Biometric Detection Using Stroke Dynamics

  • Abhishek Das
  • Saumendra Kumar Mohapatra
  • Laxmi Prasad Mishra
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 109)


The process of preventing unauthorized use of computers is called computer security. A convenient user authentication device is more essential than ever before. The major intend of this paper is to provide a suitable and reliable authentication method using keystroke and mouse dynamics combined with face recognition. Using user-id and password is considered as the most basic type of authentication. An unauthorized person can access a genuine user’s resources by exploiting an unreached unlocked computer or possibly by stealing the password of user. Without continuous authentication it is not possible to say who the real person is. So the paper is to provide a combination of static and continuous authentication. This is a biometric system to avoid impersonation and is a hybrid security system. Typing pattern in the keyboard of a user is combined with mouse interaction behavior to perform continuous analysis of a user and extracting the face features to perform static authentication. Dataset was collected and analysis was done continuously and transparently during the whole session. The keyboard, mouse interaction behaviors, and face features are unique to each individual. The method provides a probable solution to authenticate rightful users statistically and endlessly.


Face recognition PCA Singular value decomposition (SVD) (Linear discriminant analysis (LDA) Eigenface Session hijacking 


  1. 1.
    “A Leopard Cannot Change Its Spots”: Improving Face Recognition Using 3D-Based Caricatures. Joao Neves. IEEE Trans Inform Forensics Secur 14(1), Jan 2019Google Scholar
  2. 2.
    Deswal M, Kumar N, Rathi N (2014) Face recognition based on singular value decomposition linear discriminant analysis method. Int J Eng Innov Technol 3(12), June 2014Google Scholar
  3. 3.
    Chandrapaul L, Al Sumam A (2012) Face recognition using principal component analysis. Int J Adv Res Comput Eng Technol 1(9), Nov 2012Google Scholar
  4. 4.
    Wiskott L, Fellous JM, Kruger N, Von Der Malsburg C (1999) Face recognition by elastic bunch graph matching. IEEE Trans Pattern Anal Mach Intell 19(07), July 1999Google Scholar
  5. 5.
    Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inform Syst Secur 8(3)CrossRefGoogle Scholar
  6. 6.
    Dowland PS, Fvrnell SM, Papadaki M (2002) Keystroke analysis as a method of advanced user authentication and response. In: Proceedings of the IFIP TC11 17th information securityGoogle Scholar
  7. 7.
    Monrose F, Rubin A (1997) Authentication via keystroke dynamics. In: Fourth ACM conference on computer and communication security, April 1997Google Scholar
  8. 8.
    Shen C, Cai Z, Liu X, Guan X, Maxion RA (2016) Mouse identity: modelling mouse interaction behavior for a user verification system. IEEE Trans Human Mach Syst 46, October 2016CrossRefGoogle Scholar
  9. 9.
    Bours P, Fullu CJ (2009) A login system using mouse dynamics. In: Proceedings of the 5th international conference on intelligent information hiding and multimedia signal processing, pp 1072–1077Google Scholar
  10. 10.
    Aksari Y, Artuner H (2009) Active authentication by mouse movements. In: Proceedings of the international symposium on computer and information sciencesGoogle Scholar
  11. 11.
    Gamboa H, Fred ALN, Jain AK (2007) Web biometrics: user verification via web interaction. In: Proceedings of the biometrics symposium, p 16Google Scholar
  12. 12.
    Fridman L, Stolerman A, Acharya S, Brennan P, Juola P, Kam M (2015) Multi model decision fusion for continuous authentication. Comput Electr EngGoogle Scholar
  13. 13.
    Bours P, Mondal S (2015) Performance evaluation of continuous authentication system. In: IET Biometrics, pp 1–7CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abhishek Das
    • 1
  • Saumendra Kumar Mohapatra
    • 1
  • Laxmi Prasad Mishra
    • 1
  1. 1.ITER, Siksha ‘O’ Anusandhan (Deemed to be University)BhubaneswarIndia

Personalised recommendations