Abstract
Personal identification has lately become a very important issue in the still evolving network society. Biometrics identification methods proved to be very efficient, more natural and easy for users than traditional methods of human identification. Hereby we discuss the idea of human identification based on keystroke dynamics. In the article we focus on our methods of feature extraction from the typing patterns. Moreover, we present satisfactory experimental results and possible applications of keystroke biometrics.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Monrose, F., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems 16(4), 351–359 (2000)
Obaidat, M.S., Sadoun, B.: Keystroke Dynamics Based Authentication. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics: Personal Identification in Networked Society (1998)
Obaidat, M.S., Sadoun, B.: Verification of Computer Users Using KEystroke Dynamics. IEEE Trans. Syst., Man, Cybern. -Part B 24(2), 261–269 (1997)
Leggett, G., Williams, J., Usnick, M.: Dynamic Identity Verification via Keystroke Characteristics. International Journal of Man-Machine Studies 35(6), 859–870 (1991)
Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: some preliminary results. Rand Report R-256-NSF. Rand Corporation (1980)
Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Conference on Computer and Communications Security, pp. 48–56 (1997)
Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Communications of ACM 33(2), 168–176 (1990)
Bleha, S., Slivinsky, C., Hussein, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. on Patt. Anal. Mach. Int. 12(12), 1217–1222 (1990)
Brown, M., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies 39, 999–1014 (1993)
Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2002)
Brown, M., Rogers, S.J.: Method and apparatus for verification of a computer user’s identification, based on keystroke characteristics. Patent Number 5,557,686, U.S. Patent and Trademark Office, Washington, D.C. (Sept. 1996)
Yu, E., Cho, S.: Biometrics-based Password Identity Verification: Some Practical Issues and Solutions. In: XVth Triennial Congress of the International Ergonomics Association (IEA), Seoul, Korea, Aug. 24-29 (2003)
Tapiador, M., Sigüenza, J.A.: Fuzzy Keystroke Biometrics On Web Security. In: Proc. of AutoID (1999)
Jain, A.K., Hong, L., Pankanti, S.: Biometrics identification. Communications of the ACM 43(2) (2000)
Schneier, B.: Inside risks: the uses and abuses of biometrics. Communications of the ACM 42(8) (1999)
Mroczkowski, P., Choraś, M.: Keystroke Dynamics in Biometrics Client-Server Password Hardening System. In: Proc. of Advanced Computer Systems (ACS), vol. II, Miedzyzdroje, Poland, October 2006, pp. 75–82 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Choraś, M., Mroczkowski, P. (2007). Keystroke Dynamics for Biometrics Identification. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds) Adaptive and Natural Computing Algorithms. ICANNGA 2007. Lecture Notes in Computer Science, vol 4432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71629-7_48
Download citation
DOI: https://doi.org/10.1007/978-3-540-71629-7_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71590-0
Online ISBN: 978-3-540-71629-7
eBook Packages: Computer ScienceComputer Science (R0)