Skip to main content

Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8337))

Abstract

In this paper we presented one fresh approach where the authentic user’s typing credentials are combined with the password to make authentication convincingly more secure than the usual password used in both offline and online transactions. With the help of empirical data and prototype implementation of the approach, we justified that our approach is ease of use, improved in security and performance. In normal approach different keystroke event timing is used for user profile creation. Keystroke latency and duration is inadequate for user authentication, which motivates exploring other matrices. In this paper we proposed combination of different matrices and calculation of degree of disorder on keystroke latency as well as duration to generate user profile. Statistical analysis on these matrices evaluates enhanced authentication process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, C.Y., Gun, C.Y., Lin, H.F.: A fair and dynamic password authentication system. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), August 8-10, pp. 4505–4509 (2011)

    Google Scholar 

  2. Bishop, M.: Computer Security. Addison-Wesley, Boston (2003)

    Google Scholar 

  3. Joyce, R., Gupta, G.: Identity Authentication Based on Keystroke Latencies. Communications of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  4. Jain, A.K.: Biometric Recognition: How Do I Know Who You Are? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 19–26. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Umphress, D., Williams, G.: Identity verification through keyboard characteristics. Int. J. Man Mach. Stud. 23(3), 263–274 (1985)

    Article  Google Scholar 

  6. Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man and Cybernetics 27, 261–269 (1997)

    Article  Google Scholar 

  7. Garcia, J.D.: Personal identification apparatus. US Patent 4,621,334 (November 4, 1986)

    Google Scholar 

  8. Young, J.R., Hammon, R.W.: Method and apparatus for verifying an individual’s identity. US Patent 4,805,222 (February 14, 1989)

    Google Scholar 

  9. Brown, M., Rogers, S.J.: A practical approach to user authentication. In: 10th Annual Computer Security Applications Conference, December 5-9, pp. 108–116 (1994)

    Google Scholar 

  10. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: CCS 1997: Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA, pp. 48–56 (1997)

    Google Scholar 

  11. Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2002)

    Article  Google Scholar 

  12. Rudrapal, D., Das, S.: Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition. In: Mohan, S., Kumar, S.S. (eds.) International Conference on Signal and Image Processing (ICSIP). LNEE, vol. 221, pp. 375–385. Springer India (2013)

    Google Scholar 

  13. Choraś, M., Mroczkowski, P.: Recognizing Individual Typing Patterns. In: Martí, J., Benedí, J.M., Mendonça, A.M., Serrat, J. (eds.) IbPRIA 2007. LNCS, vol. 4478, pp. 323–330. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Bartlow, N., Cukic, B.: Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. In: 17th International Symposium on Software Reliability Engineering, ISSRE 2006, November 7-10, pp. 117–126 (2006)

    Google Scholar 

  15. Grabham, N.J., White, N.M.: Use of a Novel Keypad Biometric for Enhanced User Identity Verification. In: IEEE Instrumentation and Measurement Technology Conference Proceedings, IMTC 2008, May 12-15, pp. 12–16 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Rudrapal, D., Das, S., Debbarma, S. (2014). Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. In: Natarajan, R. (eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham. https://doi.org/10.1007/978-3-319-04483-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04483-5_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04482-8

  • Online ISBN: 978-3-319-04483-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics