Skip to main content

Keystroke Rhythm Analysis Based on Dynamics of Fingertips

  • Conference paper
  • First Online:
Machine Intelligence and Signal Analysis

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 748))

Abstract

The proposed work presents an analysis of rhythmic patterns based on the dynamics of the fingertips observed during keystroke events on a traditional computer keyboard. In this work, a detailed analysis of pressure and acceleration applied by the user has been taken into consideration, in contrast to the earlier works which have focused primarily on the timing variations of the keys. In this purpose, two different types of sensors pressure and accelerometer were embedded on a traditional keyboard. Groupings of numerical digits and special keys were used to design different kinds of tasks to acquire sensor and timing variations of each keystroke event. In total, six subjects (two females and four males) were asked to provide the data to validate the proposed idea. Subsequently, two types of analysis, interpersonal and intrapersonal keystroke rhythm, have been carried out. The analysis results show uniquely identifiable keystroke sensor and timing variations for different users. However, individual users almost maintained his/her keystroke pressure and acceleration variation irrespective of the type of tasks. Such results demonstrate that keystroke rhythm based on pressure and acceleration variations of the fingertips can be used as a behavioural feature for developing more sophisticated biometric systems for intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: Firme: face and iris recognition for mobile engagement. Image Vis. Comput. 32(12), 1161–1172 (2014)

    Article  Google Scholar 

  2. Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)

    Google Scholar 

  3. Labati, R.D., Genovese, A., Piuri, V., Scotti, F.: Toward unconstrained fingerprint recognition: a fully touchless 3-d system based on two views on the move. IEEE Trans. Syst. Man Cybern. Syst. 46(2), 202–219 (2016)

    Article  Google Scholar 

  4. Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: IEEE 22nd International Conference on Network Protocols (ICNP 2014), pp. 221–232. IEEE, USA (2014)

    Google Scholar 

  5. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  6. Sim, T., Janakiraman, R.: Are digraphs good for free-text keystroke dynamics? In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR’07), pp. 1–6. IEEE, USA (2007)

    Google Scholar 

  7. Forsen, G.E., Nelson, M.R., Staron Jr., R.J.: Personal attributes authentication techniques. Technical report, Pattern Analysis and Recognition Corp. Rome (1977)

    Google Scholar 

  8. Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: a key to user identification. IEEE Secur. Priv. 2(5), 40–47 (2004)

    Article  Google Scholar 

  9. Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report, Rand Corp. Santa Monica (1980)

    Google Scholar 

  10. Nonaka, H., Kurihara, M.: Sensing pressure for authentication system using keystroke dynamics. Int. J. Comput. Intell. 1(1), 19–22 (2004)

    Google Scholar 

  11. Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 92–111, Springer, Berlin (2014)

    Google Scholar 

  12. Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: 2009 6th IEEE Consumer Communications and Networking Conference (CCNC), pp. 1–2. IEEE, USA (2009)

    Google Scholar 

  13. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249–259. ACM, USA (2011)

    Google Scholar 

  14. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. 9(6), 542–554 (2016)

    Article  Google Scholar 

  15. Rehim, R.: Effective python penetration testing. Packt Publishing Ltd, Birmingham (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suraj, Sarma, P., Yadav, A.K., Yadav, A.K., Barma, S. (2019). Keystroke Rhythm Analysis Based on Dynamics of Fingertips. In: Tanveer, M., Pachori, R. (eds) Machine Intelligence and Signal Analysis. Advances in Intelligent Systems and Computing, vol 748. Springer, Singapore. https://doi.org/10.1007/978-981-13-0923-6_48

Download citation

Publish with us

Policies and ethics