379
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

User Authentication Based on Keystroke Dynamics

, &

References

  • N. L. Clarke, and S. M. Furnell, “Advanced user authentication for mobile devices,” Comput. Sec, Vol. 26, no. 2, pp. 109–19, 2007.
  • D. Hosseinzadeh, S. Krishnan, and A. Khademi, “Keystroke identification based on Gaussian mixture models,” IEEE Int. Conf. Acoust. Speech Signal Process., Vol. 3, pp. 1144–7, 2006
  • A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video-Based Biometr., Vol. 14, no. 1, pp. 1–29, 2004.
  • R. K. Das, S. Mukhopadhyay, and P. Bhattacharya, “Continuous multimodal biometric authentication for PC and handheld devices,” IETE J. Educ., Vol. 52, pp. 59–69, 2011.
  • R. Gaines, W. Lisowski, S. Press, and N. Shapiro, “Authentication by keystroke timing: Some preliminary results (Report style),” Rand Corporation, Santa Monica, CA, Rand Rep. R-2560-NSF, pp. 1–52, 1980.
  • R. Joyce, and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, Vol. 33, no. 2, pp. 168–76, 1990.
  • F. Monrose, and A. Rubin, “Keystroke dynamics as a biometric for authentication,” Future Gener. Comput. Syst., Vol. 16, no. 4, pp. 351–9, 2000.
  • J. J. Leggett, and G. Williams, “Verifying identity via keystroke characteristics,” Int. J. Man Mach. Stud., Vol. 28, no. 1, pp. 67–76, 1988.
  • R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. 2nd ed. Hoboken, NJ: Wiley, 2007.
  • M. Obaidat, and B. Sadoun, “Verification of computer users using keystroke dynamics,” IEEE Trans. Syst. Man Cybern. Part B, Vol. 27, no. 2, pp. 261–9, 1997.
  • M. Brown, and S. J. Rogers, “User identification via keystroke characteristics of typed names using neural networks,” Int. J. Man Mach. Stud., Vol. 39, no. 6, pp. 999–1014, 1993.
  • E. Yu, and S. Cho, “GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification,” in Proceedings of the IEEE International Joint Conference on Neural Networks, Portland, Oregon, Jul. 2003, pp. 2253–7.
  • W. Chen, and W. Chang, “Applying hidden Markov models to keystroke pattern analysis for password verification,” in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), Las Vegas, Nov. 2004, pp. 467–74.
  • S. Mandujano, and R. Soto, “Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data,” in Proceedings of the Fifth Mexican International Conference on Computer Science (ECN04), Colima, Mexico, pp. 181–7.
  • D. Hosseinzadeh, and S. Krishnan, “Gaussian mixture modeling of keystroke patterns for biometric applications,” IEEE Tran. Syst. Man Cybern. Part C, Vol. 38, no. 6, pp. 816–26, 2008.
  • P. S. Teh, B. Andrew, and S. O. Thian, “Keystroke dynamics in password authentication enhancement,” Expert Syst. Appl., Vol. 37, pp. 8618–27, 2010.
  • C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY: Springer, 2009.
  • T. M. Mitchell, Machine Learning. New York, NY: McGraw-Hill Science, 1997.
  • A. N. Kolmogorov, “On the representations of continuous functions of many variables by super positions of continuous functions of one variable and addition,” Dokl. Akad. Nauk. USSR, Vol. 114, no. 5, pp. 953–6, 1957.
  • M. F. Moller, “A scaled conjugate gradient algorithm for fast supervised learning,” Neural Netw., Vol. 6, pp. 525–33, 1993.
  • L. Hong, and A. K. Jain, “ Integrating faces and fingerprints for personal identification,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 20, no. 12, 1998.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.