Abstract
In this paper authors present a general review of the history of keystroke dynamics introducing some selected known approaches and bring attention to the modern trends in this domain of biometrics. Although there is a large number of works on this subject, it appears they are incomparable. That is why authors pay a large attention to testing such algorithms with other databases. Many unique tests were conducted and many observations were described. The influence of using varieties of databases on keystroke dynamics is given in detail in this paper. Important conclusions on databases and training set selections are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CENELEC. European Standard EN 50133-1: Alarm systems. Access control systems for use in security applications. Part 1: System requirements, Standard Number EN 50133-1:1996/A1:2002, Technical Body CLC/TC 79, European Committee for Electrotechnical Standardization, CENELEC (2002)
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results. Rand. Corp. Santa. Monica, CA (1980)
Hussien, B., McLaren, R., Bleha, S.: An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9, 39–43 (1989)
Killourhy, K.S., Maxion, R.A.: The Effect of Clock Resolution on Keystroke Dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331–350. Springer, Heidelberg (2008)
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)
Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. In: Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, China, pp. 61–64 (2007)
Panasiuk, P., Saeed, K.: A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Chora, R.S. (ed.) Image Processing & Communications Challenges 2. AISC, vol. 84, pp. 113–120. Springer, Heidelberg (2010)
Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: 2009 International Conference on Biometrics and Kansei Engineering, Cieszyn, Poland, pp. 70–75 (2009)
Saevanee, H., Bhattarakosol, P.: Authenticating User Using Keystroke Dynamics and Finger Pressure. In: 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, Las Vegas, NV, pp. 1–2 (2009)
Spillane, R.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975)
http://www.cs.cmu.edu/keystroke/ (state from: June 19, 2011)
http://jdadesign.net/2010/04/pressure-sensitive-keystroke-dynamics-dataset/ (state from: June 19, 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Panasiuk, P., Saeed, K. (2011). Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-27245-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27244-8
Online ISBN: 978-3-642-27245-5
eBook Packages: Computer ScienceComputer Science (R0)