Skip to main content

Keystroke Recognition

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Synonyms

Behavioral biometrics; Keystroke dynamics; Keystroke pattern classification

Definition

Keystroke recognition is a behavioral biometric which authenticates (verifies the claimed identity) or identifies an individual (recognizes a valid user) based on their unique typing rhythm. Unlike physiological biometrics, such as fingerprint or iris, where specialized sensors are necessary to collect data, keystroke biometrics utilizes off-the-shelf physical keyboards or virtual keyboards in smartphones or PDAs. Thus, keystroke recognition offers a low-cost authentication and is easily deployed in a variety of scenarios.

Two events constitute a keystroke event: key down and key up. The key down occurs when the typist presses a key. The key up is associated with the event that occurs when the pressed key is released. Using these two events, a set of intra-key and inter-key features commonly called hold times, delay times and key down-key down times can be extracted. Hold times constitute...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K.S. Balagani, V.V. Phoha, A. Ray, S. Phoha, On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit. Lett. 32, 10701080 (2011)

    Article  Google Scholar 

  2. N. Bartlow, B. Cukic, Evaluating the reliability of credential hardening through keystroke dynamics, in 17th International Symposium on Software Reliability Engineering, Raleigh, NC, 2006, pp. 117–126

    Google Scholar 

  3. M. Brennan, S. Afroz, R. Greenstadt, Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15(2) (2012)

    Google Scholar 

  4. S. Douhou, J.R. Magnus, The reliability of user authentication through keystroke dynamics. Stat. Neerl. 63(4), 432–449 (2009)

    Article  MathSciNet  Google Scholar 

  5. J. Hu, D. Gingrich, A. Sentosa, A k-nearest neighbor approach for user authentication through biometric keystroke dynamics, in IEEE International Conference on Communications, Beijing, China, 2008, pp. 1556–1560

    Google Scholar 

  6. D. Gunetti, C. Picardi, Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)

    Article  Google Scholar 

  7. S.S. Joshi, V.V. Phoha, Investigating hidden Markov models capabilities in anomaly detection, in Proceedings of the 43rd Annual Southeast Regional Conference, Kennesaw, GA, vol. 1, 2005, pp. 98–103

    Google Scholar 

  8. P. Khanna, M. Sasikumar, Recognizing emotions from keyboard stroke pattern. Int. J. Comput. Appl. 11(9), pp. 1–5 (2010)

    Google Scholar 

  9. K.S. Killourhy, R.A. Maxion, Comparing anomaly-detection algorithms for keystroke dynamics, in IEEE/IFIP International Conference on Dependable Systems Networks, Lisbon, Portugal, 2009, pp. 125–134

    Google Scholar 

  10. H.-R. Lv, W.-Y. Wang, Biologic verification based on pressure sensor keyboards and classifier fusion techniques. IEEE Trans. Consum. Electron. 52(3), 1057–1063 (2006)

    Article  MathSciNet  Google Scholar 

  11. F. Monrose, A. Rubin, Authentication via keystroke dynamics, in Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, 1997, pp. 48–56

    Google Scholar 

  12. K. Revett, S.T. de Magalhaes, H. Santos, Data mining a keystroke dynamics based biometrics database using rough sets, in Portuguese Conference on Artificial Intelligence, Covilha, Portugal, 2005, pp. 188–191

    Google Scholar 

  13. Z. Syed, S. Banerjee, Q. Cheng, B. Cukic, Effects of user habituation in keystroke dynamics on password security policy, in 13th International Symposium on High Assurance Systems Engineering, Boca Raton, FL, 2011, pp. 352–359

    Google Scholar 

  14. P.S. Teh, A. Teoh, T.S. Ong, H.F. Neo, Statistical fusion approach on keystroke dynamics, in Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, Shanghai, China, 2007, pp. 918–923

    Google Scholar 

  15. K. Xi, Y. Tang, J. Hu, Correlation keystroke verification scheme for user access control in cloud computing environment. Comput. J. 11, 1632–1644 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Banerjee, S., Syed, Z., Bartlow, N., Cukic, B. (2015). Keystroke Recognition. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_205

Download citation

Publish with us

Policies and ethics