Reference Hub11
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text

On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text

Dieter Bartmann, Idir Bakdi, Michael Achatz
Copyright: © 2007 |Volume: 1 |Issue: 2 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203307|EISSN: 1930-1669|DOI: 10.4018/jisp.2007040101
Cite Article Cite Article

MLA

Bartmann, Dieter, et al. "On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text." IJISP vol.1, no.2 2007: pp.1-12. http://doi.org/10.4018/jisp.2007040101

APA

Bartmann, D., Bakdi, I., & Achatz, M. (2007). On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. International Journal of Information Security and Privacy (IJISP), 1(2), 1-12. http://doi.org/10.4018/jisp.2007040101

Chicago

Bartmann, Dieter, Idir Bakdi, and Michael Achatz. "On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text," International Journal of Information Security and Privacy (IJISP) 1, no.2: 1-12. http://doi.org/10.4018/jisp.2007040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The design of an authentication system based on keystroke dynamics is made difficult by the fact that the typing behaviour of a person is subject to strong fluctuations. An asymmetrical method able to handle this difficulty by using a long text on enrolment and a short one at login is analysed in this article. The results of an empirical study based on an extensive field test are presented. The study demonstrates that the advantages of the analysed method remain even if a predefined input text is used. The results also show that the method’s quality highly depends on the amount of text typed on enrolment as well as on login, which makes the system scalable to different security levels. They also confirm the importance of using stable characteristics that are due, for example, to the user’s right- or left-handedness. The method’s learning velocity is shown to be high, which enables enrolment to be kept short. Moreover, the study demonstrates that admitting multiple login attempts significantly ameliorates the recognition performance without sacrificing security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.