skip to main content
10.1145/1978942.1979046acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Identifying emotional states using keystroke dynamics

Authors Info & Claims
Published:07 May 2011Publication History

ABSTRACT

The ability to recognize emotions is an important part of building intelligent computers. Emotionally-aware systems would have a rich context from which to make appropriate decisions about how to interact with the user or adapt their system response. There are two main problems with current system approaches for identifying emotions that limit their applicability: they can be invasive and can require costly equipment. Our solution is to determine user emotion by analyzing the rhythm of their typing patterns on a standard keyboard. We conducted a field study where we collected participants' keystrokes and their emotional states via self-reports. From this data, we extracted keystroke features, and created classifiers for 15 emotional states. Our top results include 2-level classifiers for confidence, hesitance, nervousness, relaxation, sadness, and tiredness with accuracies ranging from 77 to 88%. In addition, we show promise for anger and excitement, with accuracies of 84%.

References

  1. Admit One Security. AdmitOneSecurity. http://www.admitonesecurity.com.Google ScholarGoogle Scholar
  2. Bender, S. and Postley, H. Key sequence rhythm recognition system and method.Google ScholarGoogle Scholar
  3. Bergadano, F., Gunetti, D., and Picardi, C. Identity verification through dynamic keystroke analysis. Intell. Data Anal. 7, 5 (2003), 469--496. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bergadano, F., Gunetti, D., and Picardi, C. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 4 (2002), 367--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Brown, M. and Rogers, S. J. User identification via keystroke characteristics of typed names using neural networks. Int. J. Man-Mach. Stud. 39, 6 (1993), 999--1014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Carroll, L. Alice's Adventures in Wonderland. The Gutenberg Project, 2008.Google ScholarGoogle Scholar
  7. Chen, D. and Vertegaal, R. Using mental load for managing interruptions in physiologically attentive user interfaces. CHI '04 ext. abst. on Human fac. in comp. systems, ACM (2004), 1513--1516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Coan, J. and Allen, J. Handbook of Emotion Elicitation and Assessment. Oxford University Press, New York, USA, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  9. De Silva, L. and Suen Chun, H. Real-time facial feature extraction and emotion recognition. Infor., Comm., and Sig. Proc. 2003 and the 4th Pac. Rim Conf. on Multimedia, (2003).Google ScholarGoogle Scholar
  10. Dowland, P. and Furnell, S. A Long-term trial of keystroke profiling using digraph, trigraph, and keyword latencies. In IFIP Intern. Fed. for Infor. Processing. Springer Boston, 2004, 275--289.Google ScholarGoogle Scholar
  11. Drummond, C. and Holte, R. C4.5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling. (2003).Google ScholarGoogle Scholar
  12. Ekman, P. Basic Emotions. John Wiley & Sons, Ltd, 2005.Google ScholarGoogle Scholar
  13. Epp, C. Identifying emotional states through keystroke dynamics. 2010. http://library2.usask.ca/theses/available/etd-08312010-131027/.Google ScholarGoogle Scholar
  14. Fairclough, S. Fundamentals of physiological computing. Inter. with Comp. 21, 1-2 (2009), 133--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gaines, R., Lisowski, W., Press, S., and Shapiro, N. Authentication by keystroke timing: some preliminary results. 1980.Google ScholarGoogle Scholar
  16. Gunetti, D. and Picardi, C. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8, 3 (2005), 312--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gunetti, D., Picardi, C., and Ruffo, G. Keystroke analysis of different languages: a case study. In Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005, 133--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hall, M. Correlation-based feature subset selection for machine learning. 1999.Google ScholarGoogle Scholar
  19. Hektner, J., Schmidt, J., and Csikszentmihalyi, M. Experience Sampling Method: Measuring the Quality of Everyday Life. Sage Publications, Thousand Oaks, 2007.Google ScholarGoogle Scholar
  20. Jain, A., Duin, R., and Mao, J. Statistical pattern recognition: a review. IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 1 (2000), 4--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Joyce, R. and Gupta, G. Identity authentication based on keystroke latencies. Commun. ACM 33, 2 (1990), 168--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Khan, M. M., Ingleby, M., and Ward, R. D. Automated facial expression classification and affect interpretation using infrared measurement of facial skin temperature variations. ACM Trans. Auton. Adapt. Syst. 1, 1 (2006), 91--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lang, P. Behavioral treatment and bio-behavioral assessment: computer applications. Technology in mental health care delivery systems, (1980), 119--137.Google ScholarGoogle Scholar
  24. Mandryk, R. L. and Atkins, M. S. A fuzzy physiological approach for continuously modeling emotion during interaction with play technologies. Int. J. Hum.-Comput. Stud. 65, 4 (2007), 329--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Monrose, F. and Rubin, A. D. Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 4 (2000), 351--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Partala, T., Surakka, V., and Vanhala, T. Real-time estimation of emotional experiences from facial expressions. Interact. Comput. 18, 2 (2006), 208--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Picard, R. W. Affective Computing. MIT Press, Cambridge, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Russell, J. Core affect and the psychological construction of emotion. Psychological Review 110, 1 (2003), 145--172.Google ScholarGoogle ScholarCross RefCross Ref
  29. Sheng, Y., Phoha, V., and Rovnyak, S. A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics 35, 4 (2005), 826--833. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Stern, R. M., Ray, W. J., and Quigley, K. S. Psychophysiological recording. Oxford University Press, New York, 2001.Google ScholarGoogle Scholar
  31. Vizer, L. M., Zhou, L., and Sears, A. Automated stress detection using keystroke and linguistic features: An exploratory study. Int. J. Hum.-Comput. Stud. 67, 10 (2009), 870--886. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Ward, R. D. and Marsden, P. H. Physiological responses to different web page designs. Int. J. Hum.-Comput. Stud. 59, 1-2 (2003), 199--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Wilson, G. and Sasse, M. Do users always know what's good for them? Utilizing physiological responses to assess media quality. (2000), 327--339.Google ScholarGoogle Scholar
  34. Witten, I. and Frank, E. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, San Francisco, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Zimmermann, P., Guttormsen, S., Danuser, B., and Gomez, P. Affective computing - a rationale for measuring mood with mouse and keyboard. Inter. J. of Occ. Saf. and Ergo. 9, 4 (2003), 539--551.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Identifying emotional states using keystroke dynamics
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        May 2011
        3530 pages
        ISBN:9781450302289
        DOI:10.1145/1978942

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 May 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '11 Paper Acceptance Rate410of1,532submissions,27%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader