Skip to main content

A Modified Algorithm for User Identification by His Typing on the Keyboard

  • Conference paper
Image Processing and Communications Challenges 2

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 84))

Summary

In this paper the authors modify their previous kNN algorithm and present a modification to improve the algorithm by considering key inner and interclass distinguishability. The suggested approach is tested on a large group of individuals with data gathered over Internet using browser-based WWW application. The obtained results are promising and encouraging for further development in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Spillane, R.J.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975)

    Google Scholar 

  2. Vacca, J.R.: Biometric Technologies and Verification Systems, p. 182. Elsevier, USA (2007)

    Google Scholar 

  3. Coppenrath, L.F., & Associates: 5 (2001), http://lfca.net/Reference20Documents/Biometric20Technology20Overview.pdf (State from June 15, 2010)

  4. Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Prelimary Results. Rand Rep. R-2560-NSF, Rand Corp. (1980)

    Google Scholar 

  5. Leggett, J., Williams, G., Umphress, D.: Verifying Identity via Keystroke Characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)

    Article  Google Scholar 

  6. Leggett, J., Williams, G.: Verification of User Identity via Keystroke Characteristics. Human Factors in Management Information Systems, 89

    Google Scholar 

  7. Hussien, B., McLaren, R., Bleha, S.: An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9, 39–43 (1989)

    Article  Google Scholar 

  8. Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. on Systems Man and Cybernetics, Part B 27(2), 261–269 (1997)

    Article  Google Scholar 

  9. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2004)

    Article  Google Scholar 

  10. Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification using the ARTMAP-FD Neural Network. Intelligent Information Hiding and Multimedia Signal Processing 1, 61–64 (2007)

    Google Scholar 

  11. Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 1078–1079 (2009)

    Google Scholar 

  12. Rybnik, M., Tabedzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Computer Information Systems and Industrial Management Applications - CISIM, pp. 225–230. IEEE, Los Alamitos (2008)

    Chapter  Google Scholar 

  13. Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics using Fixed Text. In: 2009 International Conference on Biometrics and Kansei Engineering, pp. 70–75. IEEE CS, Los Alamitos (2009)

    Chapter  Google Scholar 

  14. (July 20, 2010), http://www.kds.miszu.pl

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Panasiuk, P., Saeed, K. (2010). A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Choraś, R.S. (eds) Image Processing and Communications Challenges 2. Advances in Intelligent and Soft Computing, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16295-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16295-4_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16294-7

  • Online ISBN: 978-3-642-16295-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics