A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
User Authentication by Keystroke Dynamics Using Machine Learning Algorithms
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Keystroke Dynamics has high use in cyber intelligence. The paper examines the helpfulness of keystroke dynamics to build up the individual personality. ...
Pair wise user coupling technique is proposed. The proposed procedures are approved by utilizing keystroke information. ...
User Coupling (PUC) is the most vigorous
identification scheme. Also, this method has a lower
computational complexity. ...
doi:10.32628/cseit1953137
fatcat:ufg4sdt6svenlip7yf5xpmhesm
Graphical Based Authentication System Using Keystroke Parameters and Cued Click- Points: A Survey
2019
International Journal for Research in Applied Science and Engineering Technology
A possible remedy against such a scenario is to use Keystroke Dynamics for providing security in banking application. ...
This paper gives the survey of different techniques used by the researcher for providing security. ...
Author uses different machine learning algorithms along with the pairwise user coupling technique and show the performance of each separate technique . ...
doi:10.22214/ijraset.2019.1133
fatcat:f5hbf2m7k5cqjodpxwda6gbzsa
ENHANCING SECURITY USING KEYSTROKE DYNAMICS
2019
International Journal of Engineering Applied Sciences and Technology
Pairwise user coupling in a bottom-up tree structure scheme gives the best performance, both concerning accuracy and time complexity. The proposed techniques are validated by using keystroke data. ...
A study of the usefulness of keystroke dynamics to establish the person identity was done by Mondal, Soumik, and Patrick Bours (2017) in [3] . ...
doi:10.33564/ijeast.2019.v04i03.037
fatcat:mxtzdutob5g65n7pgkjt34fhmy
One-handed Keystroke Biometric Identification Competition
2015
2015 International Conference on Biometrics (ICB)
This work presents the results of the One-handed Keystroke Biometric Identification Competition (OhKBIC), an official competition of the 8th IAPR International Conference on Biometrics (ICB). ...
A unique keystroke biometric dataset was collected that includes freely-typed longtext samples from 64 subjects. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or the US government ...
doi:10.1109/icb.2015.7139076
dblp:conf/icb/MonacoPTBMRMFO15
fatcat:55kitaa6o5fzzaioppjbsqjkaq
Keystroke Dynamics: Concepts, Techniques, and Applications
[article]
2023
arXiv
pre-print
This survey can be a reference for researchers working on keystroke dynamics. ...
Keystroke dynamics promises to be non-intrusive and cost-effective as no addition hardware is required other than a keyboard. ...
They proposed pairwise user coupling technique along with different machine learning algorithms. They also tried to analyze person identification via an optimized feature set. ...
arXiv:2303.04605v1
fatcat:hwxavino55gdtefe34xqdkukli
Continuous Authentication by Free-text Keystroke based on CNN and RNN
2020
Computers & security
Personal keystroke modes are difficult to imitate and can therefore be used for identity authentication. ...
The keystroke habits of a person can be learned according to the keystroke data generated when the person inputs free text. ...
They used various machine learning algorithms in combination with the proposed pairwise user coupling technique and demonstrated the performance of each separate technique, as well as the performance when ...
doi:10.1016/j.cose.2020.101861
fatcat:zgnlnf2dhbgchddepujbbcnb2a
Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning
2018
Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA '18
The keystroke dynamics-based authentication proposed increases the security by verifying based on the alphanumeric-based and personal identification numberbased schemes. ...
Authenticating mobile phone users using keystroke analysis There has also been some work done by N. L. Clarke on mobile user authentication by using keystroke dynamics. ...
doi:10.1145/3230820.3230829
dblp:conf/icbea/KrishnamoorthyR18
fatcat:dejtezhncnf4vpss6pvwibwuua
APPLYING EMPIRICAL THRESHOLDING ALGORITHM FOR A KEYSTROKE DYNAMICS BASED AUTHENTICATION SYSTEM
2019
Journal of Information and Communication Technology
One way to strengthen the password-based authentication technique, is by keystroke dynamics. ...
The second step involves user authentication by applying these threshold values. ...
A KDA method using pairwise user coupling and machine learning algorithms were presented for both static and dynamic text content resulting to a moderate accuracy of 89.7% (Mondal & Bours, 2017) . ...
doi:10.32890/jict2018.18.4.1
fatcat:sobvnwofw5a6zoy4pwyal64rfu
Improving Mobile Device Security by Embodying and Co-adapting a Behavioral Biometric Interface
2022
Frontiers in Computer Science
In this paper, we study whether a subset of features that embody human cognitive motor features can be used to identify a particular user. ...
Recently, Frank et al. have suggested that security could be improved by having an interface with biometric features of finger swiping. ...
When a Personal Identification Number (P.I.N) is used for identification, an intruder can possibly steal the PIN by looking over the shoulder of a user logging into a system, i.e., "shoulder surfing." ...
doi:10.3389/fcomp.2022.754716
fatcat:7qaujf6dv5fplltlg6b3cvyxqq
Improving User Identification Accuracy in Facial and Voice Based Mood Analytics using Fused Feature Extraction
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
based personality profile which is almost unique for each user. ...
User identification involves a lot of complex procedures including image processing, voice processing, biometric data processing and other user specific parameters. ...
PROPOSED USER IDENTIFICATION ALGORITHM The proposed system can be represented using the following block diagram,
a. ...
doi:10.35940/ijitee.b1118.1292s319
fatcat:mit5yizrrvdmhp3dh2sxljmwvi
A heuristics for HTTP traffic identification in measuring user dissimilarity
2020
Human-Intelligent Systems Integration
This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the Internet ...
Additionally, this study extends the paradigm of user identification based on the intrinsic characteristics of users, exhibited in network traffic. ...
The study presented in (Bergadano et al. 2002) applied the keystroke dynamics of users for identification. ...
doi:10.1007/s42454-020-00010-2
fatcat:rv4hod2fq5fp5lkwkg2a4w7fpy
Use of random time-intervals (RTIs) generation for biometric verification
2009
Pattern Recognition
By incorporating it in an SVM-based verification system, which was trained and tested using a medium sized dataset (from 40 persons), a considerably low equal error rate (EER) of ∼5% was achieved. ...
By reconstructing and comparing the dynamics across repetitions from the same subject a noticeable consistency was observed. ...
Keystroke dynamics [3] also known as typing recognition, is a typical biometric approach of this kind. It analyses the way a person types. ...
doi:10.1016/j.patcog.2008.12.028
fatcat:xyug7grkubejpnryf7bucspsha
Fusion of eye movement and mouse dynamics for reliable behavioral biometrics
2016
Pattern Analysis and Applications
Achieving such results were possible using dissimilarity matrices based on dynamic time warping distance. ...
using a common web camera. ...
Therefore, these values were used in the current research. The sequential minimal optimization algorithm was used [50] with the multiclass problem solved using pairwise coupling [51] . ...
doi:10.1007/s10044-016-0568-5
fatcat:ywgscrrcebbmbpolyts4pgblfq
Ranking to Learn and Learning to Rank: On the Role of Ranking in Pattern Recognition Applications
[article]
2017
arXiv
pre-print
In such a case feature selection is used, that, by producing ranked lists of features, helps to filter out the unwanted information. ...
The rationale behind this fact is that many pattern recognition problems are by nature ranking problems. ...
Data needed to analyze keystroke dynamics is
obtained by keystroke logging. ...
arXiv:1706.05933v1
fatcat:oc4xtmyqkvf4njpqsojewv75qu
Investigating the Tradeoffs of Everyday Text-Entry Collection Methods
2022
CHI Conference on Human Factors in Computing Systems
Here, participants contributed by transcribing, composing, passively having sentences analyzed and refecting on their contributions. ...
The act of typing itself thereby encodes rich information, such as the typing method, the context it is performed in, and individual traits of the person typing. ...
Thus, even if an attacker knows the users' password, an additional implicit security layer can verify the identity based on keystroke dynamics [12, 14] . ...
doi:10.1145/3491102.3501908
fatcat:ahio32hbdvfmbieev7hgdwgfym
« Previous
Showing results 1 — 15 out of 127 results