Skip to main content

Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification

  • Conference paper
  • First Online:
Advances in Artificial Intelligence (Canadian AI 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9673))

Included in the following conference series:

Abstract

One-Class SVM is an unsupervised algorithm that learns a decision function from only one class for novelty detection: classifying new data as similar (inlier) or different (outlier) to the training set. In this article, we have applied the One-Class SVM to Keystroke Dynamics pattern recognition for user authentication in a remote evaluation system at Laval University. Since all of their students have a short and unique identifier at Laval University, this particular static text is used as the Keystroke Dynamics input for a user to build our own dataset. Then, we were able to identify weaknesses of such a system by evaluating the recognition accuracy depending on the number of signatures and as a function of their number of characters. Finally, we were able to show some correlations between the dispersion and mode of distributions of features characterizing the signatures and the recognition rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    IDentifiant Université Laval (IDUL).

  2. 2.

    k-fold Cross-Validation: the training set is split into k smaller sets. For each of the k “folds”, a model is trained using \(k-1\) of the folds as training data, and the resulting model is tested on the remaining part of the data to compute the accuracy. The accuracy reported by k-fold cross-validation is then the average of the values computed in the loop.

  3. 3.

    Accuracy:\(\frac{(TP+TN)}{TP+FP+TN+FN}\), Where TP, TN, FP, FN denotes respectively True Positive, True Negative, False Positive and False Negative.

  4. 4.

    Recall: \(\frac{TP}{(TP+FN)}\) (also called True Positive Rate) measures the proportion of positives that are correctly identified.

References

  1. Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recognit. Res. 7(1), 116–139 (2012)

    Article  Google Scholar 

  2. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12(12), 1217–1222 (1990)

    Article  Google Scholar 

  3. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  4. Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565–1573 (2011)

    Article  Google Scholar 

  5. Lin, C.J., Hsu, C.W., Chang, C.C.: A practical guide to support vector classification. National Taiwan University (2003). www.csie.ntu.edu.tw/cjlin/papers/guide/guide.pdf

  6. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  7. Pisani, P.H., Lorena, A.C.: A systematic review on keystroke dynamics. J. Braz. Comput. Soc. 19(4), 573–587 (2013)

    Article  Google Scholar 

  8. Robinson, J., Liang, V.M., Chambers, J., MacKenzie, C.L., et al.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 28(2), 236–241 (1998)

    Article  Google Scholar 

  9. Sang, Y., Shen, H., Fan, P.: Novel impostors detection in keystroke dynamics by support vector machine. In: Liew, K.-M., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds.) Parallel and Distributed Computing: Applications and Technologies. LNCS, vol. 3320, pp. 666–669. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Schölkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443–1471 (2001)

    Article  MATH  Google Scholar 

  11. Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 24 (2013). doi:10.1155/2013/408280. Article ID: 408280

    Article  Google Scholar 

  12. Yu, E., Cho, S.: Novelty detection approach for keystroke dynamics identity verification. In: Liu, J., Cheung, Y.-M., Yin, H. (eds.) Intelligent Data Engineering and Automated Learning. LNCS, vol. 2690, pp. 1016–1023. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chang, C., Eude, T., Obando Carbajal, L.E. (2016). Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification. In: Khoury, R., Drummond, C. (eds) Advances in Artificial Intelligence. Canadian AI 2016. Lecture Notes in Computer Science(), vol 9673. Springer, Cham. https://doi.org/10.1007/978-3-319-34111-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-34111-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-34110-1

  • Online ISBN: 978-3-319-34111-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics