Skip to main content

Advertisement

Log in

A novel algorithm to model the neuromuscular system from the eye to fingers to authenticate individuals through a typing process

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

The extensive use of computers has necessitated a new paradigm, in which computers are not only the major channel for dealing with day-to-day financial, industrial, and individual duties, but also the need to establish effective user identification for authentication reasons. Based on this fact, behavioral biometrics, such as typing, can be used for authentication to be subtle, unlike most biometrics.

In this paper, to verify the identity, an adaptive neuro-fuzzy inference system (ANFIS) is employed to model musculoskeletal system from the eye to the fingers in the typing process, as well as to model the control process of typing behavior. Model predictive control (MPC) is used to model the control process in order to get the best results. The improved distance evaluation (IDE) feature selection technique is utilized to minimize feature dimensions, and data fusion is conducted at the feature level. Besides, the Support Vector Machine (SVM) classifier is applied to authenticate selected features. Moreover, this algorithm is tested on a dataset of 35 users, providing accuracy with an Arithmetic mean of 99.65.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

All data generated or analysed during this study are included in this published article [and its supplementary information files].

Code Availability

‘Not applicable’.

References

  1. Salem, A., & Obaidat, M. S. (2019). A novel security scheme for behavioral authentication systems based on keystroke dynamics. Security and Privacy, 2(2), e64. https://doi.org/10.1002/spy2.64

    Article  Google Scholar 

  2. Monaro, M., Galante, C., Spolaor, R., Li, Q. Q., Gamberini, L., Conti, M., & Sartori, G. (2018). Covert lie detection using keyboard dynamics. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-20462-6

  3. ÇEKER, H. (2017). Keystroke dynamics for enhanced user recognition in active authentication

  4. Dwivedi, C., Kalra, D., Naidu, D., & Aggarwal, S. (2018). Keystroke dynamics based biometric authentication: A hybrid classifier approach. 2018 IEEE Symposium Series on Computational Intelligence (SSCI). Published. https://doi.org/10.1109/ssci.2018.8628852

  5. Alshanketi, F., Traore, I., & Ahmed, A. A. (2016). Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. 2016 IEEE Security and Privacy Workshops (SPW). Published. https://doi.org/10.1109/spw.2016.12

  6. Xiaofeng, L., Shengfei, Z., & Shengwei, Y. (2019). Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Computer Science, 147, 314–318. https://doi.org/10.1016/j.procs.2019.01.270

    Article  Google Scholar 

  7. Lee, H., Hwang, J. Y., Lee, S., Kim, D. I., Lee, S. H., Lee, J., & Shin, J. S. (2019). A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive and Mobile Computing, 54, 45–57. https://doi.org/10.1016/j.pmcj.2019.02.001

    Article  Google Scholar 

  8. https://civilica.com/doc/654963/

  9. Joyce, R., & Gupta, G. (1990). Identity authentication based on keystroke latencies. Communications of the ACM, 33(2), 168–176. https://doi.org/10.1145/75577.75582

    Article  Google Scholar 

  10. Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5(4), 367–397. https://doi.org/10.1145/581271.581272

    Article  Google Scholar 

  11. Campisi, P., Maiorana, E., lo, Bosco, M., & Neri, A. (2009). User authentication using keystroke dynamics for cellular phones. IET Signal Processing, 3(4), 333. https://doi.org/10.1049/iet-spr.2008.0171

  12. Peacock, A., Xian Ke, & Wilkerson, M. (2004). Typing patterns: a key to user identification. IEEE Security & Privacy Magazine, 2(5), 40–47. https://doi.org/10.1109/msp.2004.89

    Article  Google Scholar 

  13. Araujo, L., Sucupira, L., Lizarraga, M., Ling, L., & Yabu-Uti, J. (2005). User authentication through typing biometrics features. IEEE Transactions on Signal Processing, 53(2), 851–855. https://doi.org/10.1109/tsp.2004.839903

    Article  Google Scholar 

  14. Sheng, Y., Phoha, V., & Rovnyak, S. (2005). A Parallel Decision Tree-Based Method for User Authentication Based on Keystroke Patterns. IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics), 35(4), 826–833. https://doi.org/10.1109/tsmcb.2005.846648

    Article  Google Scholar 

  15. Lee, H. J., & Cho, S. (2007). Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers & Security, 26(4), 300–310. https://doi.org/10.1016/j.cose.2006.11.006

    Article  Google Scholar 

  16. Alsultan, A., Warwick, K., & Wei, H. (2017). Non-conventional keystroke dynamics for user authentication. Pattern Recognition Letters, 89, 53–59. https://doi.org/10.1016/j.patrec.2017.02.010

    Article  Google Scholar 

  17. Kim, J., & Kang, P. (2020). Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recognition, 108, 107556. https://doi.org/10.1016/j.patcog.2020.107556

    Article  Google Scholar 

  18. Choi, M., Lee, S., Jo, M., & Shin, J. S. (2021). Keystroke Dynamics-Based Authentication Using Unique Keypad. Sensors (Basel, Switzerland), 21(6), 2242. https://doi.org/10.3390/s21062242

    Article  Google Scholar 

  19. Kiyani, A. T., Lasebae, A., Ali, K., Rehman, M. U., & Haq, B. (2020). Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach. Ieee Access : Practical Innovations, Open Solutions, 8, 156177–156189. https://doi.org/10.1109/access.2020.3019467

    Article  Google Scholar 

  20. Porwik, P., Doroz, R., & Wesolowski, T. E. (2021). Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Applied Soft Computing, 99, 106902. https://doi.org/10.1016/j.asoc.2020.106902

    Article  Google Scholar 

  21. Saini, B. S., Singh, P., Nayyar, A., Kaur, N., Bhatia, K. S., El-Sappagh, S., & Hu, J. W. (2020). A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics. Ieee Access : Practical Innovations, Open Solutions, 8, 125909–125922. https://doi.org/10.1109/access.2020.3008019

    Article  Google Scholar 

  22. Popovici, E. C., Guta, O. G., Stancu, L. A., Arseni, S. C., & Fratu, O. (2013). MLP neural network for keystroke-based user identification system. 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS). Published. https://doi.org/10.1109/telsks.2013.6704912

  23. Pleva, M., Bours, P., Ondáš, S., & Juhár, J. (2017). Improving static audio keystroke analysis by score fusion of acoustic and timing data.Multimedia Tools and Applications, 76(24),25749–25766. https://doi.org/10.1007/s11042-017-4571-7

  24. Umphress, D., & Williams, G. (1985). Identity verification through keyboard characteristics. International Journal of Man-Machine Studies, 23(3), 263–273. https://doi.org/10.1016/s0020-7373(85)80036-5

    Article  Google Scholar 

  25. Yang, L., Li, C., You, R., Tu, B., & Li, L. (2021). TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Cybersecurity, 4(1), https://doi.org/10.1186/s42400-021-00075-9

  26. Li, J., Chang, H. C., & Stamp, M. (2021). Free-Text Keystroke Dynamics for User Authentication. arXiv preprint arXiv:2107.07009

  27. Kandel, E. R., Schwartz, J. H., & Jessell, T. M. (2000). Principles of Neural Science (4th ed.). McGraw-Hill Medical

  28. Guyton, A. C. (2000). Medical Physiology: 10th (tenth) Edition (10th ed.). Elsevier Health Sciences

  29. https://doi.org/10.22041/ijbme.2010.13332

  30. Towhidkhah, F., Gander, R. E., & Wood, H. C. (1997). Model Predictive Impedance Control: A Model for Joint Movement. Journal of Motor Behavior, 29(3), 209–222. https://doi.org/10.1080/00222899709600836

    Article  Google Scholar 

  31. Cutler, C. R., & Ramaker, B. L. (1979). Dynamic matrix control¿A computer control algorithm. IEEE Transactions on Automatic Control, 17, 72

    Google Scholar 

  32. Nippert, C. (2002). Simple Modules That Illustrate Dynamic Matrix Control. 2002 Annual Conference Proceedings, 7.998.1-7.998.8. https://doi.org/10.18260/1-2-11091

  33. Camacho, E. F., & Alba, C. B. (2007). Model Predictive Control. Springer Publishing

  34. Iino, Y., & Shigemasa, T. (1997). Model Predictive Control with Multi-Objective Cost Function considering Stabilization and Linear Cost Optimization. IFAC Proceedings Volumes, 30(9), 547–552. https://doi.org/10.1016/s1474-6670(17)43206-x

  35. Hair, J., Hult, T. G. M., Ringle, C. M., & Sarstedt, M. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (1st ed.). SAGE Publications, Inc

  36. Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155

    Article  Google Scholar 

  37. SMI RED-m (2021, February 18). Imotions. https://imotions.com/hardware/smi-red-m/

  38. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879

    Article  Google Scholar 

  39. Mongi, A., A. R. G. C (2014). Data Fusion in Robotics & Machine Intelligence. Not Avail

  40. Kassem, Y., ÇAmur, H., & Esenel, E. (2017). Adaptive neuro-fuzzy inference system (ANFIS) and response surface methodology (RSM) prediction of biodiesel dynamic viscosity at 313 K. Procedia Computer Science, 120, 521–528. https://doi.org/10.1016/j.procs.2017.11.274

    Article  Google Scholar 

  41. Banakar, A., Sadeghi, M., & Shushtari, A. (2016). An intelligent device for diagnosing avian diseases: Newcastle, infectious bronchitis, avian influenza. Computers and Electronics in Agriculture, 127, 744–753. https://doi.org/10.1016/j.compag.2016.08.006

    Article  Google Scholar 

  42. http://cepac.cheme.cmu.edu/pasilectures/lee/LecturenoteonMPC-JHL.pdf

  43. https://www.researchgate.net/file.PostFileLoader.html?id=54f563e4d2fd64881d8b457f&assetKey=AS%3A273722072600604%401442271835999

Download references

Acknowledgements

We thank Hamed Ghatei Khiabani Azar for his sincere assistance and support.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by [Hajar Kavusi], [Keivan Maghooli] and [Siamak Haghipour]. The first draft of the manuscript was written by [Hajar Kavusi] and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Keivan Maghooli.

Ethics declarations

Ethics approval and consent to participate

“Not applicable”.

Consent for publication

“Not applicable”.

Conflicts of interest/Competing interests

“The authors declare that they have no competing interests”.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary Material 1

Supplementary Material 2

Appendix

Appendix

Table 3 Minimum sample size for statistical power 80% [36]

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kavusi, H., Maghooli, K. & Haghipour, S. A novel algorithm to model the neuromuscular system from the eye to fingers to authenticate individuals through a typing process. Electron Commer Res 25, 683–704 (2025). https://doi.org/10.1007/s10660-022-09594-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-022-09594-0

Keywords