Feature Subset Selection Using PSO-ELM-ANP Wrapper Approach for Keystroke Dynamics

  • D. Shanmugapriya
  • G. Padmavathi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)


The security of computer access is important today because of huge transactions being carried out every day via the Internet. Username with password is the commonly used authentication mechanism. Most of the text based authentication methods are vulnerable to many attacks as they depend on text and can be strengthened more by combining password with key typing manner of the user. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. The paper uses a new feature Virtual Key Force along with the commonly extracted timing features. Features are normalized using Z-Score method. For feature subset selection, a wrapper based approach using Particle Swarm Optimization—Extreme Learning Machine combined with Analytic Network Process (PSO-ELM-ANP) is proposed. From the results, it is observed that PSO-ELM-ANP selects less number of features for further processing.


Keystroke dynamics Particle swarm optimization Extreme learning machine Analytic network process 


  1. 1.
    O’Gorman L (2003) Comparing passwords. Tokens Biometrics User Authentication Proc IEEE 91(12):2019–2040Google Scholar
  2. 2.
    Francesco B, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397CrossRefGoogle Scholar
  3. 3.
    Ahmed AAE, Traore I (2005) Anomaly Intrusion detection based on biometrics. In: Proceedings of 6th IEEE information assurance, workshop, pp. 452–453Google Scholar
  4. 4.
    Azevedo GLF, Cavalcanti GDC, Carvalho Filho ECB (2007) Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International joint conference on neural networks, pp 1947–1952Google Scholar
  5. 5.
    Azevedo GLF, Cavalcanti GDC, Filho ECB (2007) An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In: IEEE Congress on, Evolutionary Computation, pp 3577–3584Google Scholar
  6. 6.
    Bleha S, Obaidat M (1991) Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans Syst Man Cybern 21(2):452–456Google Scholar
  7. 7.
    Boechat G, Ferreira J, Carvalho E (2006) Using the keystrokes dynamic for systems of personal security. Proc World Acad Sci Eng Technol 18:200–205Google Scholar
  8. 8.
    Karnan M, Akila M (2010) Personal authentication based on keystroke dynamics using soft computing techniques. In: Second international conference on communication software and networks. pp 334–338Google Scholar
  9. 9.
    Sung KS, Cho S (2006) GA SVM wrapper ensemble for keystroke dynamics authentication. In: Proceedings of the international conference on biometrics, China, vol 3832, pp 654–660Google Scholar
  10. 10.
    Yu E, Sungzoon Cho (2003) GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the international joint conference on neural networks, vol 3, pp 2253–2257Google Scholar
  11. 11.
    Shanmugapriya D, Padmavathi G (2011) Virtual key force—a new feature for keystroke. Int J Eng Sci Technol 3(10):7738–7743Google Scholar
  12. 12.
    Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38:2270–2285CrossRefGoogle Scholar
  13. 13.
    Yu E, Cho S (2004) Keystroke dynamics identity verification: its problems and practical solutions. Comput Secur 23:428–440CrossRefGoogle Scholar
  14. 14.
    Panda S, Padhy NP (2007) Comparison of particle swarm optimization and genetic algorithm for TCSC-based controller design. World Acad Sci Eng Technol 27:497–505Google Scholar
  15. 15.
    Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of 2004 international joint conference on neural networksGoogle Scholar
  16. 16.
    Saaty TL (1996) Decision making with dependence and feedback, the analytic network process. RWS Publications, PittsburghGoogle Scholar
  17. 17.
    Suratgar AA, Tavakoli MB, Hoseinabadi A (2005) Modified Levenberg-Marquardt method for neural networks training. World Acad Sci Eng Technol 6:46–48Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Department of Information TechnologyAvinashilingam Institute for Home Science and Higher Education for WomenCoimbatoreIndia
  2. 2.Department of Computer ScienceAvinashilingam Institute for Home Science and Higher Education for WomenCoimbatoreIndia

Personalised recommendations