Abstract
In this paper we presented one fresh approach where the authentic user’s typing credentials are combined with the password to make authentication convincingly more secure than the usual password used in both offline and online transactions. With the help of empirical data and prototype implementation of the approach, we justified that our approach is ease of use, improved in security and performance. In normal approach different keystroke event timing is used for user profile creation. Keystroke latency and duration is inadequate for user authentication, which motivates exploring other matrices. In this paper we proposed combination of different matrices and calculation of degree of disorder on keystroke latency as well as duration to generate user profile. Statistical analysis on these matrices evaluates enhanced authentication process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, C.Y., Gun, C.Y., Lin, H.F.: A fair and dynamic password authentication system. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), August 8-10, pp. 4505–4509 (2011)
Bishop, M.: Computer Security. Addison-Wesley, Boston (2003)
Joyce, R., Gupta, G.: Identity Authentication Based on Keystroke Latencies. Communications of the ACM 33(2), 168–176 (1990)
Jain, A.K.: Biometric Recognition: How Do I Know Who You Are? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 19–26. Springer, Heidelberg (2005)
Umphress, D., Williams, G.: Identity verification through keyboard characteristics. Int. J. Man Mach. Stud. 23(3), 263–274 (1985)
Obaidat, M.S., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man and Cybernetics 27, 261–269 (1997)
Garcia, J.D.: Personal identification apparatus. US Patent 4,621,334 (November 4, 1986)
Young, J.R., Hammon, R.W.: Method and apparatus for verifying an individual’s identity. US Patent 4,805,222 (February 14, 1989)
Brown, M., Rogers, S.J.: A practical approach to user authentication. In: 10th Annual Computer Security Applications Conference, December 5-9, pp. 108–116 (1994)
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: CCS 1997: Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA, pp. 48–56 (1997)
Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2002)
Rudrapal, D., Das, S.: Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition. In: Mohan, S., Kumar, S.S. (eds.) International Conference on Signal and Image Processing (ICSIP). LNEE, vol. 221, pp. 375–385. Springer India (2013)
ChoraÅ›, M., Mroczkowski, P.: Recognizing Individual Typing Patterns. In: MartÃ, J., BenedÃ, J.M., Mendonça, A.M., Serrat, J. (eds.) IbPRIA 2007. LNCS, vol. 4478, pp. 323–330. Springer, Heidelberg (2007)
Bartlow, N., Cukic, B.: Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. In: 17th International Symposium on Software Reliability Engineering, ISSRE 2006, November 7-10, pp. 117–126 (2006)
Grabham, N.J., White, N.M.: Use of a Novel Keypad Biometric for Enhanced User Identity Verification. In: IEEE Instrumentation and Measurement Technology Conference Proceedings, IMTC 2008, May 12-15, pp. 12–16 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Rudrapal, D., Das, S., Debbarma, S. (2014). Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. In: Natarajan, R. (eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham. https://doi.org/10.1007/978-3-319-04483-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-04483-5_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04482-8
Online ISBN: 978-3-319-04483-5
eBook Packages: Computer ScienceComputer Science (R0)