Skip to main content

Projection-Based Person Identification

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 578))

Abstract

The increasing interest in person identification based on keystroke dynamics can be attributed to several factors. First of all, it is a cheap and widely applicable technique, whereas online services such as internet banking or online tax declaration require reliable person identification methods. Furthermore, there are various attack techniques against the existing identification methods, thus combining the existing methods with new person identification methods could improve the reliability of the identification. Recent research shows that person identification based on machine learning using keystroke dynamics data works surprisingly well. This is because the dynamics of typing is characteristic to users and a user is hardly able to mimic the dynamics of typing of another user. In this paper, we propose to use a projection-based classification technique for the task of person identification based on keystroke dynamics.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See Sect. 2 for an overview of related works.

  2. 2.

    http://scikit-learn.org.

  3. 3.

    We note that the task of person identification is different from person authentication, in case of which the user claims an identify and the system has to decide whether the true identity matches the claimed identity. The task of person identification is inherently more challenging compared with the person authentication task, therefore, we decided to evaluate the proposed approach in context of person identification.

  4. 4.

    We note that they were calculated under the assumption that the observations in the classification experiment are representative to real-world application scenarios. This includes (but it is not limited to) the assumption of a naive attacker. That is, we did not assume an “intelligent” attacker who would try to record and/or imitate the dynamics of the legitimate user. Instead, a naive attacker was assumed who simply steals a bank card (or the information printed on the card) and tries to use it for internet-based transactions without paying attention to imitate the owner’s dynamics of typing.

  5. 5.

    We also note that there is a trade-off between the aforementioned two types of error and, if required, recognition systems may be tuned in order to decrease one of them, while the other type of error may increase. Though in principle, such tuning is possible in case of projection-based classification as well (for example, based on the continuous output of logistic regression), this is left for future work.

References

  1. Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)

    Article  Google Scholar 

  2. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  3. Buza, K., Koller, J., Marussy, K.: PROCESS: projection-based classification of electroencephalograph signals. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2015. LNCS, vol. 9120, pp. 91–100. Springer, Cham (2015). doi:10.1007/978-3-319-19369-4_9

    Chapter  Google Scholar 

  4. Wong, F., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. In: 35th IEEE Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911–915 (2001)

    Google Scholar 

  5. Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M.: Data evolution method in the procedure of user authentication using keystroke dynamics. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS, vol. 9875, pp. 379–387. Springer, Cham (2016). doi:10.1007/978-3-319-45243-2_35

    Chapter  Google Scholar 

  6. Ceffer, A., Levendovszky, J.: Kolmogorov-Smirnov test for keystroke dynamics based user authentication. In: 17th IEEE International Symposium on Computational Intelligence and Informatics (2016). doi:10.1109/CINTI.2016.7846387

  7. Wozniak, M., Jackowski, K.: Fusers based on classifier response and discriminant function – comparative study. In: Corchado, E., Abraham, A., Pedrycz, W. (eds.) HAIS 2008. LNCS, vol. 5271, pp. 361–368. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87656-4_45

    Chapter  Google Scholar 

  8. Kurzynski, M., Wozniak, M.: Combining classifiers under probabilistic models: experimental comparative analysis of methods. Expert Syst. 29(4), 374–393 (2012)

    Article  Google Scholar 

  9. Doroz, R., Porwik, P., Safaverdi, H.: The new multilayer ensemble classifier for verifying users based on keystroke dynamics. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawiński, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 598–605. Springer, Cham (2015). doi:10.1007/978-3-319-24306-1_58

    Chapter  Google Scholar 

  10. Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Sig. Process. 26(1), 43–49 (1978)

    Article  MATH  Google Scholar 

  11. Xi, X., Keogh, E., Shelton, C., Wei, L., Ratanamahatana, C.A.: Fast time series classification using numerosity reduction. In: Proceedings of the 23rd ACM International Conference on Machine Learning, pp. 1033–1040 (2006)

    Google Scholar 

  12. Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., Keogh, E.: Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endowment 1(2), 1542–1552 (2008)

    Article  Google Scholar 

  13. Nanopoulos, A., Alcock, R., Manolopoulos, Y.: Feature-based classification of time-series data. Int. J. Comput. Res. 10(3), 49–61 (2001)

    Google Scholar 

  14. Kim, S., Smyth, P., Luther, S.: Modeling waveform shapes with random effects segmental Hidden Markov Models. In: Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, pp. 309–316 (2004)

    Google Scholar 

  15. Chen, G.H., Nikolov, S., Shah, D.: A latent source model for nonparametric time series classification. Adv. Neural Inf. Process. Syst. 26, 1088–1096 (2013)

    Google Scholar 

  16. Devroye, L., Györfi, L., Lugosi, G.: A Probabilistic Theory of Pattern Recognition. Springer, New York (1996)

    Google Scholar 

  17. Radovanović, M., Nanopoulos, A., Ivanović, M.: Hubs in space: popular nearest neighbors in high-dimensional data. J. Mach. Learn. Res. 11, 2487–2531 (2010)

    MathSciNet  MATH  Google Scholar 

  18. Nenad, T., Buza, K., Marussy, K., Kis, P.B.: Hubness-aware classification, instance selection and feature construction: survey and extensions to time-series. In: Feature Selection for Data and Pattern Recognition, pp. 231–262 (2015)

    Google Scholar 

  19. Buza, K., Nanopoulos, A., Nagy, G.: Nearest neighbor regression in the presence of bad hubs. Knowl. Based Syst. 86, 250–260 (2015)

    Article  Google Scholar 

  20. Buza, K.: Person identification based on keystroke dynamics: demo and open challenge. In: CAiSE Forum 2016, 28th International Conference on Advanced Information Systems Engineering (2016)

    Google Scholar 

  21. Witten, I.H., Frank, E., Hall, M., Pal, C.: Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, Burlington (2016)

    Google Scholar 

Download references

Acknowledgment

D. Neubrandt was supported by the “Új Nemzeti Kiválóság Program” (ÚNKP-16-1-1) of the “Emberi Erőforrások Minisztériuma”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dora Neubrandt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Neubrandt, D., Buza, K. (2018). Projection-Based Person Identification. In: Kurzynski, M., Wozniak, M., Burduk, R. (eds) Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017. CORES 2017. Advances in Intelligent Systems and Computing, vol 578. Springer, Cham. https://doi.org/10.1007/978-3-319-59162-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59162-9_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59161-2

  • Online ISBN: 978-3-319-59162-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics