Keystroke dynamics in the pre-touchscreen era
- PMID: 24391568
- PMCID: PMC3867681
- DOI: 10.3389/fnhum.2013.00835
Keystroke dynamics in the pre-touchscreen era
Abstract
Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.
Keywords: authentication; identity; keystroke analysis; pre-touchscreen; security.
References
-
- Araújo L. C., Sucupira L. H., Jr., Lizarraga M. G., Ling L. L, Yabu-Uti J. B. T. (2005). User authentication through typing biometrics features. IEEE Trans. Signal Process. 53 851–855 10.1109/TSP.2004.839903 - DOI
-
- Bergadano F., Gunetti D., Picardi C. (2002). User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5 367–397 10.1145/581271.581272 - DOI
-
- Bleha S., Slivinsky C., Hussien B. (1990). Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12 1217–1222 10.1109/34.62613 - DOI
-
- Bleha S. A., Obaidat M. S. (1991). Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans. Syst. Man Cybern. 21 452–456 10.1109/21.87093 - DOI
-
- Campisi P., Maiorana E., Lo Bosco M., Neri A. (2009). User authentication using keystroke dynamics for cellular phones. IET Signal Process. 3 333–341 10.1049/iet-spr.2008.0171 - DOI
Publication types
LinkOut - more resources
Full Text Sources
Other Literature Sources
