Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication

  • Seong-seob Hwang
  • Hyoung-joo Lee
  • Sungzoon Cho
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3917)


Keystroke dynamics-based authentication (KDA) is to verify a user’s identification using not only the password but also keystroke patterns. The authors have shown in previous research that uniqueness and consistency of keystroke patterns are important factors to authentication accuracy and that they can be improved by employing artificial rhythms and tempo cues. In this paper, we implement the pause strategy and/or auditory cues for KDA and assess their effectiveness using various novelty detectors. Experimental results show that improved uniqueness and consistency lead to enhanced authentication performance, in particular for those users with poor typing ability.


Equal Error Rate Novelty Detector False Acceptance Rate False Rejection Rate Internet Banking 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Rand Report R-256-NSF. Rand Corporation (1980)Google Scholar
  2. 2.
    Umphress, D., Williams, G.: Identity Verification through Keyboard Characteristics. International Journal of Man-Machine Studies 23, 263–273 (1985)CrossRefGoogle Scholar
  3. 3.
    Jain, A.K., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer, Norwell (1999)CrossRefGoogle Scholar
  4. 4.
    Polemi, D.: Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication. Technical Report. Institute of Communication and Computer Systems, National Technical University of Athens, Athens, Greece (1997), Available at:
  5. 5.
    Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer System 16(4), 351–359 (2000)CrossRefGoogle Scholar
  6. 6.
    Cho, S., Han, C., Han, D., Kim, H.: Web Based Keystroke Dynamics Identity Verification Using Neural Networks. Journal of Organizational Computing and Electronic Commerce 10(4), 295–307 (2000)CrossRefGoogle Scholar
  7. 7.
    Yu, E., Cho, S.: Keystroke Dynamics Identity Verification - Its Problems and Practical Solutions. Computer and Security 23(5), 428–440 (2004)CrossRefGoogle Scholar
  8. 8.
    Schölkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the Support of a High-dimensional Distribution. Neural Computation 13, 1443–1471 (2001)CrossRefMATHGoogle Scholar
  9. 9.
    Cho, S., Hwang, S.: Artificial Rhythms and Cues for Keystroke Dynamics-based Authentication. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol. 3832, pp. 626–632. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Kang, P., Park, S., Cho, S., Hwang, S., Lee, H.: The Effectiveness of Artificial Rhythms and Cues for Keystroke Dynamics-based User Authentication (submitted, 2006)Google Scholar
  11. 11.
    Barnett, V., Lewis, T.: Outliers in Statistical Data. Wiley and Sons, New York (1994)MATHGoogle Scholar
  12. 12.
    Bishop, C.: Novelty Detection and Neural Network Validation. In: Proceedings of IEE Conference on Vision and Image Signal Processing, pp. 217–222 (1994)Google Scholar
  13. 13.
    Knorr, E., Ng, R., Tucakov, V.: Distance-based Outliers: Algorithms and Applications. VLDB Journal 8(3), 237–253 (2000)CrossRefGoogle Scholar
  14. 14.
    Lee, H., Cho, S.: SOM-based Novelty Detection Using Novel Data. In: Gallagher, M., Hogan, J.P., Maire, F. (eds.) IDEAL 2005. LNCS, vol. 3578, pp. 359–366. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Golarelli, M., Maio, D., Maltoni, D.: On the Error-Reject Trade-off in Biometric Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(7), 786–796 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Seong-seob Hwang
    • 1
  • Hyoung-joo Lee
    • 1
  • Sungzoon Cho
    • 1
  1. 1.Department of Industrial EngineeringSeoul National UniversitySeoulKorea

Personalised recommendations