In this paper the authors modify their previous kNN algorithm and present a modification to improve the algorithm by considering key inner and interclass distinguishability. The suggested approach is tested on a large group of individuals with data gathered over Internet using browser-based WWW application. The obtained results are promising and encouraging for further development in this area.
This is a preview of subscription content, log in via an institution to check access.
PreviewUnable to display preview. Download preview PDF.
Similar content being viewed by others ReferencesSpillane, R.J.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975)
Vacca, J.R.: Biometric Technologies and Verification Systems, p. 182. Elsevier, USA (2007)
Coppenrath, L.F., & Associates: 5 (2001), http://lfca.net/Reference20Documents/Biometric20Technology20Overview.pdf (State from June 15, 2010)
Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Prelimary Results. Rand Rep. R-2560-NSF, Rand Corp. (1980)
Leggett, J., Williams, G., Umphress, D.: Verifying Identity via Keystroke Characteristics. Int. J. Man-Mach. Stud. 28(1), 67–76 (1988)
Leggett, J., Williams, G.: Verification of User Identity via Keystroke Characteristics. Human Factors in Management Information Systems, 89
Hussien, B., McLaren, R., Bleha, S.: An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9, 39–43 (1989)
Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. on Systems Man and Cybernetics, Part B 27(2), 261–269 (1997)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2004)
Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification using the ARTMAP-FD Neural Network. Intelligent Information Hiding and Multimedia Signal Processing 1, 61–64 (2007)
Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 1078–1079 (2009)
Rybnik, M., Tabedzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Computer Information Systems and Industrial Management Applications - CISIM, pp. 225–230. IEEE, Los Alamitos (2008)
Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics using Fixed Text. In: 2009 International Conference on Biometrics and Kansei Engineering, pp. 70–75. IEEE CS, Los Alamitos (2009)
(July 20, 2010), http://www.kds.miszu.pl
AGH University of Science and Technology,
Piotr Panasiuk & Khalid Saeed
University of Technology and Life Sciences, Kordeckiego 20, 85-225, Bydgoszcz, Poland
Ryszard S. Choraś
© 2010 Springer-Verlag Berlin Heidelberg
About this paper Cite this paperPanasiuk, P., Saeed, K. (2010). A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Choraś, R.S. (eds) Image Processing and Communications Challenges 2. Advances in Intelligent and Soft Computing, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16295-4_13
Download citationDOI: https://doi.org/10.1007/978-3-642-16295-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16294-7
Online ISBN: 978-3-642-16295-4
eBook Packages: EngineeringEngineering (R0)
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.3