276 Hits in 3.1 sec

Capturing Cognitive Fingerprints from Keystroke Dynamics

J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, Sun-Yuan Kung
2013 IT Professional Magazine  
Results from a large-scale experiment at Iowa State University show the system's effectiveness.  ...  The authors present an authentication system that applies machine learning techniques to observe a user's cognitive typing rhythm.  ...  Capturing Cognitive Fingerprints from Keystroke Dynamics order of the timing tends to be consistent.  ... 
doi:10.1109/mitp.2013.52 fatcat:csndkdleobfnfp2tsmyuh6llfy


Preetha S ., Suhas Kini K ., Shailesh A Patil .
2019 International Journal of Engineering Applied Sciences and Technology  
Keystroke dynamics is a behavioral biometrics which captures the typing rhythms of users and then authenticates them based on the dynamics captured.  ...  Both the method stores only data discarding the captured image; making it impossible to recreate the fingerprints.  ... 
doi:10.33564/ijeast.2019.v04i03.037 fatcat:mxtzdutob5g65n7pgkjt34fhmy

The Analysis of Emotions over Keystroke Dynamics

Su-xia CUI, Odinaka EKWONNAH, Yong-hui WANG
2018 DEStech Transactions on Computer Science and Engineering  
This paper investigates the effectiveness of the keystroke dynamics with the influence of emotion.  ...  Computer network further enables the information exchange from far remote locations within an unbelievable speed.  ...  Our study adopted this keystroke dynamics data collection scheme to create the baseline of database to study the influence from emotion.  ... 
doi:10.12783/dtcse/iece2018/26620 fatcat:p5tlzhucc5hi7mbavo5knfqy5u

Screen Fingerprints: A Novel Modality for Active Authentication

Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry Davis
2013 IT Professional Magazine  
Such a fingerprint is acquired by taking a screen recording of the computer being used and extracting discriminative visual features from the recording.  ...  A screen fingerprint is proposed as a new biometric modality for active authentication.  ...  Acknowledgments This work was supported by cooperative agreement FA87501220199 from DARPA.  ... 
doi:10.1109/mitp.2013.56 fatcat:54mxbhdn2necdhx2uwjfckyqym

Study of the Perception on the Biometric Technology by the Portuguese Citizens [chapter]

Daniela Borges, Vítor J. Sá, Sérgio Tenreiro de Magalhães, Henrique Santos
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Keystroke Dynamics This technique is based on the person's behavior when typing text into a keyboard, or the measurement of typing speed.  ...  There are several ways to measure the dynamics of typing: the time interval between successive keystrokes; the time a key is pressed; the frequency of typing wrong keys and; the habit of using different  ... 
doi:10.1007/978-3-642-33448-1_37 fatcat:2idmcvt5vrhxvlyparmqv7vq3a

Combining Keystroke Dynamics and Face Recognition for User Verification

Abhinav Gupta, Agrim Khanna, Anmol Jagetia, Devansh Sharma, Sanchit Alekh, Vaibhav Choudhary
2015 2015 IEEE 18th International Conference on Computational Science and Engineering  
Keystroke Dynamics is a novel Biometric Technique; it is not only unobtrusive, but also transparent and inexpensive.  ...  The fusion of keystroke dynamics and Face Recognition engenders the most desirable characteristics of a verification system.  ...  Keystroke dynamics are an effective behavioral biometric, which captures the habitual patterns or rhythms an individual exhibits while typing on a keyboard input device.  ... 
doi:10.1109/cse.2015.37 dblp:conf/cse/GuptaKJSAC15 fatcat:p3mo7is5nzaqvfzglkxx23k7q4

Developing a Keystroke Biometric System for Continual Authentication of Computer Users

John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert
2012 2012 European Intelligence and Security Informatics Conference  
Using keystroke data from 120 users, system performance was obtained as a function of two independent variables: the user population size and the number of keystrokes per sample.  ...  The biometric system consists of components for data capture, feature extraction, authentication classification, and receiveroperating-characteristic curve generation.  ...  computational behavioral cognitive "fingerprint" of the person operating the computer.  ... 
doi:10.1109/eisic.2012.58 dblp:conf/eisic/MonacoBCT12 fatcat:hr3yln4g6zhlzgzf5yzecnvg6q

Behavioural Biometrics and Cognitive Security Authentication Comparison Study

Karan Khare, Surbhi Rautji, Deepak Gaur
2013 Advanced Computing An International Journal  
verification and identification within the context of a keystroke dynamics based user authentication system.  ...  There are several forms of behavioural biometrics such as voice analysis, signature verification, and keystroke dynamics.  ...  Keystroke dynamics is a particular instance of a behavioural biometrics that captures the typing style of a user.  ... 
doi:10.5121/acij.2013.4602 fatcat:b6h23rh2cretbjdpstvqnw2g2e

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects [article]

Md Enamul Karim, Kiran S. Balagani, Aaron Elliott, David Irakiza, Mike O'Neal, Vir Phoha
2018 arXiv   pre-print
generated from normal usage of computers as input and are not interruptive.  ...  Keystroke timing based active authentication systems are conceptually attractive because: (i) they use the keyboard as the sensor and are not hardware-cost prohibitive, and (ii) they use the keystrokes  ...  For this reason, active authentication systems rely on behavioral biometrics like keystroke dynamics [1] (how the user types), mouse dynamics [2] (how the user uses the mouse), and/or gaze dynamics  ... 
arXiv:1804.08180v1 fatcat:ea6alpnavzhkzg4fbplutb22iq

Electromyograph and keystroke dynamics for spoof-resistant biometric authentication

Shreyas Venugopalan, Felix Juefei-Xu, Benjamin Cowley, Marios Savvides
2015 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
The idea is to monitor both biometric modalities when this action is performed and study user verification across data capture sessions and within capture sessions.  ...  Three of the more well studied modalities in this field are the face, iris and fingerprint, with the latter two reporting very high user identification/verification rates.  ...  EMG and keystroke dynamics.  ... 
doi:10.1109/cvprw.2015.7301326 dblp:conf/cvpr/VenugopalanJCS15 fatcat:oqvro6q3fze73liwssx7uacnra

Identifying users with application-specific command streams

Alaa El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang
2014 2014 Twelfth Annual International Conference on Privacy, Security and Trust  
It did so by analyzing the user's keystroke and/or mouse dynamics.  ...  However, none had explored the idea of creating profiles by capturing users' usage characteristics when interacting with a specific application beyond how a user strikes the keyboard or moves the mouse  ...  They did so by analyzing the user's keystroke and/or mouse dynamics.  ... 
doi:10.1109/pst.2014.6890944 dblp:conf/pst/MasriWLK14 fatcat:oizpft3yrfbpzpkfq7owaff6sq

A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations [chapter]

Yu Zhong, Yunbin Deng
2015 Gate to Computer Science and Research  
In this review paper we present a comprehensive survey of research efforts in the past couple of decades on keystroke dynamics biometrics.  ...  We review the literature in light of various feature extraction, feature matching and classification methods for keystroke dynamics.  ...  The dataset includes 60 samples from each subject resulting in a total of 7555 captures with an average of 51 captures per subject.  ... 
doi:10.15579/gcsr.vol2.ch1 fatcat:zrl7kjp2dvbwvl7il3iyipqk6i

A broad review on non-intrusive active user authentication in biometrics

Princy Ann Thomas, K. Preetha Mathew
2021 Journal of Ambient Intelligence and Humanized Computing  
Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics.  ...  Once the training phase is complete the system is tested, where once again user keystroke dynamics is captured and matched against the user keystroke profile, which is stored during the training phase.  ...  fingerprint of authentic user behaviour (Lang and Haar 2020) .  ... 
doi:10.1007/s12652-021-03301-x pmid:34109006 pmcid:PMC8177270 fatcat:kwfsgeg44nd55ktvsd5vfrreza

Individuality That is Unheard of: Systematic Temporal Deviations in Scale Playing Leave an Inaudible Pianistic Fingerprint

Floris Tijmen Van Vugt, Hans-Christian Jabusch, Eckart Altenmüller
2013 Frontiers in Psychology  
Note-by-note timing deviations away from regularity form a remarkably consistent "pianistic fingerprint."  ...  Euclidian distances between deviation traces originating from different pianists were reliably larger than traces originating from the same pianist.  ...  Hence we can speak of a pianistic fingerprint. Frontiers in Psychology | Cognitive Science What determines this temporal fingerprint?  ... 
doi:10.3389/fpsyg.2013.00134 pmid:23519688 pmcid:PMC3604639 fatcat:g753dy4j7rf7leplbhdgdgwyt4

On Continuous User Authentication via Typing Behavior

Joseph Roth, Xiaoming Liu, Dimitris Metaxas
2014 IEEE Transactions on Image Processing  
Unlike the typical continuous biometrics such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging.  ...  Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream.  ...  ., face, fingerprint, iris) or behavioral traits (e.g., gait, keystroke dynamics, mouse dynamics) [15] . Among these biometric modalities, face, fingerprint, keystroke dynamics (KD), and Fig . 1.  ... 
doi:10.1109/tip.2014.2348802 pmid:25137729 fatcat:vmhkjyw46jexrlfoystuotzk6q
« Previous Showing results 1 — 15 out of 276 results