Skip to main content

Biometric Keystroke Signal Preprocessing Part II: Manipulation

  • Conference paper
  • First Online:
Advances in Artificial Intelligence: From Theory to Practice (IEA/AIE 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10350))

Abstract

Biometric keystroke authentication methods deal with extracting the key-press times to validate the users considering the uniqueness of password entering style. When the proposed algorithms have no sub-system to check the password itself, the keystroke signal should include the key-codes for better discrimination. On the contrary, if the key-codes are already validated, the signal could be irreversibly manipulated to form a new and unique signal. In general, the key-press and inter-key times are directly used as array, subsequent to extraction without any process. Therefore in this paper we propose several techniques for preprocessing the keystroke signal. The main methods we dealt with are binarization, over-quantization and spectrogram conversion. As a result of these conversions, the new signals somehow exhibit same property and tendency of the original signal, while revealing the hidden features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, CCNC 2009 (2009)

    Google Scholar 

  2. Zhong, Y., Deng, Y., Jain, A.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012)

    Google Scholar 

  3. Ahmed, A.A.E., Traore, I., Almulhem, A.: Digital fingerprinting based on keystroke dynamics. In: Second International Symposium on Human Aspects of Information Security & Assurance (2008)

    Google Scholar 

  4. Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)

    Article  Google Scholar 

  5. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. 9(6), 542–554 (2014). doi:10.1002/sec.1061

    Article  Google Scholar 

  6. Buschek, D., De Luca, D., Alt, F.: Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)

    Google Scholar 

  7. Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst. Appl. 42(17), 6286–6294 (2015)

    Article  Google Scholar 

  8. Alpar, O., Krejcar, O.: Pattern password authentication based on touching location. In: Jackowski, K., Burduk, R., Walkowiak, K., Woźniak, M., Yin, H. (eds.) IDEAL 2015. LNCS, vol. 9375, pp. 395–403. Springer, Cham (2015). doi:10.1007/978-3-319-24834-9_46

    Chapter  Google Scholar 

  9. Alpar, O., Krejcar, O.: Biometric swiping on touchscreens. In: Saeed, K., Homenda, W. (eds.) CISIM 2015. LNCS, vol. 9339, pp. 193–203. Springer, Cham (2015). doi:10.1007/978-3-319-24369-6_16

    Chapter  Google Scholar 

  10. Alpar, O.: Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl. Based Syst. 116, 163–171 (2017)

    Article  Google Scholar 

  11. Alpar, O.: Keystroke recognition in user authentication using ANN based RGB histogram technique. Eng. Appl. Artif. Intell. 32, 213–217 (2014)

    Article  Google Scholar 

Download references

Acknowledgement

This work and the contribution were supported by project “SP/2017 – 2102 Smart Solutions for Ubiquitous Computing Environments” from University of Hradec Kralove.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ondrej Krejcar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Alpar, O., Krejcar, O. (2017). Biometric Keystroke Signal Preprocessing Part II: Manipulation. In: Benferhat, S., Tabia, K., Ali, M. (eds) Advances in Artificial Intelligence: From Theory to Practice. IEA/AIE 2017. Lecture Notes in Computer Science(), vol 10350. Springer, Cham. https://doi.org/10.1007/978-3-319-60042-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60042-0_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60041-3

  • Online ISBN: 978-3-319-60042-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics