User Authentication Using Keystroke Recognition
This Paper represents technique for user authentication using keystroke dynamics. In this paper we have included Inter key time, Key hold time as well as some other keystroke features to verify the user. As the user types a combination of string, its key hold time and inter key time is noted, which is then compared with trusted user values using Euclidean distance. Then token system is used to check whether user is valid or not. It has improved user authentication such that Type 2 error is 0 % but type 1 error is 30 %.
Unable to display preview. Download preview PDF.
- 1.Campisi, P., Maiorana, E., Lo Bosco, M.: User Authentication Using Keystroke Dynamics in Cellular Phones. IET, Signal Processing, pp. 333–341 (2009) ISSN: 1751-9675Google Scholar
- 2.Crawford, H.: Keystroke Dynamics- Characteristics and opportunity, pp. 205–212 (2010) ISBN: 978-1-4244-7551-3Google Scholar
- 3.Stefan, D., Yao, D.: Keystroke-dynamics authentication against synthetic forgeries, pp. 1–8 (2010)Google Scholar
- 4.Inthupinyo, S., Roadrungwasinkul, W., Chantan, C.: User recognition via keystroke latencies using SOM and Back propagation neural network, pp. 3160–3165 (2009) ISBN: 978-4-907764-34-0Google Scholar
- 6.Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: International Conference on Biometrics and Kansei Engineering, pp. 70–75 (2009) ISBN: 9780769536927Google Scholar
- 7.Modi, S., Elliott, S.J.: Keystroke Dynamics Verification using Spontaneously Generated Password Carnahan Conferences Security Technology, pp. 116–121 (2006) ISBN: 1424401747 Google Scholar