Biometric Recognition Based on Free-Text Keystroke Dynamics

被引:90
作者
Ahmed, Ahmed A. [1 ]
Traore, Issa [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 3P6, Canada
关键词
Biometrics; continuous authentication; free text recognition; keystroke analysis; neural networks; AUTHENTICATION;
D O I
10.1109/TCYB.2013.2257745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accurate recognition of free text keystroke dynamics is challenging due to the unstructured and sparse nature of the data and its underlying variability. As a result, most of the approaches published in the literature on free text recognition, except for one recent one, have reported extremely high error rates. In this paper, we present a new approach for the free text analysis of keystrokes that combines monograph and digraph analysis, and uses a neural network to predict missing digraphs based on the relation between the monitored keystrokes. Our proposed approach achieves an accuracy level comparable to the best results obtained through related techniques in the literature, while achieving a far lower processing time. Experimental evaluation involving 53 users in a heterogeneous environment yields a false acceptance ratio (FAR) of 0.0152% and a false rejection ratio (FRR) of 4.82%, at an equal error rate (EER) of 2.46%. Our follow-up experiment, in a homogeneous environment with 17 users, yields FAR=0% and FRR=5.01%, at EER=2.13%.
引用
收藏
页码:458 / 472
页数:15
相关论文
共 14 条
[1]  
[Anonymous], 2006, P 2006 C COMP VIS PA
[2]   Forgery quality and its implications for behavioral biometric security [J].
Ballard, Lucas ;
Lopresti, Daniel ;
Monrose, Fabian .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (05) :1107-1118
[3]  
Bengio S., 2004, PROC SPEAKER LANG RE
[4]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[5]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[6]  
Dowland PS, 2002, INT FED INFO PROC, V86, P215
[7]   Unconstrained keystroke dynamics authentication with shared secret [J].
Giot, Romain ;
El-Abed, Mohamad ;
Hemery, Baptiste ;
Rosenberger, Christophe .
COMPUTERS & SECURITY, 2011, 30 (6-7) :427-445
[8]  
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[9]  
Monrose Fabian, 1997, Proc. 4th ACM Conf. Comput. Commun. Secur.-CCS, P48, DOI 10.1145/266420.266434
[10]   Verification of computer users using keystroke dynamics [J].
Obaidat, MS ;
Sadoun, B .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1997, 27 (02) :261-269