Abstract
Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric-based on typing style. Typists have unique typing patterns that can be analyzed to confirm the authenticity of the user. Keystroke dynamics is most often applied in situations where the authenticity of a user must be ascertained with extreme confidence. It could be used as an additional degree of security for password-protected applications. If user’s password is compromised, and the keystroke dynamics of the real user is known, the application may be able to reject the impostor despite having received valid credentials. Different types of keyboards and remote access are major problems of keystroke dynamics authentication technique. In this paper, a comprehensive analysis of contemporary work on keystroke dynamic authentication mechanisms is summarized to analyze the effectiveness of various methodologies in present. Also, various statistical-based and machine learning-based algorithms are analyzed with their strengths and weaknesses. From this survey, it was observed that there is a need to strengthen the keystroke dynamics dataset which has all essential features. Also an efficient algorithm is required to obtain high accuracy to make authentication effective, as the performance of biometric keystroke authentication is still an open research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Uludag U et al (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960
Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. Proc IEEE 92:948–960
Uludag U et al (2004) Biometric template selection and update: a case study in fingerprints. Pattern Recognit 37:1533–1542
Jain AK et al (2005) Biometric template security: challenges and solutions. In: Signal processing conference, pp 1–4
Moody J (2004) Public perceptions of biometric devices: the effect of misinformation on acceptance and use. In: Issues in informing science & information technology
Umphress D, Williams G (1985) Identity verification through keyboard characteristics. Int J Man-Mach Stud 23:263–273
Dowland PS et al (2004) A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Security and protection in information processing systems. Springer, Berlin, pp 275–289
Mondal S et al (2016) Combining keystroke and mouse dynamics for continuous user authentication and identification. In: IEEE international conference on identity, security and behavior analysis (ISBA), pp 1–8
Obaidat MS et al (1999) Estimation of pitch period of speech signal using a new dyadic wavelet algorithm. Inf Sci 119:21–39
Gunetti D et al (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur (TISSEC) 8:312–347
Mondal S, Bours P (2015) A computational approach to the continuous authentication biometric system. Inf Sci 304:28–53
Mondal S et al (2015) Continuous authentication in a real world settings. In: Eighth international conference on advances in pattern recognition, pp 1–6
Ali ML et al (2015) Authentication and identification methods used in keystroke biometric systems. In: High performance computing and communications (HPCC), pp 1424–1429
Mhenni A et al (2016) Keystroke template update with adapted thresholds. In: 2nd international conference on advanced technologies for signal and image processing (ATSIP), pp 483–488
Pisani PH et al (2016) Enhanced template update: application to keystroke dynamics. Comput Secur 60:134–153
Çeker H et al (2016) Adaptive techniques for intra-user variability in keystroke dynamics. In: Biometrics theory, applications and systems (BTAS). IEEE, New York, pp 1–6
Rahman KA et al (2013) Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans Inf Forensics Secur 8:528–541
Koakowska A et al (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Human-computer systems interaction. Springer, Berlin, pp 42–52
Kim S et al (2014) A correlation method for handling infrequent data in keystroke biometric systems. In: International workshop on biometrics and forensics (IWBF), pp 1–6
Gentner DR et al (1983) A glossary of terms including a classification of typing errors. In: Cognitive aspects of skilled typewriting. Springer, Berlin, pp 39–43
Roth J et al (2015) Investigating the discriminative power of keystroke sound. IEEE Trans Inf Forensics Secur 10:333–345
Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In: Recent advances in user authentication using keystroke dynamics biometrics. Science Gate Publishing, pp 1–22
Akila M et al (2012) A novel feature subset selection algorithm using artificial bee colony in keystroke dynamics. In: Proceedings of the international conference on soft computing for problem solving (SocProS), pp 813–820
Monaco JV, Tappert CC (2018) The partially observable hidden markov model and its application to keystroke dynamics. Pattern Recognit 76:449–462
Ceker H, Upadhyaya S (2015) Enhanced recognition of keystroke dynamics using Gaussian mixture models. In: Military communications conference, MILCOM IEEE, pp 1305–1310
Alsultan A et al (2017) Improving the performance of free-text keystroke dynamics authentication by fusion. Appl Soft Comput
Ho J, Kang D-K (2018) One-class nave bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl Intell 48:1547–1564
Balagani et al (2011) On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit Lett 32(7):1070–1080
Loy CC et al (2005) Pressure-based typing biometrics user authentication using the fuzzy artmap neural network. In: Proceedings of the twelfth international conference on neural information processing (ICONIP), pp 647–652
Li Y et al (2011) Study on the Beihang keystroke dynamics database. In: International joint conference biometricson, pp 1–5
Sridhar M et al (2013) Intrusion detection using keystroke dynamics. In: Proceedings of the third international conference on trends in information, telecommunication and computing. Springer, Berlin. https://doi.org/10.1007/978-1-4614-3363-7_16
Deng Y, Zhong Y (2013) eystroke dynamics user authentication based on Gaussian mixture model and deep belief nets. In: ISRN signal processing. ArticleID 565183. https://doi.org/10.1155/2013/565183
Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of IEEE/IFIP international conference on dependable systems & networks (DSN), pp 125–134
Kim J et al (2018) Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Appl Soft Comput 62:1077–1087
Lau S, Maxion R (2014) Clusters and markers for keystroke typing rhythms. In: The LASER workshop: learning from authoritative security experiment results
Alsultan A et al (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recognit Lett 89:53–59
Ho G et al (2014) Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University
Li BZY et al (2011) Study on the Beihang keystroke dynamics database. In: Proceedings of the international joint conference on biometrics (IJCB), pp 1–5
Giot R et al (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Secur 30(6–7):427–445
Martono W et al (2007) Keystroke pressure-based typing biometrics authentication system using support vector machines. In: Proceedings of computational science and its applications ICCSA 2007: international conference, Part II, pp 85–93
Jiang SSC, Liu J (2007) Keystroke statistical learning model for web authentication. In: 2nd ACM symposium on information, computer and communications security (ASIACCS), pp 359–361
Wesoowski TE et al (2015) User verification based on the analysis of keystrokes while using various software. J Med Inf Technol 24:13–22
Longi K et al (2015) Identification of programmers from typing patterns. In: Proceedings of the 15th Koli Calling conference on computing education research, pp 60–67
Mhenni A et al (2018) Towards a secured authentication based on an online double serial adaptive mechanism of users’ keystroke dynamics. In: International conference on digital society and eGovernments
Kambourakis G et al (2016) Introducing touchstroke: keystroke based authentication system for smartphones. Secur Commun Netw 9:542–554
Zhong Y et al (2012) Keystroke dynamics for user authentication. In: IEEE computer society conference on computer vision and pattern recognition workshops (CVPRW), pp 117–123
Ivannikova E et al (2017) Anomaly detection approach to keystroke dynamics based user authentication. In: IEEE symposium on computers and communications (ISCC), pp 885–889
Dholi PR, Chaudhari K (2013) Typing pattern recognition using keystroke dynamics. In: Mobile communication and power engineering. Springer, Berlin, pp 275–280
Ahmed AA, Traore I (2014) Biometric recognition based on free-text keystroke dynamics. IEEE Trans Cybern 44:458–472
Alghamdi SJ et al (2015) Dynamic user verification using touch keystroke based on medians vector proximity. In: 7th international conference on computational intelligence, communication systems and networks, pp 121–126
Giot R et al (2009) Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: IEEE 3rd international conference biometrics: theory, applications, and systems, pp 1–69
Giot R, El-Abed M, Rosenberger C (2012) Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Eighth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp 11–15
Bello L et al (2010) Collection and publication of a fixed text keystroke dynamics dataset. In: XVI Congreso Argentino de Ciencias de la Computacin
Idrus SZS et al (2013) Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: IEEE conference on biometrics special interest group (BIOSIG), pp 1–8
Antal M et al (2015) Keystroke dynamics on android platform. Proc Technol 19:820–826
Vural E et al (2014) Shared research dataset to support development of keystroke authentication. In: IEEE International joint conference on biometrics, pp 1–8
El-Abed M et al (2014) Rhu keystroke: a mobile-based benchmark for keystroke dynamics systems. In: International Carnahan conference security technology (ICCST), pp 1–4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Raul, N., Shankarmani, R., Joshi, P. (2020). A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-0324-5_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0323-8
Online ISBN: 978-981-15-0324-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)