A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Capturing Cognitive Fingerprints from Keystroke Dynamics
2013
IT Professional Magazine
Results from a large-scale experiment at Iowa State University show the system's effectiveness. ...
The authors present an authentication system that applies machine learning techniques to observe a user's cognitive typing rhythm. ...
Capturing Cognitive Fingerprints from Keystroke Dynamics order of the timing tends to be consistent. ...
doi:10.1109/mitp.2013.52
fatcat:csndkdleobfnfp2tsmyuh6llfy
ENHANCING SECURITY USING KEYSTROKE DYNAMICS
2019
International Journal of Engineering Applied Sciences and Technology
Keystroke dynamics is a behavioral biometrics which captures the typing rhythms of users and then authenticates them based on the dynamics captured. ...
Both the method stores only data discarding the captured image; making it impossible to recreate the fingerprints. ...
doi:10.33564/ijeast.2019.v04i03.037
fatcat:mxtzdutob5g65n7pgkjt34fhmy
The Analysis of Emotions over Keystroke Dynamics
2018
DEStech Transactions on Computer Science and Engineering
This paper investigates the effectiveness of the keystroke dynamics with the influence of emotion. ...
Computer network further enables the information exchange from far remote locations within an unbelievable speed. ...
Our study adopted this keystroke dynamics data collection scheme to create the baseline of database to study the influence from emotion. ...
doi:10.12783/dtcse/iece2018/26620
fatcat:p5tlzhucc5hi7mbavo5knfqy5u
Screen Fingerprints: A Novel Modality for Active Authentication
2013
IT Professional Magazine
Such a fingerprint is acquired by taking a screen recording of the computer being used and extracting discriminative visual features from the recording. ...
A screen fingerprint is proposed as a new biometric modality for active authentication. ...
Acknowledgments This work was supported by cooperative agreement FA87501220199 from DARPA. ...
doi:10.1109/mitp.2013.56
fatcat:54mxbhdn2necdhx2uwjfckyqym
Study of the Perception on the Biometric Technology by the Portuguese Citizens
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Keystroke Dynamics This technique is based on the person's behavior when typing text into a keyboard, or the measurement of typing speed. ...
There are several ways to measure the dynamics of typing: the time interval between successive keystrokes; the time a key is pressed; the frequency of typing wrong keys and; the habit of using different ...
doi:10.1007/978-3-642-33448-1_37
fatcat:2idmcvt5vrhxvlyparmqv7vq3a
Combining Keystroke Dynamics and Face Recognition for User Verification
2015
2015 IEEE 18th International Conference on Computational Science and Engineering
Keystroke Dynamics is a novel Biometric Technique; it is not only unobtrusive, but also transparent and inexpensive. ...
The fusion of keystroke dynamics and Face Recognition engenders the most desirable characteristics of a verification system. ...
Keystroke dynamics are an effective behavioral biometric, which captures the habitual patterns or rhythms an individual exhibits while typing on a keyboard input device. ...
doi:10.1109/cse.2015.37
dblp:conf/cse/GuptaKJSAC15
fatcat:p3mo7is5nzaqvfzglkxx23k7q4
Developing a Keystroke Biometric System for Continual Authentication of Computer Users
2012
2012 European Intelligence and Security Informatics Conference
Using keystroke data from 120 users, system performance was obtained as a function of two independent variables: the user population size and the number of keystrokes per sample. ...
The biometric system consists of components for data capture, feature extraction, authentication classification, and receiveroperating-characteristic curve generation. ...
computational behavioral cognitive "fingerprint" of the person operating the computer. ...
doi:10.1109/eisic.2012.58
dblp:conf/eisic/MonacoBCT12
fatcat:hr3yln4g6zhlzgzf5yzecnvg6q
Behavioural Biometrics and Cognitive Security Authentication Comparison Study
2013
Advanced Computing An International Journal
verification and identification within the context of a keystroke dynamics based user authentication system. ...
There are several forms of behavioural biometrics such as voice analysis, signature verification, and keystroke dynamics. ...
Keystroke dynamics is a particular instance of a behavioural biometrics that captures the typing style of a user. ...
doi:10.5121/acij.2013.4602
fatcat:b6h23rh2cretbjdpstvqnw2g2e
Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects
[article]
2018
arXiv
pre-print
generated from normal usage of computers as input and are not interruptive. ...
Keystroke timing based active authentication systems are conceptually attractive because: (i) they use the keyboard as the sensor and are not hardware-cost prohibitive, and (ii) they use the keystrokes ...
For this reason, active authentication systems rely on behavioral biometrics like keystroke dynamics [1] (how the user types), mouse dynamics [2] (how the user uses the mouse), and/or gaze dynamics ...
arXiv:1804.08180v1
fatcat:ea6alpnavzhkzg4fbplutb22iq
Electromyograph and keystroke dynamics for spoof-resistant biometric authentication
2015
2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
The idea is to monitor both biometric modalities when this action is performed and study user verification across data capture sessions and within capture sessions. ...
Three of the more well studied modalities in this field are the face, iris and fingerprint, with the latter two reporting very high user identification/verification rates. ...
EMG and keystroke dynamics. ...
doi:10.1109/cvprw.2015.7301326
dblp:conf/cvpr/VenugopalanJCS15
fatcat:oqvro6q3fze73liwssx7uacnra
Identifying users with application-specific command streams
2014
2014 Twelfth Annual International Conference on Privacy, Security and Trust
It did so by analyzing the user's keystroke and/or mouse dynamics. ...
However, none had explored the idea of creating profiles by capturing users' usage characteristics when interacting with a specific application beyond how a user strikes the keyboard or moves the mouse ...
They did so by analyzing the user's keystroke and/or mouse dynamics. ...
doi:10.1109/pst.2014.6890944
dblp:conf/pst/MasriWLK14
fatcat:oizpft3yrfbpzpkfq7owaff6sq
A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations
[chapter]
English
2015
Gate to Computer Science and Research
English
In this review paper we present a comprehensive survey of research efforts in the past couple of decades on keystroke dynamics biometrics. ...
We review the literature in light of various feature extraction, feature matching and classification methods for keystroke dynamics. ...
The dataset includes 60 samples from each subject resulting in a total of 7555 captures with an average of 51 captures per subject. ...
doi:10.15579/gcsr.vol2.ch1
fatcat:zrl7kjp2dvbwvl7il3iyipqk6i
A broad review on non-intrusive active user authentication in biometrics
2021
Journal of Ambient Intelligence and Humanized Computing
Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics. ...
Once the training phase is complete the system is tested, where once again user keystroke dynamics is captured and matched against the user keystroke profile, which is stored during the training phase. ...
fingerprint of authentic user behaviour (Lang and Haar 2020) . ...
doi:10.1007/s12652-021-03301-x
pmid:34109006
pmcid:PMC8177270
fatcat:kwfsgeg44nd55ktvsd5vfrreza
Individuality That is Unheard of: Systematic Temporal Deviations in Scale Playing Leave an Inaudible Pianistic Fingerprint
2013
Frontiers in Psychology
Note-by-note timing deviations away from regularity form a remarkably consistent "pianistic fingerprint." ...
Euclidian distances between deviation traces originating from different pianists were reliably larger than traces originating from the same pianist. ...
Hence we can speak of a pianistic fingerprint.
Frontiers in Psychology | Cognitive Science What determines this temporal fingerprint? ...
doi:10.3389/fpsyg.2013.00134
pmid:23519688
pmcid:PMC3604639
fatcat:g753dy4j7rf7leplbhdgdgwyt4
On Continuous User Authentication via Typing Behavior
2014
IEEE Transactions on Image Processing
Unlike the typical continuous biometrics such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging. ...
Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. ...
., face, fingerprint, iris) or behavioral traits (e.g., gait, keystroke dynamics, mouse dynamics) [15] . Among these biometric modalities, face, fingerprint, keystroke dynamics (KD), and Fig . 1. ...
doi:10.1109/tip.2014.2348802
pmid:25137729
fatcat:vmhkjyw46jexrlfoystuotzk6q
« Previous
Showing results 1 — 15 out of 276 results