demands on computer hardware, making them inappropriate for most users [35].…”
Section: B Multifactor Authentication (Mfa)mentioning
confidence: 99%
“…Jadhav Kulkami, Shelar, Shinde, and Dharwadkar [3] proposed an ML-based authentication model that uses the static approach of keystroke dynamics to recognize and authenticate users accessing the system based on their unique keystroke profiles with respect to the flight, dwell, press, press-to-press, and release-to-release time and achieved an FAR and an FRR of 1% and 4%, respectively. Gupta, Khanna, Jagetia, Sharma, Alekh, and Chouldhary [35] proposed a high-efficiency authentication system combining two methods to make keystroke biometrics less susceptible to forgery and more usable and reported that the system efficiently implemented secure authentication with the advantage of ease of implementation since all that is required is the installation of software on any workstation.…”
Section: Behavioral Authentication Using MLmentioning
confidence: 99%
See 1 more Smart Citation
“…In the mobile keystroke dynamic biometric authentication approach proposed recently by Jadhav et al, timing and pressure features were extracted, and analyzed by computing the mean and the SD to classify the users based on predetermined threshold. The approach was evaluated by collecting 20 password samples from four subjects.…”
Section: Background and Related Workmentioning
confidence: 99%