Abstract
One-Class SVM is an unsupervised algorithm that learns a decision function from only one class for novelty detection: classifying new data as similar (inlier) or different (outlier) to the training set. In this article, we have applied the One-Class SVM to Keystroke Dynamics pattern recognition for user authentication in a remote evaluation system at Laval University. Since all of their students have a short and unique identifier at Laval University, this particular static text is used as the Keystroke Dynamics input for a user to build our own dataset. Then, we were able to identify weaknesses of such a system by evaluating the recognition accuracy depending on the number of signatures and as a function of their number of characters. Finally, we were able to show some correlations between the dispersion and mode of distributions of features characterizing the signatures and the recognition rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
IDentifiant Université Laval (IDUL).
- 2.
k-fold Cross-Validation: the training set is split into k smaller sets. For each of the k “folds”, a model is trained using \(k-1\) of the folds as training data, and the resulting model is tested on the remaining part of the data to compute the accuracy. The accuracy reported by k-fold cross-validation is then the average of the values computed in the loop.
- 3.
Accuracy:\(\frac{(TP+TN)}{TP+FP+TN+FN}\), Where TP, TN, FP, FN denotes respectively True Positive, True Negative, False Positive and False Negative.
- 4.
Recall: \(\frac{TP}{(TP+FN)}\) (also called True Positive Rate) measures the proportion of positives that are correctly identified.
References
Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recognit. Res. 7(1), 116–139 (2012)
Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12(12), 1217–1222 (1990)
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565–1573 (2011)
Lin, C.J., Hsu, C.W., Chang, C.C.: A practical guide to support vector classification. National Taiwan University (2003). www.csie.ntu.edu.tw/cjlin/papers/guide/guide.pdf
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Pisani, P.H., Lorena, A.C.: A systematic review on keystroke dynamics. J. Braz. Comput. Soc. 19(4), 573–587 (2013)
Robinson, J., Liang, V.M., Chambers, J., MacKenzie, C.L., et al.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 28(2), 236–241 (1998)
Sang, Y., Shen, H., Fan, P.: Novel impostors detection in keystroke dynamics by support vector machine. In: Liew, K.-M., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds.) Parallel and Distributed Computing: Applications and Technologies. LNCS, vol. 3320, pp. 666–669. Springer, Heidelberg (2005)
Schölkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443–1471 (2001)
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 24 (2013). doi:10.1155/2013/408280. Article ID: 408280
Yu, E., Cho, S.: Novelty detection approach for keystroke dynamics identity verification. In: Liu, J., Cheung, Y.-M., Yin, H. (eds.) Intelligent Data Engineering and Automated Learning. LNCS, vol. 2690, pp. 1016–1023. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, C., Eude, T., Obando Carbajal, L.E. (2016). Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification. In: Khoury, R., Drummond, C. (eds) Advances in Artificial Intelligence. Canadian AI 2016. Lecture Notes in Computer Science(), vol 9673. Springer, Cham. https://doi.org/10.1007/978-3-319-34111-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-34111-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-34110-1
Online ISBN: 978-3-319-34111-8
eBook Packages: Computer ScienceComputer Science (R0)