Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 578))

Included in the following conference series:

  • 998 Accesses

Abstract

As shown by various studies, the dynamics of typing on a keyboard is characteristic to persons. On the one hand, this may allow for person identification based on keystroke dynamics in various applications. On the other hand, in certain situations, such as chat-based anonymous helplines, web search for sensitive topics, etc., users may not want to reveal their identity. In general, there are various methods to increase the protection of personal data. In this paper, we propose the concept of privacy-aware keyboard, i.e., a keyboard which transmits keyboard events (such as pressing or releasing of a key) with small random delays in order to ensure that the identity of the user is difficult to be inferred from her typing dynamics. We use real-world keystroke dynamics data in order to simulate privacy-aware keyboards with uniformly random delay and Gaussian delay. The experimental results indicate that the proposed techniques may have an important contribution to keeping the anonymity of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The number of typing sessions was approximately the same for each user. Despite the fact that the data is balanced, the recognition of the user based on typing dynamics could lead to an imbalanced classification task, for example in case if binary classifiers are used according to the one-vs-rest schema.

  2. 2.

    http://biointelligence.hu/typing-challenge/.

  3. 3.

    With random guessing we mean a naive classifier that works as follows: for each typing pattern x of the test data, is selects one of the users randomly (each user has an equal probability to be selected), and this randomly selected user, denoted as \(y_x^{(rnd)}\), is the prediction of the classifier. That is: according to the “guess” of this naive classifier, the typing pattern x belongs to the randomly selected user \(y_x^{(rnd)}\). As there are 12 users in our dataset, with a probability of 1 / 12 the randomly selected user will match the true user associated with the typing pattern, therefore, the accuracy of random guessing is 1 / 12.

References

  1. Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)

    Article  Google Scholar 

  2. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  3. Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI 2015. LNCS (LNAI), vol. 9330, pp. 598–605. Springer, Cham (2015). doi:10.1007/978-3-319-24306-1_58

    Chapter  Google Scholar 

  4. Buza, K., Neubrandt, D.: How you type is who you are. In: 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 453–456 (2016)

    Google Scholar 

  5. Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M.: Data evolution method in the procedure of user authentication using keystroke dynamics. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9875, pp. 379–387. Springer, Cham (2016). doi:10.1007/978-3-319-45243-2_35

    Chapter  Google Scholar 

  6. Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: Proceedings of the 18th International Conference on World Wide Web, pp. 171–180 (2009)

    Google Scholar 

  7. Wong, F., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: 35th IEEE Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911–915 (2001)

    Google Scholar 

  8. Nanopoulos, A., Alcock, R., Manolopoulos, Y.: Feature-based classification of time-series data. Int. J. Comput. Res. 10(3), 49–61 (2001)

    Google Scholar 

  9. Kim, S., Smyth, P., Luther, S.: Modeling waveform shapes with random effects segmental hidden Markov models. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 309–316 (2004)

    Google Scholar 

  10. Wozniak, M., Jackowski, K.: Fusers based on classifier response and discriminant function – comparative study. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS (LNAI), vol. 5271, pp. 361–368. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87656-4_45

    Chapter  Google Scholar 

  11. Krawczyk, B., Minku, L.L., Gama, J., Stefanowski, J., Woźniak, M.: Ensemble learning for data stream analysis: a survey. Inf. Fusion 37, 132–156 (2017)

    Article  Google Scholar 

  12. Buza, K., Nanopoulos, A., Horváth, T., Schmidt-Thieme, L.: GRAMOFON: general model-selection framework based on networks. Neurocomputing 75(1), 163–170 (2012)

    Article  Google Scholar 

  13. Buza, K.: Fusion Methods for Time-Series Classification. Peter Lang Verlag (2011)

    Google Scholar 

  14. Krawczyk, B.: Learning from imbalanced data: open challenges and future directions. Prog. Artif. Intell. 5(4), 221–232 (2016)

    Article  Google Scholar 

  15. Saez, J.A., Krawczyk, B., Wozniak, M.: Analyzing the oversampling of different classes and types of examples in multi-class imbalanced datasets. Pattern Recogn. 57, 164–178 (2016)

    Article  Google Scholar 

  16. Ramírez-Gallego, S., Krawczyk, B., García, S., Woźniak, M., Herrera, F.: A survey on data preprocessing for data stream mining: current status and future directions. Neurocomputing 239, 39–57 (2017)

    Google Scholar 

  17. Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.A.: Fast time series classification using numerosity reduction. In: Proceedings of the 23rd ACM International Conference on Machine Learning, pp. 1033–1040 (2006)

    Google Scholar 

  18. Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., Keogh, E.: Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endowment 1(2), 1542–1552 (2008)

    Article  Google Scholar 

  19. Chen, G.H., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Adv. Neural Inf. Proc. Syst. 26, 1088–1096 (2013)

    Google Scholar 

  20. Devroye, L., Györfi, L., Lugosi, G.: A Probabilistic Theory of Pattern Recognition. Springer, New York (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krisztian Buza .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Buza, K., Kis, P.B. (2018). Towards Privacy-Aware Keyboards. In: Kurzynski, M., Wozniak, M., Burduk, R. (eds) Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017. CORES 2017. Advances in Intelligent Systems and Computing, vol 578. Springer, Cham. https://doi.org/10.1007/978-3-319-59162-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59162-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59161-2

  • Online ISBN: 978-3-319-59162-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics