Abstract
Authentication is the verification of the identity of a person to access a resource or perform an activity. Authentication based on keystroke dynamics biometrics validates a legitimate user, comparing his typing on keyboard with his stored template. An important group of factors influences the capture of the raw data generated by the user’s typing. These Confounding Factors have been addressed in the literature from different approaches, and most of these studies agree that their influence affects the reliability of Keystroke Dynamics. In this research, a taxonomy of Confounding Factors is proposed, and several mitigation actions are discussed to face them.
Chapter PDF
Similar content being viewed by others
References
Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In: Zhong, Y., Deng, Y. (eds.) Recent Advances in User Authentication Using Keystroke Dynamics Biometrics. Science Gate Publishing (2015)
Spillane, R.: Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17, 3346 (1975)
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. DTIC Document (1980)
Killourhy, K.S.: The role of environmental factors in keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009) Supplemental Volume (Student Forum), pp. 125–134 (2009)
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems and Networks. DSN 2009, pp. 125–134 (2009)
Killourhy, K.S.: A scientific understanding of keystroke dynamics. DTIC Document (2012)
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Applied Soft Computing 11, 1565–1573 (2011)
Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication—A survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 17–23. IEEE (2013)
Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 116–139 (2012)
Giot, R., El-Abed, M., Rosenberger, C.: Keystroke Dynamics Authentication. Biometrics chapitre 8 (2011)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 4–20 (2004)
Bours, P., Mondal, S.: Continuous Authentication with Keystroke Dynamics (2015)
Maxion, R.: Making experiments dependable. In: Jones, C.B., Lloyd, J.L. (eds.) Dependable and Historic Computing. LNCS, vol. 6875, pp. 344–357. Springer, Heidelberg (2011)
Killourhy, K.S., Maxion, R.A.: The effect of clock resolution on keystroke dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331–350. Springer, Heidelberg (2008)
Lee, J.-W., Choi, S.-S., Moon, B.-R.: An evolutionary keystroke authentication based on ellipsoidal hypothesis space. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2090–2097. ACM (2007)
Killourhy, K., Maxion, R.: Why did my detector do That?! In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 256–276. Springer, Heidelberg (2010)
Bello, L., Bertacchini, M., Benitez, C., Pizzoni, J.C., Cipriano, M.: Collection and publication of a fixed text keystroke dynamics dataset. In: XVI Congreso Argentino de Ciencias de la Computación (2010)
Villani, M., Tappert, C., Ngo, G., Simone, J., Fort, H.S., Cha, S.-H.: Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. In: 2006 Computer Vision and Pattern Recognition Workshop, CVPRW 2006, p. 39. IEEE (2006)
Roy, S., Roy, U., Sinha, D.: Text-based Analysis of Keystroke Dynamics in User Authentication. International Journal of Computer Sciences and Engineering 3 (2015)
Lee, P.-M., Chen, L.-Y., Tsui, W.-H., Hsiao, T.-C.: Will user authentication using keystroke dynamics biometrics be interfered by emotions? In: Zhong, Y., Deng, Y. (eds.) Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, GCSR vol. 2, pp. 71–81. Science Gate Publishing (2015)
Syed Idrus, S.Z., Cherrier, E., Rosenberger, C., Mondal, S., Bours, P.: Keystroke dynamics performance enhancement with soft biometrics. In: IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), Hong Kong, China (2015)
Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 117–123. IEEE (2012)
Lee, P.-M., Tsui, W.-H., Hsiao, T.-C.: The influence of emotion on keyboard typing: an experimental study using visual stimuli. Biomedical Engineering Online 13, 81 (2014)
Deng, Y., Zhong, Y.: Keystroke dynamics user authentication using advanced machine learning methods. In: Zhong, Y., Deng, Y. (eds.) Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, GCSR vol. 2, pp. 23–40. Science Gate Publishing (2015)
Microsoft: Timers, Timer Resolution, and Development of Efficient Code (2010). http://www.microsoft.com/whdc/system/pnppwr/powermgmt/Timer-Resolution.msp
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Pérez-García, O.A. (2015). Confounding Factors in Keystroke Dynamics. In: Pardo, A., Kittler, J. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2015. Lecture Notes in Computer Science(), vol 9423. Springer, Cham. https://doi.org/10.1007/978-3-319-25751-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-25751-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25750-1
Online ISBN: 978-3-319-25751-8
eBook Packages: Computer ScienceComputer Science (R0)