Abstract
The extensive use of computers has necessitated a new paradigm, in which computers are not only the major channel for dealing with day-to-day financial, industrial, and individual duties, but also the need to establish effective user identification for authentication reasons. Based on this fact, behavioral biometrics, such as typing, can be used for authentication to be subtle, unlike most biometrics.
In this paper, to verify the identity, an adaptive neuro-fuzzy inference system (ANFIS) is employed to model musculoskeletal system from the eye to the fingers in the typing process, as well as to model the control process of typing behavior. Model predictive control (MPC) is used to model the control process in order to get the best results. The improved distance evaluation (IDE) feature selection technique is utilized to minimize feature dimensions, and data fusion is conducted at the feature level. Besides, the Support Vector Machine (SVM) classifier is applied to authenticate selected features. Moreover, this algorithm is tested on a dataset of 35 users, providing accuracy with an Arithmetic mean of 99.65.








Similar content being viewed by others
Data Availability
All data generated or analysed during this study are included in this published article [and its supplementary information files].
Code Availability
‘Not applicable’.
References
Salem, A., & Obaidat, M. S. (2019). A novel security scheme for behavioral authentication systems based on keystroke dynamics. Security and Privacy, 2(2), e64. https://doi.org/10.1002/spy2.64
Monaro, M., Galante, C., Spolaor, R., Li, Q. Q., Gamberini, L., Conti, M., & Sartori, G. (2018). Covert lie detection using keyboard dynamics. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-20462-6
ÇEKER, H. (2017). Keystroke dynamics for enhanced user recognition in active authentication
Dwivedi, C., Kalra, D., Naidu, D., & Aggarwal, S. (2018). Keystroke dynamics based biometric authentication: A hybrid classifier approach. 2018 IEEE Symposium Series on Computational Intelligence (SSCI). Published. https://doi.org/10.1109/ssci.2018.8628852
Alshanketi, F., Traore, I., & Ahmed, A. A. (2016). Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. 2016 IEEE Security and Privacy Workshops (SPW). Published. https://doi.org/10.1109/spw.2016.12
Xiaofeng, L., Shengfei, Z., & Shengwei, Y. (2019). Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Computer Science, 147, 314–318. https://doi.org/10.1016/j.procs.2019.01.270
Lee, H., Hwang, J. Y., Lee, S., Kim, D. I., Lee, S. H., Lee, J., & Shin, J. S. (2019). A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones. Pervasive and Mobile Computing, 54, 45–57. https://doi.org/10.1016/j.pmcj.2019.02.001
Joyce, R., & Gupta, G. (1990). Identity authentication based on keystroke latencies. Communications of the ACM, 33(2), 168–176. https://doi.org/10.1145/75577.75582
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5(4), 367–397. https://doi.org/10.1145/581271.581272
Campisi, P., Maiorana, E., lo, Bosco, M., & Neri, A. (2009). User authentication using keystroke dynamics for cellular phones. IET Signal Processing, 3(4), 333. https://doi.org/10.1049/iet-spr.2008.0171
Peacock, A., Xian Ke, & Wilkerson, M. (2004). Typing patterns: a key to user identification. IEEE Security & Privacy Magazine, 2(5), 40–47. https://doi.org/10.1109/msp.2004.89
Araujo, L., Sucupira, L., Lizarraga, M., Ling, L., & Yabu-Uti, J. (2005). User authentication through typing biometrics features. IEEE Transactions on Signal Processing, 53(2), 851–855. https://doi.org/10.1109/tsp.2004.839903
Sheng, Y., Phoha, V., & Rovnyak, S. (2005). A Parallel Decision Tree-Based Method for User Authentication Based on Keystroke Patterns. IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics), 35(4), 826–833. https://doi.org/10.1109/tsmcb.2005.846648
Lee, H. J., & Cho, S. (2007). Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers & Security, 26(4), 300–310. https://doi.org/10.1016/j.cose.2006.11.006
Alsultan, A., Warwick, K., & Wei, H. (2017). Non-conventional keystroke dynamics for user authentication. Pattern Recognition Letters, 89, 53–59. https://doi.org/10.1016/j.patrec.2017.02.010
Kim, J., & Kang, P. (2020). Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recognition, 108, 107556. https://doi.org/10.1016/j.patcog.2020.107556
Choi, M., Lee, S., Jo, M., & Shin, J. S. (2021). Keystroke Dynamics-Based Authentication Using Unique Keypad. Sensors (Basel, Switzerland), 21(6), 2242. https://doi.org/10.3390/s21062242
Kiyani, A. T., Lasebae, A., Ali, K., Rehman, M. U., & Haq, B. (2020). Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach. Ieee Access : Practical Innovations, Open Solutions, 8, 156177–156189. https://doi.org/10.1109/access.2020.3019467
Porwik, P., Doroz, R., & Wesolowski, T. E. (2021). Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Applied Soft Computing, 99, 106902. https://doi.org/10.1016/j.asoc.2020.106902
Saini, B. S., Singh, P., Nayyar, A., Kaur, N., Bhatia, K. S., El-Sappagh, S., & Hu, J. W. (2020). A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics. Ieee Access : Practical Innovations, Open Solutions, 8, 125909–125922. https://doi.org/10.1109/access.2020.3008019
Popovici, E. C., Guta, O. G., Stancu, L. A., Arseni, S. C., & Fratu, O. (2013). MLP neural network for keystroke-based user identification system. 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS). Published. https://doi.org/10.1109/telsks.2013.6704912
Pleva, M., Bours, P., Ondáš, S., & Juhár, J. (2017). Improving static audio keystroke analysis by score fusion of acoustic and timing data.Multimedia Tools and Applications, 76(24),25749–25766. https://doi.org/10.1007/s11042-017-4571-7
Umphress, D., & Williams, G. (1985). Identity verification through keyboard characteristics. International Journal of Man-Machine Studies, 23(3), 263–273. https://doi.org/10.1016/s0020-7373(85)80036-5
Yang, L., Li, C., You, R., Tu, B., & Li, L. (2021). TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Cybersecurity, 4(1), https://doi.org/10.1186/s42400-021-00075-9
Li, J., Chang, H. C., & Stamp, M. (2021). Free-Text Keystroke Dynamics for User Authentication. arXiv preprint arXiv:2107.07009
Kandel, E. R., Schwartz, J. H., & Jessell, T. M. (2000). Principles of Neural Science (4th ed.). McGraw-Hill Medical
Guyton, A. C. (2000). Medical Physiology: 10th (tenth) Edition (10th ed.). Elsevier Health Sciences
Towhidkhah, F., Gander, R. E., & Wood, H. C. (1997). Model Predictive Impedance Control: A Model for Joint Movement. Journal of Motor Behavior, 29(3), 209–222. https://doi.org/10.1080/00222899709600836
Cutler, C. R., & Ramaker, B. L. (1979). Dynamic matrix control¿A computer control algorithm. IEEE Transactions on Automatic Control, 17, 72
Nippert, C. (2002). Simple Modules That Illustrate Dynamic Matrix Control. 2002 Annual Conference Proceedings, 7.998.1-7.998.8. https://doi.org/10.18260/1-2-11091
Camacho, E. F., & Alba, C. B. (2007). Model Predictive Control. Springer Publishing
Iino, Y., & Shigemasa, T. (1997). Model Predictive Control with Multi-Objective Cost Function considering Stabilization and Linear Cost Optimization. IFAC Proceedings Volumes, 30(9), 547–552. https://doi.org/10.1016/s1474-6670(17)43206-x
Hair, J., Hult, T. G. M., Ringle, C. M., & Sarstedt, M. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (1st ed.). SAGE Publications, Inc
Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155
SMI RED-m (2021, February 18). Imotions. https://imotions.com/hardware/smi-red-m/
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879
Mongi, A., A. R. G. C (2014). Data Fusion in Robotics & Machine Intelligence. Not Avail
Kassem, Y., ÇAmur, H., & Esenel, E. (2017). Adaptive neuro-fuzzy inference system (ANFIS) and response surface methodology (RSM) prediction of biodiesel dynamic viscosity at 313 K. Procedia Computer Science, 120, 521–528. https://doi.org/10.1016/j.procs.2017.11.274
Banakar, A., Sadeghi, M., & Shushtari, A. (2016). An intelligent device for diagnosing avian diseases: Newcastle, infectious bronchitis, avian influenza. Computers and Electronics in Agriculture, 127, 744–753. https://doi.org/10.1016/j.compag.2016.08.006
http://cepac.cheme.cmu.edu/pasilectures/lee/LecturenoteonMPC-JHL.pdf
https://www.researchgate.net/file.PostFileLoader.html?id=54f563e4d2fd64881d8b457f&assetKey=AS%3A273722072600604%401442271835999
Acknowledgements
We thank Hamed Ghatei Khiabani Azar for his sincere assistance and support.
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by [Hajar Kavusi], [Keivan Maghooli] and [Siamak Haghipour]. The first draft of the manuscript was written by [Hajar Kavusi] and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
“Not applicable”.
Consent for publication
“Not applicable”.
Conflicts of interest/Competing interests
“The authors declare that they have no competing interests”.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Electronic supplementary material
Below is the link to the electronic supplementary material.
Appendix
Appendix
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kavusi, H., Maghooli, K. & Haghipour, S. A novel algorithm to model the neuromuscular system from the eye to fingers to authenticate individuals through a typing process. Electron Commer Res 25, 683–704 (2025). https://doi.org/10.1007/s10660-022-09594-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-022-09594-0