Skip to main content
Log in

Biometric re-authentication: an approach towards achieving transparency in user authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Providing fixed re-authentication attempts to the user in case of password mismatch is a very old concept. But as password based authentication mechanisms are prone to many security attacks, user’s biometric properties along with passwords are highly in use for user authentication these days. It will be more secure and convenient if re-authentication influenced by the biometric behavior of the user is applied in the authentication system. It is a challenging task to identify a genuine user using behavioral biometric due to its low repeatability and wide variation. So, to increase the efficiency and robustness of the authentication system in case of score mismatch, the clustering of user’s behavior and assigning different re-authentication attempt to different cluster is needed. In this paper, we have proposed a transparent fixed text, keystroke based user authentication framework, which will enhance the security of traditional password based authentication mechanism. A new classification algorithm and dynamic attempt allocation algorithm have been proposed which will make the authentication system smart enough to provide the genuine user a fare authentication attempt.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahmed A, Traore I (2007) A new biometric technology based on mouse dynamics. IEEE Trans Dependable Secure Comput 4:165e79

    Article  Google Scholar 

  2. Azevedo GLFBG, Cavalcanti GDC, Edson CB, Filho C (2007) An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In: Evolutionary Computation, 2007. CEC IEEE Congress on, pp 3577-3584. IEEE

  3. Balagani KS, Phoha VIRV, Ray A, Phoha S (2011) On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recogn Lett 32(7):1070–1080

    Article  Google Scholar 

  4. Bhattacharyya D, Ranjan R, Alisherov F, Choi M (2009) Biometric authentic: a review. Int J Serv Sci Technol 2:13e28

    Google Scholar 

  5. Chandrasekar V, Suresh Kumar S, Maheswari T (2016) Authentication based on keystroke dynamics using stochastic diffusion algorithm. Stoch Anal Appl 34(1):155–164

    Article  MathSciNet  Google Scholar 

  6. Cho S, Hwang S (2006) Artificial rhythms and cues for keystroke dynamics based authentication. In: International conference on biometrics. Springer, Berlin, pp 626–632

    Chapter  Google Scholar 

  7. Danielsson P-E (1980) Euclidean distance mapping. Comput Graphics Image Process 14(3):227–248

    Article  Google Scholar 

  8. Davoudi H, Kabir E (2009) A new distance measure for free text keystroke authentication. In: Computer Conference CSICC 2009. 14th International CSI, pp. 570–575. IEEE

  9. Garcia JD (1986) Personal identification apparatus. U.S. Patent 4,621,334 issued November 4

  10. Giot R, El-Abed M, Hemery B, Rosenberger C (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Secur 30(6):427–445

    Article  Google Scholar 

  11. Gong L, Pan J, Liu B, Zhao S (2013) A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords. J Comput Syst Sci 79(1):122–130

    Article  MathSciNet  Google Scholar 

  12. Hartigan JA, Wong MA (1979) Algorithm AS 136: A k-means clustering algorithm. J R Stat Soc Ser C Appl Stat 28(1):100–108

    MATH  Google Scholar 

  13. Hempstalk K, Frank E, Witten IH (2008) One-class classification by combining density and class probability estimation. In: Joint european conference on machine learning and knowledge discovery in databases. Springer, Berlin, pp 505–519

  14. Ho J, Kang D-K (2018) One-class nave Bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl Intell 48(6):1547–1564

    Article  Google Scholar 

  15. Hocquet S, Ramel J-Y, Cardot H (2005) Fusion of methods for keystroke dynamic authentication. In: IEEE workshop on automatic identification advanced technologies 4th, pp 224-229. IEEE

  16. Hocquet S, Ramel J-Y, Cardot H (2007) User classification for keystroke dynamics authentication. Advances in biometrics, pp 531–539

  17. Hong L, Jain AK (1998) Integrating faces and fingerprints for personal identification. IEEE Trans Pattern Anal Mach Intell 20(12):1295–1307

    Article  Google Scholar 

  18. Huang Y, Huang Z, Zhao H, Lai X (2013) A new one-time password method. IERI Procedia 4:32–37

    Article  Google Scholar 

  19. Im S, Park H, Kim Y, Han S, Kim S, Kang C, Chung C (2001) A biometric identification system by extracting hand vein patterns, journal of the korean physical society. Korean Publ 38(3):268–272

    Google Scholar 

  20. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Article  Google Scholar 

  21. Koakowska A (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Human-Computer Systems Interaction. Springer, Cham, pp 42–52

  22. Kukula E, Elliott S (2001) Implementation of Hand Geometry at Purdue University’s Recreational Center: An Analysis of User Perspectives and System Performance. In: Proc. of 35th annual international carnahan conference on security technology, UK, pp 83–88

  23. Kumar A, Wong DC, Shen HC, Jain AK (2003) Personal Verification using Palmprint and Hand Geometry Biometric. In: Proc. of 4th international conference on audio- and video-based biometric person authentication, Guildford, UK, pp 668–678

  24. Lee N-Y, Chiu Y-C (2005) Improved remote authentication scheme with smart card. Computer Standards and Interfaces 27(2):177–180

    Article  Google Scholar 

  25. Liew K-M, Shen H, See S, Cai W, Fan P, Horiguchi S (eds) (2004) Parallel and distributed computing: Applications and technologies: 5th international conference, PDCAT 2004, vol 3320. Springer, Singapore. Proceedings

    Google Scholar 

  26. Marcolin F, Vezzetti E (2017) Novel descriptors for geometrical 3D face analysis. Multimed Tools Appl 76(12):13805–13834

    Article  Google Scholar 

  27. Mariño C, Penedo MG, Penas M, Carreira MJ, Gonzalez F (2006) Personal authentication using digital retinal images. Pattern Anal Applic 9(1):21

    Article  MathSciNet  Google Scholar 

  28. Matsumoto T, Hoshino H, Yamada K, Hasino S (2002) Impact of artificial gummy fingers on fingerprint systems. In Proc SPIE 4677:275–289

    Article  Google Scholar 

  29. Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Futur Gener Comput Syst 16(4):351–359

    Article  Google Scholar 

  30. Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Secur Priv 99(2):33–42

    Article  Google Scholar 

  31. Prakash M, Viju P, Infant A, Shobana J (2010) Eliminating vulnerable attacks using one time password and passtext analytical study of blended schema. Universal J Comput Sci Eng Technol 1(2):133–140

    Google Scholar 

  32. Revett K (2009) A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control Autom Syst 7(1):7–15

    Article  Google Scholar 

  33. Rybnik M, Tabedzki M, Saeed K (2008) A keystroke dynamics based system for user identification. In: Computer information systems and industrial management applications CISIM’08. 7th, pp 225–230. IEEE

  34. Sanchez-Reillo R, Sanchez-Avila C, Gonzales-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22(10):1168–1171

    Article  Google Scholar 

  35. Shen C, Guan X, Cai J (2010) A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring, pp 349e53 [IEEE International Conference on Information Theory and Information Security]

  36. Shimshon T, Moskovitch R, Rokach L, Elovici Y (2010) Clustering di-graphs for continuously verifying users according to their typing patterns. In: Electrical and Electronics Engineers in Israel (IEEEI) IEEE 26th Convention of, pp. 000445-000449. IEEE

  37. Singh S, Arya KV (2011) Key classification: a new approach in free text keystroke authentication system. In: 2011 3rd pacific-asia conference on circuits, communications and system (PACCS), pp 1–5. IEEE

  38. Song R (2010) Advanced smart card based password authentication protocol. Computer Standards and Interfaces 32(5):321–325

    Article  Google Scholar 

  39. Stockton GR, Lisowski W, Press JS, Shapiro N (1980) Authentication by keystroke timing: Stockton Some preliminary results. No. RAND-R-2526-NSF RAND CORP SANTA MONICA CA

  40. Vezzetti E, Marcolin F, Tornincasa S, Ulrich L, Dagnes N (2017) 3D geometry-based automatic landmark localization in presence of facial occlusions. Multimed Tools Appl 77:1–29

    Google Scholar 

  41. Visumathi J, Jayarin JP (2015) “C”. J Appl Secur Res 10(3):375–384

    Article  Google Scholar 

  42. Wan M, Lai Z, Yang G, Yang Z, Zhang F, Zheng H (2017) Local graph embedding based on maximum margin criterion via fuzzy set. Fuzzy Set Syst 318:120–131

    Article  MathSciNet  Google Scholar 

  43. Wan M, Li M, Yang G, Gai S, Jin Z (2014) Feature extraction using two-dimensional maximum embedding difference. Inform Sci 274:55–69

    Article  Google Scholar 

  44. Wan M, Yang G, Gai S, Yang Z (2017) Two-dimensional discriminant locality preserving projections (2DDLPP) and its application to feature extraction via fuzzy set. Multimed Tools Appl 76(1):355–371

    Article  Google Scholar 

  45. Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password Authentication scheme with provable security. Computer Standards and Interfaces 31 (4):723–728

    Article  Google Scholar 

  46. Yu E, Cho S (2003) Novelty detection approach for keystroke dynamics identity verification. In: International conference on intelligent data engineering and automated learning, pp 1016–1023. Springer, Berlin

    Chapter  Google Scholar 

  47. Zheng N, Paloski A, Wang H (2011) An efficient user verification system via mouse movements, pp 1e12 [ACM Conference on Computer and Communications Security]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neha, Chatterjee, K. Biometric re-authentication: an approach towards achieving transparency in user authentication. Multimed Tools Appl 78, 6679–6700 (2019). https://doi.org/10.1007/s11042-018-6448-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6448-9

Keywords

Navigation