A Modified Algorithm for User Identification by His Typing on the Keyboard

  • Piotr Panasiuk
  • Khalid Saeed
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 84)

Summary

In this paper the authors modify their previous kNN algorithm and present a modification to improve the algorithm by considering key inner and interclass distinguishability. The suggested approach is tested on a large group of individuals with data gathered over Internet using browser-based WWW application. The obtained results are promising and encouraging for further development in this area.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Spillane, R.J.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975)Google Scholar
  2. 2.
    Vacca, J.R.: Biometric Technologies and Verification Systems, p. 182. Elsevier, USA (2007)Google Scholar
  3. 3.
    Coppenrath, L.F., & Associates: 5 (2001), http://lfca.net/Reference20Documents/Biometric20Technology20Overview.pdf (State from June 15, 2010)
  4. 4.
    Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Prelimary Results. Rand Rep. R-2560-NSF, Rand Corp. (1980)Google Scholar
  5. 5.
    Leggett, J., Williams, G., Umphress, D.: Verifying Identity via Keystroke Characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)CrossRefGoogle Scholar
  6. 6.
    Leggett, J., Williams, G.: Verification of User Identity via Keystroke Characteristics. Human Factors in Management Information Systems, 89Google Scholar
  7. 7.
    Hussien, B., McLaren, R., Bleha, S.: An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9, 39–43 (1989)CrossRefGoogle Scholar
  8. 8.
    Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. on Systems Man and Cybernetics, Part B 27(2), 261–269 (1997)CrossRefGoogle Scholar
  9. 9.
    Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2004)CrossRefGoogle Scholar
  10. 10.
    Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification using the ARTMAP-FD Neural Network. Intelligent Information Hiding and Multimedia Signal Processing 1, 61–64 (2007)Google Scholar
  11. 11.
    Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 1078–1079 (2009)Google Scholar
  12. 12.
    Rybnik, M., Tabedzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Computer Information Systems and Industrial Management Applications - CISIM, pp. 225–230. IEEE, Los Alamitos (2008)CrossRefGoogle Scholar
  13. 13.
    Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics using Fixed Text. In: 2009 International Conference on Biometrics and Kansei Engineering, pp. 70–75. IEEE CS, Los Alamitos (2009)CrossRefGoogle Scholar
  14. 14.
    (July 20, 2010), http://www.kds.miszu.pl

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Piotr Panasiuk
    • 1
  • Khalid Saeed
    • 1
  1. 1.AGH University of Science and Technology 

Personalised recommendations