Summary
In this paper the authors modify their previous kNN algorithm and present a modification to improve the algorithm by considering key inner and interclass distinguishability. The suggested approach is tested on a large group of individuals with data gathered over Internet using browser-based WWW application. The obtained results are promising and encouraging for further development in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Spillane, R.J.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975)
Vacca, J.R.: Biometric Technologies and Verification Systems, p. 182. Elsevier, USA (2007)
Coppenrath, L.F., & Associates: 5 (2001), http://lfca.net/Reference20Documents/Biometric20Technology20Overview.pdf (State from June 15, 2010)
Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Prelimary Results. Rand Rep. R-2560-NSF, Rand Corp. (1980)
Leggett, J., Williams, G., Umphress, D.: Verifying Identity via Keystroke Characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)
Leggett, J., Williams, G.: Verification of User Identity via Keystroke Characteristics. Human Factors in Management Information Systems, 89
Hussien, B., McLaren, R., Bleha, S.: An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9, 39–43 (1989)
Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. on Systems Man and Cybernetics, Part B 27(2), 261–269 (1997)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2004)
Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification using the ARTMAP-FD Neural Network. Intelligent Information Hiding and Multimedia Signal Processing 1, 61–64 (2007)
Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 1078–1079 (2009)
Rybnik, M., Tabedzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Computer Information Systems and Industrial Management Applications - CISIM, pp. 225–230. IEEE, Los Alamitos (2008)
Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics using Fixed Text. In: 2009 International Conference on Biometrics and Kansei Engineering, pp. 70–75. IEEE CS, Los Alamitos (2009)
(July 20, 2010), http://www.kds.miszu.pl
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Panasiuk, P., Saeed, K. (2010). A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Choraś, R.S. (eds) Image Processing and Communications Challenges 2. Advances in Intelligent and Soft Computing, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16295-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-16295-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16294-7
Online ISBN: 978-3-642-16295-4
eBook Packages: EngineeringEngineering (R0)