Skip to main content

A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10144))

Abstract

User behavior-based authentication, while providing convenience to the user, is not widely used in the real world due to its low accuracy. Keystroke dynamics is one of the user behavior-based authentication methods, and it has been studied for about 40 years. Conventional keystroke dynamics has used key timing features for the personal computer (PC) environment. Since the smartphone equipped with advanced sensors (e.g., accelerometer, gyroscope, and touchscreen sensor) was released, sensor-based features have been used to improve the accuracy of classifying users with key timing features. In this paper, we analyze the keystroke dynamics features in the literature and evaluate each feature to find efficient features. Based on tapping data collected from 12 participants, we evaluate the effectiveness of several features from the empirical data of a six-digit PIN. Our experimental results show that the feature Up-Up (UU), the time difference between releasing a key and the next key, and the min, max, and mean features extracted from motion sensor data have the best accuracy and efficiently classify each user.

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. B0126-16-1007, Development of Universal Authentication Platform Technology with Context-Aware Multi-Factor Authentication and Digital Signature).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results. Report R-2526-NSF, Rand Corp (1980)

    Google Scholar 

  2. Buchoux, A., Clarke, N.L.: Deployment of keystroke analysis on a smartphone. In: Proceedings of the 6th Australian Information Security Management Conference, Perth, Western Australia, pp. 40–47. SECAU - Security Research Centre (2008)

    Google Scholar 

  3. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based authentication system for smartphones. Security and Communication Networks (2014)

    Google Scholar 

  4. Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proceedings of the International Conference on Computer and Electrical Engineering, pp. 82–86 (2008)

    Google Scholar 

  5. Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: William, M. (ed.) Department of Computer Science, pp. 1–13. WM-CS (2012)

    Google Scholar 

  6. Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 92–111. Springer, Cham (2014). doi:10.1007/978-3-319-08509-8_6

    Google Scholar 

  7. Ho, G.: Tapdynamics: Strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University (2014)

    Google Scholar 

  8. Pisani, P.H., Lorena, A.C.: Emphasizing typing signature in keystroke dynamics using immune algorithms. Appl. Soft Comput. 34, 178–193 (2015)

    Article  Google Scholar 

  9. Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafić, T., Camtepe, A., Lohlein, B., Heister, U., Moller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: ISI 2009, Richardson, TX, USA, 8–11 June 2009

    Google Scholar 

  10. Android Developers, Develop > API Guides > Location and Sensors - Sensors overview. https://developer.android.com/guide/topics/sensors/sensors_overview.html

  11. Trojahn, M., Ortmeier, F.: KeyGait: framework for continuously biometric authentication during usage of a smartphone. In: 3rd International Conference on Mobile Services, Resources, and Users, pp. 114–119 (2013)

    Google Scholar 

  12. Ting-Yi, C., Cheng-Jung, T., Jyun-Hao, L.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)

    Article  Google Scholar 

  13. Jain, L., Monaco, J.V., Coakley, M.J., Tappert, C.C.: Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards. Int. J. Res. Comput. Appl. Inf. Technol. 2, 29–33 (2014)

    Google Scholar 

  14. Draffin, B., Zhu, J., Zhang, J.: KeySens: passive user authentication through micro-behavior modeling of soft keyboard interaction. In: Memmi, G., Blanke, U. (eds.) MobiCASE 2013. LNICST, vol. 130, pp. 184–201. Springer, Cham (2014). doi:10.1007/978-3-319-05452-0_14

    Chapter  Google Scholar 

  15. de Mendizabal-Vazquez, I., de Santos-Sierra, D., Guerra-Casanova, J., Sanchez-Avila, C.: Supervised classification methods applied to keystroke dynamics through mobile devices. In: IEEE International Carnahan Conference on Security Technology, pp. 1–6 (2014)

    Google Scholar 

  16. Hall, M., Frank, E., Homes, G., Pfahringer, B., Reutemann, P., Wittern, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10–18 (2016)

    Google Scholar 

  17. Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Hoon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lee, SH., Roh, JH., Kim, S., Jin, SH. (2017). A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56549-1_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56548-4

  • Online ISBN: 978-3-319-56549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics