A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism

  • Nataasha RaulEmail author
  • Radha Shankarmani
  • Padmaja Joshi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)


Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric-based on typing style. Typists have unique typing patterns that can be analyzed to confirm the authenticity of the user. Keystroke dynamics is most often applied in situations where the authenticity of a user must be ascertained with extreme confidence. It could be used as an additional degree of security for password-protected applications. If user’s password is compromised, and the keystroke dynamics of the real user is known, the application may be able to reject the impostor despite having received valid credentials. Different types of keyboards and remote access are major problems of keystroke dynamics authentication technique. In this paper, a comprehensive analysis of contemporary work on keystroke dynamic authentication mechanisms is summarized to analyze the effectiveness of various methodologies in present. Also, various statistical-based and machine learning-based algorithms are analyzed with their strengths and weaknesses. From this survey, it was observed that there is a need to strengthen the keystroke dynamics dataset which has all essential features. Also an efficient algorithm is required to obtain high accuracy to make authentication effective, as the performance of biometric keystroke authentication is still an open research.


Keystroke dynamics Machine learning Template update Feature extraction Classification 


  1. 1.
    Uludag U et al (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960CrossRefGoogle Scholar
  2. 2.
    Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. Proc IEEE 92:948–960CrossRefGoogle Scholar
  3. 3.
    Uludag U et al (2004) Biometric template selection and update: a case study in fingerprints. Pattern Recognit 37:1533–1542CrossRefGoogle Scholar
  4. 4.
    Jain AK et al (2005) Biometric template security: challenges and solutions. In: Signal processing conference, pp 1–4Google Scholar
  5. 5.
    Moody J (2004) Public perceptions of biometric devices: the effect of misinformation on acceptance and use. In: Issues in informing science & information technologyGoogle Scholar
  6. 6.
    Umphress D, Williams G (1985) Identity verification through keyboard characteristics. Int J Man-Mach Stud 23:263–273CrossRefGoogle Scholar
  7. 7.
    Dowland PS et al (2004) A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Security and protection in information processing systems. Springer, Berlin, pp 275–289Google Scholar
  8. 8.
    Mondal S et al (2016) Combining keystroke and mouse dynamics for continuous user authentication and identification. In: IEEE international conference on identity, security and behavior analysis (ISBA), pp 1–8Google Scholar
  9. 9.
    Obaidat MS et al (1999) Estimation of pitch period of speech signal using a new dyadic wavelet algorithm. Inf Sci 119:21–39CrossRefGoogle Scholar
  10. 10.
    Gunetti D et al (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur (TISSEC) 8:312–347CrossRefGoogle Scholar
  11. 11.
    Mondal S, Bours P (2015) A computational approach to the continuous authentication biometric system. Inf Sci 304:28–53CrossRefGoogle Scholar
  12. 12.
    Mondal S et al (2015) Continuous authentication in a real world settings. In: Eighth international conference on advances in pattern recognition, pp 1–6Google Scholar
  13. 13.
    Ali ML et al (2015) Authentication and identification methods used in keystroke biometric systems. In: High performance computing and communications (HPCC), pp 1424–1429Google Scholar
  14. 14.
    Mhenni A et al (2016) Keystroke template update with adapted thresholds. In: 2nd international conference on advanced technologies for signal and image processing (ATSIP), pp 483–488Google Scholar
  15. 15.
    Pisani PH et al (2016) Enhanced template update: application to keystroke dynamics. Comput Secur 60:134–153CrossRefGoogle Scholar
  16. 16.
    Çeker H et al (2016) Adaptive techniques for intra-user variability in keystroke dynamics. In: Biometrics theory, applications and systems (BTAS). IEEE, New York, pp 1–6Google Scholar
  17. 17.
    Rahman KA et al (2013) Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans Inf Forensics Secur 8:528–541CrossRefGoogle Scholar
  18. 18.
    Koakowska A et al (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Human-computer systems interaction. Springer, Berlin, pp 42–52Google Scholar
  19. 19.
    Kim S et al (2014) A correlation method for handling infrequent data in keystroke biometric systems. In: International workshop on biometrics and forensics (IWBF), pp 1–6Google Scholar
  20. 20.
    Gentner DR et al (1983) A glossary of terms including a classification of typing errors. In: Cognitive aspects of skilled typewriting. Springer, Berlin, pp 39–43CrossRefGoogle Scholar
  21. 21.
    Roth J et al (2015) Investigating the discriminative power of keystroke sound. IEEE Trans Inf Forensics Secur 10:333–345CrossRefGoogle Scholar
  22. 22.
    Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In: Recent advances in user authentication using keystroke dynamics biometrics. Science Gate Publishing, pp 1–22Google Scholar
  23. 23.
    Akila M et al (2012) A novel feature subset selection algorithm using artificial bee colony in keystroke dynamics. In: Proceedings of the international conference on soft computing for problem solving (SocProS), pp 813–820Google Scholar
  24. 24.
    Monaco JV, Tappert CC (2018) The partially observable hidden markov model and its application to keystroke dynamics. Pattern Recognit 76:449–462CrossRefGoogle Scholar
  25. 25.
    Ceker H, Upadhyaya S (2015) Enhanced recognition of keystroke dynamics using Gaussian mixture models. In: Military communications conference, MILCOM IEEE, pp 1305–1310Google Scholar
  26. 26.
    Alsultan A et al (2017) Improving the performance of free-text keystroke dynamics authentication by fusion. Appl Soft ComputGoogle Scholar
  27. 27.
    Ho J, Kang D-K (2018) One-class nave bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl Intell 48:1547–1564CrossRefGoogle Scholar
  28. 28.
    Balagani et al (2011) On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit Lett 32(7):1070–1080CrossRefGoogle Scholar
  29. 29.
    Loy CC et al (2005) Pressure-based typing biometrics user authentication using the fuzzy artmap neural network. In: Proceedings of the twelfth international conference on neural information processing (ICONIP), pp 647–652Google Scholar
  30. 30.
    Li Y et al (2011) Study on the Beihang keystroke dynamics database. In: International joint conference biometricson, pp 1–5Google Scholar
  31. 31.
    Sridhar M et al (2013) Intrusion detection using keystroke dynamics. In: Proceedings of the third international conference on trends in information, telecommunication and computing. Springer, Berlin. Scholar
  32. 32.
    Deng Y, Zhong Y (2013) eystroke dynamics user authentication based on Gaussian mixture model and deep belief nets. In: ISRN signal processing. ArticleID 565183. Scholar
  33. 33.
    Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of IEEE/IFIP international conference on dependable systems & networks (DSN), pp 125–134Google Scholar
  34. 34.
    Kim J et al (2018) Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Appl Soft Comput 62:1077–1087CrossRefGoogle Scholar
  35. 35.
    Lau S, Maxion R (2014) Clusters and markers for keystroke typing rhythms. In: The LASER workshop: learning from authoritative security experiment resultsGoogle Scholar
  36. 36.
    Alsultan A et al (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recognit Lett 89:53–59CrossRefGoogle Scholar
  37. 37.
    Ho G et al (2014) Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford UniversityGoogle Scholar
  38. 38.
    Li BZY et al (2011) Study on the Beihang keystroke dynamics database. In: Proceedings of the international joint conference on biometrics (IJCB), pp 1–5Google Scholar
  39. 39.
    Giot R et al (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Secur 30(6–7):427–445CrossRefGoogle Scholar
  40. 40.
    Martono W et al (2007) Keystroke pressure-based typing biometrics authentication system using support vector machines. In: Proceedings of computational science and its applications ICCSA 2007: international conference, Part II, pp 85–93Google Scholar
  41. 41.
    Jiang SSC, Liu J (2007) Keystroke statistical learning model for web authentication. In: 2nd ACM symposium on information, computer and communications security (ASIACCS), pp 359–361Google Scholar
  42. 42.
    Wesoowski TE et al (2015) User verification based on the analysis of keystrokes while using various software. J Med Inf Technol 24:13–22Google Scholar
  43. 43.
    Longi K et al (2015) Identification of programmers from typing patterns. In: Proceedings of the 15th Koli Calling conference on computing education research, pp 60–67Google Scholar
  44. 44.
    Mhenni A et al (2018) Towards a secured authentication based on an online double serial adaptive mechanism of users’ keystroke dynamics. In: International conference on digital society and eGovernmentsGoogle Scholar
  45. 45.
    Kambourakis G et al (2016) Introducing touchstroke: keystroke based authentication system for smartphones. Secur Commun Netw 9:542–554CrossRefGoogle Scholar
  46. 46.
    Zhong Y et al (2012) Keystroke dynamics for user authentication. In: IEEE computer society conference on computer vision and pattern recognition workshops (CVPRW), pp 117–123Google Scholar
  47. 47.
    Ivannikova E et al (2017) Anomaly detection approach to keystroke dynamics based user authentication. In: IEEE symposium on computers and communications (ISCC), pp 885–889Google Scholar
  48. 48.
    Dholi PR, Chaudhari K (2013) Typing pattern recognition using keystroke dynamics. In: Mobile communication and power engineering. Springer, Berlin, pp 275–280CrossRefGoogle Scholar
  49. 49.
    Ahmed AA, Traore I (2014) Biometric recognition based on free-text keystroke dynamics. IEEE Trans Cybern 44:458–472CrossRefGoogle Scholar
  50. 50.
    Alghamdi SJ et al (2015) Dynamic user verification using touch keystroke based on medians vector proximity. In: 7th international conference on computational intelligence, communication systems and networks, pp 121–126Google Scholar
  51. 51.
    Giot R et al (2009) Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: IEEE 3rd international conference biometrics: theory, applications, and systems, pp 1–69Google Scholar
  52. 52.
    Giot R, El-Abed M, Rosenberger C (2012) Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Eighth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp 11–15Google Scholar
  53. 53.
    Bello L et al (2010) Collection and publication of a fixed text keystroke dynamics dataset. In: XVI Congreso Argentino de Ciencias de la ComputacinGoogle Scholar
  54. 54.
    Idrus SZS et al (2013) Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: IEEE conference on biometrics special interest group (BIOSIG), pp 1–8Google Scholar
  55. 55.
    Antal M et al (2015) Keystroke dynamics on android platform. Proc Technol 19:820–826CrossRefGoogle Scholar
  56. 56.
    Vural E et al (2014) Shared research dataset to support development of keystroke authentication. In: IEEE International joint conference on biometrics, pp 1–8Google Scholar
  57. 57.
    El-Abed M et al (2014) Rhu keystroke: a mobile-based benchmark for keystroke dynamics systems. In: International Carnahan conference security technology (ICCST), pp 1–4Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Nataasha Raul
    • 1
    Email author
  • Radha Shankarmani
    • 1
  • Padmaja Joshi
    • 2
  1. 1.Sardar Patel Institute of TechnologyMumbaiIndia
  2. 2.C-DACMumbaiIndia

Personalised recommendations