Unconstrained keystroke dynamics authentication with shared secret

被引:49
作者
Giot, Romain [1 ]
El-Abed, Mohamad [1 ]
Hemery, Baptiste [1 ]
Rosenberger, Christophe [1 ]
机构
[1] Univ Caen, CNRS, ENSICAEN, GREYC Lab, F-14000 Caen, France
关键词
Biometrics; Authentication; Keystroke dynamics; Support vector machine learning; Benchmark; Supervised template update; IDENTITY VERIFICATION; USER AUTHENTICATION; PERFORMANCE; SECURITY;
D O I
10.1016/j.cose.2011.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additional sensor is required for authenticating the user before accessing to an application. In the last thirty years, many researchers have proposed, different algorithms aimed at increasing the performance of this approach. Their main drawback lies on the large number of data required for the enrollment step. As a consequence, the verification system is barely usable, because the enrollment is too restrictive. In this work, we propose a new method based on the Support Vector Machine (SVM) learning satisfying industrial conditions (i.e., few samples per user are needed during the enrollment phase to create its template). In this method, users are authenticated through the keystroke dynamics of a shared secret (chosen by the system administrator). We use the GREYC keystroke database that is composed of a large number of users (100) for validation purposes. We compared the proposed method with six methods from the literature (selected based on their ability to work with few enrollment samples). Experimental results show that, even though the computation time to build the template can be longer with our method (54 s against 3 s for most of the others), its performance outperforms the other methods in an industrial context (Equal Error Rate of 15.28% against 16.79% and 17.02% for the two best methods of the state-of-the-art, on our dataset and five samples to create the template, with a better computation time than the second best method). (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:427 / 445
页数:19
相关论文
共 48 条
[1]  
Anagun AS, 2006, LECT NOTES COMPUT SC, V3982, P11, DOI 10.1007/11751595_2
[2]  
[Anonymous], BEHAV BIOMETRICS HUM
[3]  
[Anonymous], PARALLEL DISTRIBUTED
[4]  
[Anonymous], USABILITY BIOMETRIC
[5]   On estimating performance indices for biometric identification [J].
Bhatnagar, Jay ;
Kumar, Ajay .
PATTERN RECOGNITION, 2009, 42 (09) :1803-1815
[6]   COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS [J].
BLEHA, S ;
SLIVINSKY, C ;
HUSSIEN, B .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) :1217-1222
[7]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[8]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[9]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[10]  
CHO S, 2006, IAPR INT C BIOM, V5, P626