Biometric Authentication and Identification using Keystroke Dynamics: A Survey

被引:226
作者
Banerjee, Salil P. [1 ]
Woodard, Damon L. [2 ]
机构
[1] Clemson Univ, Elect & Comp Engn Dept, 105 Riggs Hall, Clemson, SC 29634 USA
[2] Clemson Univ, Human Ctr, Comp Div, Clemson, SC 29634 USA
来源
JOURNAL OF PATTERN RECOGNITION RESEARCH | 2012年 / 7卷 / 01期
关键词
Autlieuticalioir; biometrics; cyber security; identification; key stroke dynamics; psychology; remote monitoring; typing;
D O I
10.13176/11.427
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
- Dependence on computers to store and process sensitive information has made it necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an individual can be used to strengthen existing security techniques effectively and cheaply. Due to the ballistic (semi-autonomous) nature of the typing behavior it is difficult to impersonate, making it useful as a 1)4)111(46c. Therefore in this paper, we provide a basic background of the psychological basis behind the use of keystroke dynamics. We also discuss the data acquisition methods, approaches and the performatice of the methods used by researcliers on standard coiriputer keyboards. fig tlfie survey, we find that the use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues.
引用
收藏
页码:116 / 139
页数:24
相关论文
共 162 条
[1]  
Ahmad AM, 2000, LECT NOTES ARTIF INT, V1904, P310
[2]  
Ahmed A. A. E., 2008, P 2 INT S HUM ASP IN
[3]  
[Anonymous], 1997, P 4 ACM C COMP COMM, DOI 10.1145/266420.266434
[4]  
[Anonymous], 2010, THESIS
[5]  
Araujo L.C.F., 2004, IEEE LATIN AM T, V2, P69
[6]   User authentication through typing biometrics features [J].
Araújo, LCF ;
Sucupira, LHR ;
Lizárraga, MG ;
Ling, LL ;
Yabu-Uti, JBT .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :851-855
[7]   Hybrid solution for the feature selection in personal identification problems through keystroke dynamics [J].
Azevedo, Gabriel. L. F. B. G. ;
Cavalcanti, George D. C. ;
Carvalho Filho, E. C. B. .
2007 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-6, 2007, :1947-1952
[8]  
Balagani K. S., 2011, PATTERN RECOGN, V32
[9]  
Bartlow N, 2006, INT S SOFTW RELIAB E, V2006, P117, DOI DOI 10.1109/ISSRE.2006.25
[10]  
Bartlow N, 2006, ISSRE 2006:17TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, P117