Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2013 Dec 19:7:835.
doi: 10.3389/fnhum.2013.00835.

Keystroke dynamics in the pre-touchscreen era

Affiliations
Review

Keystroke dynamics in the pre-touchscreen era

Nasir Ahmad et al. Front Hum Neurosci. .

Abstract

Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.

Keywords: authentication; identity; keystroke analysis; pre-touchscreen; security.

PubMed Disclaimer

References

    1. Araújo L. C., Sucupira L. H., Jr., Lizarraga M. G., Ling L. L, Yabu-Uti J. B. T. (2005). User authentication through typing biometrics features. IEEE Trans. Signal Process. 53 851–855 10.1109/TSP.2004.839903 - DOI
    1. Bergadano F., Gunetti D., Picardi C. (2002). User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5 367–397 10.1145/581271.581272 - DOI
    1. Bleha S., Slivinsky C., Hussien B. (1990). Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12 1217–1222 10.1109/34.62613 - DOI
    1. Bleha S. A., Obaidat M. S. (1991). Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans. Syst. Man Cybern. 21 452–456 10.1109/21.87093 - DOI
    1. Campisi P., Maiorana E., Lo Bosco M., Neri A. (2009). User authentication using keystroke dynamics for cellular phones. IET Signal Process. 3 333–341 10.1049/iet-spr.2008.0171 - DOI

LinkOut - more resources