Hybrid Model with Fusion Approach to Enhance the Efficiency of Keystroke Dynamics Authentication

  • Ramu Thanganayagam
  • Arivoli Thangadurai
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 43)


We propose in this paper a novel technique to enhance the performance of keystroke dynamic authentication using hybrid model with four fusion approach. Firstly, extract keystroke features from our database. Then generate template from extracted features, which is compact form of keystroke feature data. Hybrid model based on combination of Gaussian probability density function (GPDF) and Support Vector Machine (SVM) will convert test features into scores. At last, applied four fusion rules on hybrid model to fusing GPDF and SVM scores to improve the final result. Experimental results show that the performance of the proposed hybrid model can bring obvious improvement with error rate of 1.612 %.


Hybrid model Biometric Keystroke dynamic authentication and fusion approach 


  1. 1.
    Hosseinzadeh, D., Krishnan, S.: Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 38(6), 816–826 (2008)CrossRefGoogle Scholar
  2. 2.
    Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: A key to user identification. IEEE Secur. Priv. 2(5), 40–47 (2004)CrossRefGoogle Scholar
  3. 3.
    Sasse, M., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’ a human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRefGoogle Scholar
  4. 4.
    Hosseinzadeh, D., Krishnan, S., Khademi, A.: Keystroke identification based on Gaussian mixture models. In: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 3, pp. 1144–1147 (2006)Google Scholar
  5. 5.
    Sang, Y., Shen, H., Fan, P.: Novel impostors’ detection in keystroke dynamics by support vector machine. In: Parallel and Distributed Computing: Applications and Technologies, pp. 666–669. Springer (2005)Google Scholar
  6. 6.
    Rodrigues, R.N., Yared, G.F.G.: Biometric access control through numerical keyboards based on keystroke dynamics. In: Zhang, D., Jain, A.K. (eds.) International Conference of Biometrics (ICB 2006), LNCS 3832, pp. 640–646 (2005)Google Scholar
  7. 7.
    Guven, O., Akyokus, S., Uysal, M., Guven, A.: Enhanced password authentication through keystroke typing characteristics. In: Proceedings of 25th IASTED international multi-conference: artificial intelligence and applications, Innsbruck, Austria, pp. 317–322 (2007)Google Scholar
  8. 8.
    Azevedo, G., Cavalcanti, G., Filho, E.C.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, pp. 1947–1952 (2007)Google Scholar
  9. 9.
    Giot, R., El-Abed, M., Rosenberger, C.: GREYC keystroke: a benchmark for keystroke dynamics biometric systems. In: IEEE 3rd International Conference on Biometrics, pp. 1–6 (2009)Google Scholar
  10. 10.
    Ramu, T., Arivoli, T.: A Framework of secure biometric based online exam authentication: an alternative to traditional exam. IJSER 4(11), 52–60 (2013)Google Scholar
  11. 11.
    Archambeau, C., Valle, M., Assenza, A., Verleysen, M.: Assessment of probability density estimation methods: Parzen window and finite gaussian mixtures. ISCAS, pp. 3245–3248 (2006)Google Scholar
  12. 12.
    Parzen, E.: On estimation of a probability density function and mode. Ann. Math. Stat. 33, 1065–1076 (1962)MATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    Tax, D.M.J., Duin, R.P.W.: Support vector data description. Mach. Learn. 54, 45–66 (2004)MATHCrossRefGoogle Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of ECEKalasalingam UniversityKrishnankoilIndia
  2. 2.Department of ECEVickram College of EngineeringArasanoorIndia

Personalised recommendations