Skip to main content
Top

2019 | OriginalPaper | Chapter

Analysis of Typing Pattern in Identifying Soft Biometric Information and Its Impact in User Recognition

Authors : Soumen Roy, Utpal Roy, D. D. Sinha

Published in: Information Technology and Applied Mathematics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As of now, the performance of keystroke dynamics biometric in user recognition is not acceptable in practice due to intra-class variations, high failure to enroll rate (FER) or various troubles in data acquisition methods or diverse use of sensing devices. As per the previous study, the performance of this technique can be improved by incorporation of gender information, a soft biometric characteristic, extracted from the typing pattern on a computer keyboard that provides some additional information about the user. This soft biometric trait has low user discriminating power but can be used to enhance the performance of user recognition in accuracy and time efficiency. Furthermore, it has been observed that the age group (18–30/30+ or <18/18+), gender (male/female), handedness (left-handed/right-handed), hand(s) used (one hand/both hands), typing skill (touch/others), and emotional states (anger/excitation) can be extracted from the way of typing on a computer keyboard for single predefined text. In this paper, we are interested in identifying multiple soft biometric traits using two leading machine learning methods: support vector machine with radial basis function (SVM-RBF) and fuzzy-rough nearest neighbor with vaguely quantified rough set (FRNN-VQRS) on multiple publicly available authentic and recognized keystroke dynamics datasets collected through a computer keyboard as well as touchscreen phone. The performance of machine learning methods are changed significantly in changing dataset in keystroke dynamics domain, but the evaluation performance of FRNN-VQRS in our experiment is promising and consistent in identifying traits. At the end, the impacts of the incorporation of soft biometric traits with primary biometric characteristics in user recognition are presented and compared the evaluation performance of nine anomaly detectors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Roy, S., Roy, U., Sinha, D.D.: Free-text user authentication technique through keystroke dynamics. In: 2014 International Conference of High Performing Computer Application ICHPCA 2014 (2015) Roy, S., Roy, U., Sinha, D.D.: Free-text user authentication technique through keystroke dynamics. In: 2014 International Conference of High Performing Computer Application ICHPCA 2014 (2015)
2.
go back to reference CENELEC, alarm systems—Access control systems for use in security applications—part 1. In: System Requirements, EN 50133-1 edition (1996) CENELEC, alarm systems—Access control systems for use in security applications—part 1. In: System Requirements, EN 50133-1 edition (1996)
3.
go back to reference Zulkarnain, S., et al.: Soft biometrics for keystroke dynamics: profiling individuals while typing passwords. Comput. Secur. (2014) Zulkarnain, S., et al.: Soft biometrics for keystroke dynamics: profiling individuals while typing passwords. Comput. Secur. (2014)
4.
go back to reference Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of SIGCHI Conference Human Factors Computer System, pp. 715–724 (2011) Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of SIGCHI Conference Human Factors Computer System, pp. 715–724 (2011)
5.
go back to reference Roy, S., Roy, U., Sinha, D.D.: ACO-random forest approach to protect the kids from internet threats through keystroke. Int. J. Eng. Technol. 2–9 (2017) (Accepted) Roy, S., Roy, U., Sinha, D.D.: ACO-random forest approach to protect the kids from internet threats through keystroke. Int. J. Eng. Technol. 2–9 (2017) (Accepted)
6.
go back to reference Uzun, Y., Bicakci, K., Uzunay, Y.: Could We Distinguish Child Users from Adults Using Keystroke Dynamics? (2014) Uzun, Y., Bicakci, K., Uzunay, Y.: Could We Distinguish Child Users from Adults Using Keystroke Dynamics? (2014)
7.
go back to reference Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results, in Technical Report R-2526-NSF. Rand Corporation, May (1980) Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results, in Technical Report R-2526-NSF. Rand Corporation, May (1980)
8.
go back to reference Jain, A., Nandakumar, K., Lu, X., Park, U.: Integrating faces, fingerprints, and soft biometric traits for user recognition. Biometr. Authenticat. no. May, 259–269 (2004) Jain, A., Nandakumar, K., Lu, X., Park, U.: Integrating faces, fingerprints, and soft biometric traits for user recognition. Biometr. Authenticat. no. May, 259–269 (2004)
9.
go back to reference Frank, E., Hall, M.A., Witten, I.H.: The Weka Workbench Data Mining Practical Machine Learning Tools and Techniques, 4th ed. (1999) Frank, E., Hall, M.A., Witten, I.H.: The Weka Workbench Data Mining Practical Machine Learning Tools and Techniques, 4th ed. (1999)
10.
go back to reference Giot, R., Rosenberger, C.: A new soft biometric approach for keystroke dynamics based on gender recognition. Int. J. Inf. Technol. Manag. Spec. Issue Adv. Trends Biometric. 11(August), 1–16 (2012) Giot, R., Rosenberger, C.: A new soft biometric approach for keystroke dynamics based on gender recognition. Int. J. Inf. Technol. Manag. Spec. Issue Adv. Trends Biometric. 11(August), 1–16 (2012)
11.
go back to reference Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics for keystroke dynamics. In: 10th International Conference on Image Analysis and Recognition (ICIAR), pp. 11–18 (2013) Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics for keystroke dynamics. In: 10th International Conference on Image Analysis and Recognition (ICIAR), pp. 11–18 (2013)
12.
go back to reference Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 125–134 (2009) Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 125–134 (2009)
13.
go back to reference El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: 2014 International Carnahan Conference Secured Technology, pp. 1–4 (2014) El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: 2014 International Carnahan Conference Secured Technology, pp. 1–4 (2014)
14.
go back to reference Antal, M., Szabo, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: Proceedings of 2015 20th International Conference Control System Computer Science CSCS 2015, pp. 343–350 (2015) Antal, M., Szabo, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: Proceedings of 2015 20th International Conference Control System Computer Science CSCS 2015, pp. 343–350 (2015)
15.
go back to reference Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based typing biometrics user authentication using the fuzzy ARTMAP neural network. In: International Conference on Neural Information Processing (ICONIP) (2005) Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based typing biometrics user authentication using the fuzzy ARTMAP neural network. In: International Conference on Neural Information Processing (ICONIP) (2005)
16.
go back to reference Roth, J., Liu, X., Ross, A., Metaxas, D.: Biometric authentication via keystroke sound. In: 2013 International Conference on Biometrics, pp. 1–8 (2013) Roth, J., Liu, X., Ross, A., Metaxas, D.: Biometric authentication via keystroke sound. In: 2013 International Conference on Biometrics, pp. 1–8 (2013)
17.
go back to reference Montalvão, J., Freire, E.O., Bezerra, M.A., Garcia, R.: Contributions to empirical analysis of keystroke dynamics in passwords. Pattern Recogn. Lett. (2015) Montalvão, J., Freire, E.O., Bezerra, M.A., Garcia, R.: Contributions to empirical analysis of keystroke dynamics in passwords. Pattern Recogn. Lett. (2015)
18.
go back to reference Bello, L., Bertacchini, M.: Collection and publication of a fixed text keystroke dynamics dataset. In: CACIC 2010—XVI Argentino Ciencias LA Congress of Computer Science, pp. 822–831 (2010) Bello, L., Bertacchini, M.: Collection and publication of a fixed text keystroke dynamics dataset. In: CACIC 2010—XVI Argentino Ciencias LA Congress of Computer Science, pp. 822–831 (2010)
19.
go back to reference Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), 2013, no. September, pp. 1–8 Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), 2013, no. September, pp. 1–8
20.
go back to reference Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Intelligence of Information Hiding and Multimedia Signal Process, pp. 11–15 (2012) Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Intelligence of Information Hiding and Multimedia Signal Process, pp. 11–15 (2012)
21.
go back to reference Killourhy, K.S.: A scientific understanding of keystroke dynamics. Dr. Thesis, School of Computer Science, Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213, no. January, pp. 1–198 (2012) Killourhy, K.S.: A scientific understanding of keystroke dynamics. Dr. Thesis, School of Computer Science, Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213, no. January, pp. 1–198 (2012)
22.
go back to reference Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), September, pp. 1–8 (2013) Idrus, S.Z.S., Cherrier, E., Rosenberger, C., Bours, P.: Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), September, pp. 1–8 (2013)
23.
go back to reference Jensen, R., Cornelis, C.: Fuzzy rough nearest neighbour classification and prediction. Theor. Comput. Sci. 412(42), 5871–5884 (2011)MathSciNetCrossRef Jensen, R., Cornelis, C.: Fuzzy rough nearest neighbour classification and prediction. Theor. Comput. Sci. 412(42), 5871–5884 (2011)MathSciNetCrossRef
24.
go back to reference Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)MathSciNetCrossRef Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134–2152 (2007)MathSciNetCrossRef
25.
go back to reference Hsu, C.-W., Chang, C.-C., Lin, C.-J.: A practical guide to support vector classification. BJU Int. 101(1), 1396–1400 (2008) Hsu, C.-W., Chang, C.-C., Lin, C.-J.: A practical guide to support vector classification. BJU Int. 101(1), 1396–1400 (2008)
26.
go back to reference Alghamdi, S.J., Elrefaei, L.A.: Dynamic user verification using touch keystroke based on medians vector proximity. In: Proceedings of 7th International Conference Computer Intelligence Communication System Networks, CICSyN 2015, pp. 121–126 (2015) Alghamdi, S.J., Elrefaei, L.A.: Dynamic user verification using touch keystroke based on medians vector proximity. In: Proceedings of 7th International Conference Computer Intelligence Communication System Networks, CICSyN 2015, pp. 121–126 (2015)
27.
go back to reference Zulkarnain, S., et al.: Keystroke Dynamics Performance Enhancement With Soft Biometrics Zulkarnain, S., et al.: Keystroke Dynamics Performance Enhancement With Soft Biometrics
28.
go back to reference Roy, S., Roy, U., Sinha, D.D.: Comparative study of various features-mining-based classifiers in different keystroke dynamics datasets. In: Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems, vol. 2, pp. 155–164 (2016) Roy, S., Roy, U., Sinha, D.D.: Comparative study of various features-mining-based classifiers in different keystroke dynamics datasets. In: Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems, vol. 2, pp. 155–164 (2016)
Metadata
Title
Analysis of Typing Pattern in Identifying Soft Biometric Information and Its Impact in User Recognition
Authors
Soumen Roy
Utpal Roy
D. D. Sinha
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7590-2_5

Premium Partner