Abstract
The increasing interest in person identification based on keystroke dynamics can be attributed to several factors. First of all, it is a cheap and widely applicable technique, whereas online services such as internet banking or online tax declaration require reliable person identification methods. Furthermore, there are various attack techniques against the existing identification methods, thus combining the existing methods with new person identification methods could improve the reliability of the identification. Recent research shows that person identification based on machine learning using keystroke dynamics data works surprisingly well. This is because the dynamics of typing is characteristic to users and a user is hardly able to mimic the dynamics of typing of another user. In this paper, we propose to use a projection-based classification technique for the task of person identification based on keystroke dynamics.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Sect. 2 for an overview of related works.
- 2.
- 3.
We note that the task of person identification is different from person authentication, in case of which the user claims an identify and the system has to decide whether the true identity matches the claimed identity. The task of person identification is inherently more challenging compared with the person authentication task, therefore, we decided to evaluate the proposed approach in context of person identification.
- 4.
We note that they were calculated under the assumption that the observations in the classification experiment are representative to real-world application scenarios. This includes (but it is not limited to) the assumption of a naive attacker. That is, we did not assume an “intelligent” attacker who would try to record and/or imitate the dynamics of the legitimate user. Instead, a naive attacker was assumed who simply steals a bank card (or the information printed on the card) and tries to use it for internet-based transactions without paying attention to imitate the owner’s dynamics of typing.
- 5.
We also note that there is a trade-off between the aforementioned two types of error and, if required, recognition systems may be tuned in order to decrease one of them, while the other type of error may increase. Though in principle, such tuning is possible in case of projection-based classification as well (for example, based on the continuous output of logistic regression), this is left for future work.
References
Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Buza, K., Koller, J., Marussy, K.: PROCESS: projection-based classification of electroencephalograph signals. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2015. LNCS, vol. 9120, pp. 91–100. Springer, Cham (2015). doi:10.1007/978-3-319-19369-4_9
Wong, F., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: 35th IEEE Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911–915 (2001)
Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M.: Data evolution method in the procedure of user authentication using keystroke dynamics. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS, vol. 9875, pp. 379–387. Springer, Cham (2016). doi:10.1007/978-3-319-45243-2_35
Ceffer, A., Levendovszky, J.: Kolmogorov-Smirnov test for keystroke dynamics based user authentication. In: 17th IEEE International Symposium on Computational Intelligence and Informatics (2016). doi:10.1109/CINTI.2016.7846387
Wozniak, M., Jackowski, K.: Fusers based on classifier response and discriminant function – comparative study. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS, vol. 5271, pp. 361–368. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87656-4_45
Kurzynski, M., Wozniak, M.: Combining classifiers under probabilistic models: experimental comparative analysis of methods. Expert Syst. 29(4), 374–393 (2012)
Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 598–605. Springer, Cham (2015). doi:10.1007/978-3-319-24306-1_58
Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Sig. Process. 26(1), 43–49 (1978)
Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.A.: Fast time series classification using numerosity reduction. In: Proceedings of the 23rd ACM International Conference on Machine Learning, pp. 1033–1040 (2006)
Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., Keogh, E.: Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endowment 1(2), 1542–1552 (2008)
Nanopoulos, A., Alcock, R., Manolopoulos, Y.: Feature-based classification of time-series data. Int. J. Comput. Res. 10(3), 49–61 (2001)
Kim, S., Smyth, P., Luther, S.: Modeling waveform shapes with random effects segmental Hidden Markov Models. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 309–316 (2004)
Chen, G.H., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Adv. Neural Inf. Process. Syst. 26, 1088–1096 (2013)
Devroye, L., Györfi, L., Lugosi, G.: A Probabilistic Theory of Pattern Recognition. Springer, New York (1996)
Radovanović, M., Nanopoulos, A., Ivanović, M.: Hubs in space: popular nearest neighbors in high-dimensional data. J. Mach. Learn. Res. 11, 2487–2531 (2010)
Nenad, T., Buza, K., Marussy, K., Kis, P.B.: Hubness-aware classification, instance selection and feature construction: survey and extensions to time-series. In: Feature Selection for Data and Pattern Recognition, pp. 231–262 (2015)
Buza, K., Nanopoulos, A., Nagy, G.: Nearest neighbor regression in the presence of bad hubs. Knowl. Based Syst. 86, 250–260 (2015)
Buza, K.: Person identification based on keystroke dynamics: demo and open challenge. In: CAiSE Forum 2016, 28th International Conference on Advanced Information Systems Engineering (2016)
Witten, I.H., Frank, E., Hall, M., Pal, C.: Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, Burlington (2016)
Acknowledgment
D. Neubrandt was supported by the “Új Nemzeti Kiválóság Program” (ÚNKP-16-1-1) of the “Emberi Erőforrások Minisztériuma”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Neubrandt, D., Buza, K. (2018). Projection-Based Person Identification. In: Kurzynski, M., Wozniak, M., Burduk, R. (eds) Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017. CORES 2017. Advances in Intelligent Systems and Computing, vol 578. Springer, Cham. https://doi.org/10.1007/978-3-319-59162-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-59162-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59161-2
Online ISBN: 978-3-319-59162-9
eBook Packages: EngineeringEngineering (R0)