Recognizing Individual Typing Patterns

  • Michał Choraś
  • Piotr Mroczkowski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4478)


In the article three methods of extracting individual typing patterns are proposed and tested. Moreover, we present satisfactory experimental results confirming that these typing patterns may be used as biometrics for human identification, especially in web-based applications (e.g. password hardening).


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Monrose, F., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems 16(4), 351–359 (2000)CrossRefGoogle Scholar
  2. 2.
    Obaidat, M.S., Sadoun, B.: Keystroke Dynamics Based Authentication. In: Jain, A.K., Bolle, R., Pankanti, S. (eds.) Biometrics: Personal Identification in Networked Society (1998)Google Scholar
  3. 3.
    Obaidat, M.S., Sadoun, B.: Verification of Computer Users Using Keystroke Dynamics. IEEE Trans. Syst., Man, Cybern.-Part B 24(2), 261–269 (1997)CrossRefGoogle Scholar
  4. 4.
    Leggett, G., Williams, J., Usnick, M.: Dynamic Identity Verification via Keystroke Characteristics. International Journal of Man.-Machine Studies 35(6), 859–870 (1991)CrossRefGoogle Scholar
  5. 5.
    Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: some preliminary results, Rand Report R-256-NSF. Rand Corporation (1980)Google Scholar
  6. 6.
    Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Conference on Computer and Communications Security, pp. 48–56 (1997)Google Scholar
  7. 7.
    Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Communications of ACM 33(2), 168–176 (1990)CrossRefGoogle Scholar
  8. 8.
    Bleha, S., Slivinsky, C., Hussein, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. on Patt. Anal. Mach. Int. 12(12), 1217–1222 (1990)CrossRefGoogle Scholar
  9. 9.
    Brown, M., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. International Journal of Man.-Machine Studies 39, 999–1014 (1993)CrossRefGoogle Scholar
  10. 10.
    Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2002)CrossRefGoogle Scholar
  11. 11.
    Brown, M., Rogers, S.J.: Method and apparatus for verification of a computer user’s identification, based on keystroke characteristics. Patent Number 5,557,686, U.S. Patent and Trademark Office, Washington, DC (September 1996)Google Scholar
  12. 12.
    Yu, E., Cho, S.: Biometrics-based Password Identity Verification: Some Practical Issues and Solutions. In: XVth Triennial Congress of the International Ergonomics Association (IEA), Seoul, Korea, August 24-29 (2003)Google Scholar
  13. 13.
    Tapiador, M., Sigüenza, J.A.: Fuzzy Keystroke Biometrics On Web Security. In: Proc. of AutoID (1999)Google Scholar
  14. 14.

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Michał Choraś
    • 1
  • Piotr Mroczkowski
    • 2
  1. 1.Image Processing Group, Institute of Telecommunications, University of Technology & Life Sciences, S. Kaliskiego 7, 85-791 Bydgoszcz 
  2. 2.Hewlett Packard Polska, Global Delivery Poland Center, ul. Szturmowa 2a, University Business Center, WarsawPoland

Personalised recommendations