Keystroke Biometric Recognition on Chinese Long Text Input
Keystroke Biometric is useful in distinguishing legal users from perpetrators in online activities. Most previous keystroke studies focus on short text, however short text keystroke can only be used in limited scenarios such as user name and password input and provide one-time authentication. In this paper, we concentrate on how to detect whether current user is the legal one during the whole activity, such as writing an E-mail and chat online. We developed a JAVA applet to collect raw data, and then extracted features and constructed 4 classifiers. In the experiment, we required 30 users to choose a topic randomly and then type in a text about 400 Chinese characters on it. This experiment repeated 9 times in different days under the same typing environment. The accuracy of different methods shifts from 94.07 % to 98.15 %, the FAR reaches to 0.74 % and FRR to 1.15 %. In summary, Chinese free long text keystroke biometric recognition can be used to authenticate users during the whole online activity with satisfactory precision.
KeywordsBiometric features Chinese free-text Keystroke dynamics Authentication
This work was supported by National Natural Science Foundation of China [60903201, 91218301]; and the Fundamental Research Funds for the Central Universities [JBK120505, JBK140129].
- 1.Lisa, M.V., Lina, Z., Andrew, S.: Automated stress detection using keystroke and linguistic features: an exploratory study. Int. J. Hum Comput Stud. 10(67), 870–886 (2009)Google Scholar
- 2.Bryan, W.L., Harter, N.: Studies in the physiology and psychology of telegraphic language. Psychol. Rev. 1(4), 27–53 (1970)Google Scholar
- 3.Forsen, G.E., Nelson M.R., et al.: Personal attributes authentication techniques. Personal Attributes Authentication Techniques (1977)Google Scholar
- 5.Gaines, R.S., Lisowski, W., et al.: Authentication by keystroke timing: some preliminary results. Authentication by Keystroke Timing Some Preliminary Results (1980)Google Scholar
- 12.Tapiador, M., Sigenza, J.A., et al.: Fuzzy keystroke biometrics on web security. In: Automatic Identification Advanced Technologies (2000)Google Scholar
- 16.Curtin, M., Tappert, C., Villani, M., et al.: Keystroke biometric recognition on long-text input: a feasibility study. In: Proceedings of International Workshop SCI Comp/Comp Stat (IWSCCS), Hong Kong (2006)Google Scholar
- 18.Patrick, B., Hafez, B.: Continuous authentication using biometric keystroke dynamics. In: The Norwegian Information Security Conference (NISK), pp. 1–12 (2009)Google Scholar
- 20.Dexu, Z., Xiaoqin, H.: Dynamic free text keystroke continuous identification based on the rewards and punishments algorithm with frequency. J. Netw. New Media 2, 41–49 (2015). (in Chinese)Google Scholar
- 21.Villani, M., Tappert, C., Giang, N., et al.: Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. In: Computer Vision and Pattern Recognition Workshop, pp. 39–39 (2006)Google Scholar
- 22.Cheng, Y., Yunkai, W., Ruilong, H.: Behavior research of internet user passwords based on pinyin analysis. Comput. Eng. 09, 174–177 (2014). (in Chinese)Google Scholar