Abstract
The proposed work presents an analysis of rhythmic patterns based on the dynamics of the fingertips observed during keystroke events on a traditional computer keyboard. In this work, a detailed analysis of pressure and acceleration applied by the user has been taken into consideration, in contrast to the earlier works which have focused primarily on the timing variations of the keys. In this purpose, two different types of sensors pressure and accelerometer were embedded on a traditional keyboard. Groupings of numerical digits and special keys were used to design different kinds of tasks to acquire sensor and timing variations of each keystroke event. In total, six subjects (two females and four males) were asked to provide the data to validate the proposed idea. Subsequently, two types of analysis, interpersonal and intrapersonal keystroke rhythm, have been carried out. The analysis results show uniquely identifiable keystroke sensor and timing variations for different users. However, individual users almost maintained his/her keystroke pressure and acceleration variation irrespective of the type of tasks. Such results demonstrate that keystroke rhythm based on pressure and acceleration variations of the fingertips can be used as a behavioural feature for developing more sophisticated biometric systems for intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: Firme: face and iris recognition for mobile engagement. Image Vis. Comput. 32(12), 1161–1172 (2014)
Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)
Labati, R.D., Genovese, A., Piuri, V., Scotti, F.: Toward unconstrained fingerprint recognition: a fully touchless 3-d system based on two views on the move. IEEE Trans. Syst. Man Cybern. Syst. 46(2), 202–219 (2016)
Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: IEEE 22nd International Conference on Network Protocols (ICNP 2014), pp. 221–232. IEEE, USA (2014)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Sim, T., Janakiraman, R.: Are digraphs good for free-text keystroke dynamics? In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR’07), pp. 1–6. IEEE, USA (2007)
Forsen, G.E., Nelson, M.R., Staron Jr., R.J.: Personal attributes authentication techniques. Technical report, Pattern Analysis and Recognition Corp. Rome (1977)
Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: a key to user identification. IEEE Secur. Priv. 2(5), 40–47 (2004)
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report, Rand Corp. Santa Monica (1980)
Nonaka, H., Kurihara, M.: Sensing pressure for authentication system using keystroke dynamics. Int. J. Comput. Intell. 1(1), 19–22 (2004)
Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 92–111, Springer, Berlin (2014)
Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: 2009 6th IEEE Consumer Communications and Networking Conference (CCNC), pp. 1–2. IEEE, USA (2009)
Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249–259. ACM, USA (2011)
Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. 9(6), 542–554 (2016)
Rehim, R.: Effective python penetration testing. Packt Publishing Ltd, Birmingham (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Suraj, Sarma, P., Yadav, A.K., Yadav, A.K., Barma, S. (2019). Keystroke Rhythm Analysis Based on Dynamics of Fingertips. In: Tanveer, M., Pachori, R. (eds) Machine Intelligence and Signal Analysis. Advances in Intelligent Systems and Computing, vol 748. Springer, Singapore. https://doi.org/10.1007/978-981-13-0923-6_48
Download citation
DOI: https://doi.org/10.1007/978-981-13-0923-6_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0922-9
Online ISBN: 978-981-13-0923-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)