User Authentication Using Keystroke Recognition

  • Urvashi Garg
  • Yogesh Kumar Meena
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 174)


This Paper represents technique for user authentication using keystroke dynamics. In this paper we have included Inter key time, Key hold time as well as some other keystroke features to verify the user. As the user types a combination of string, its key hold time and inter key time is noted, which is then compared with trusted user values using Euclidean distance. Then token system is used to check whether user is valid or not. It has improved user authentication such that Type 2 error is 0 % but type 1 error is 30 %.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Campisi, P., Maiorana, E., Lo Bosco, M.: User Authentication Using Keystroke Dynamics in Cellular Phones. IET, Signal Processing, pp. 333–341 (2009) ISSN: 1751-9675Google Scholar
  2. 2.
    Crawford, H.: Keystroke Dynamics- Characteristics and opportunity, pp. 205–212 (2010) ISBN: 978-1-4244-7551-3Google Scholar
  3. 3.
    Stefan, D., Yao, D.: Keystroke-dynamics authentication against synthetic forgeries, pp. 1–8 (2010)Google Scholar
  4. 4.
    Inthupinyo, S., Roadrungwasinkul, W., Chantan, C.: User recognition via keystroke latencies using SOM and Back propagation neural network, pp. 3160–3165 (2009) ISBN: 978-4-907764-34-0Google Scholar
  5. 5.
    Obaidat, M.S., Sadoun, B.: Verification of Computer Users Using Keystroke Dynamics. IEEE Transactions on Systems Man and Cybernetics 27(2), 261–269 (1997)CrossRefGoogle Scholar
  6. 6.
    Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: International Conference on Biometrics and Kansei Engineering, pp. 70–75 (2009) ISBN: 9780769536927Google Scholar
  7. 7.
    Modi, S., Elliott, S.J.: Keystroke Dynamics Verification using Spontaneously Generated Password Carnahan Conferences Security Technology, pp. 116–121 (2006) ISBN: 1424401747 Google Scholar
  8. 8.
    Cho, S., Han, C., Han, D.H., Kim, H.-I.: Web based Keystroke Dynamics Identity Verification using Neural Network. Journal of Organizational Computing and Electronic Commerce 10(4), 295–307 (2000)CrossRefGoogle Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.MNITJaipurIndia

Personalised recommendations