1,783 research outputs found
Investigating the impact of combining handwritten signature and keyboard keystroke dynamics for gender prediction
© 2019 IEEE. The use of soft-biometric data as an auxiliary tool on user identification is already well known. Gender, handorientation and emotional state are some examples which can be called soft-biometrics. These soft-biometric data can be predicted directly from the biometric templates. It is very common to find researches using physiological modalities for soft-biometric prediction, but behavioural biometric is often not well explored for this context. Among the behavioural biometric modalities, keystroke dynamics and handwriting signature have been widely explored for user identification, including some soft-biometric predictions. However, in these modalities, the soft-biometric prediction is usually done in an individual way. In order to fill this space, this study aims to investigate whether the combination of those two biometric modalities can impact the performance of a soft-biometric data, gender prediction. The main aim is to assess the impact of combining data from two different biometric sources in gender prediction. Our findings indicated gains in terms of performance for gender prediction when combining these two biometric modalities, when compared to the individual ones
Keystroke Dynamics as Part of Lifelogging
In this paper we present the case for including keystroke dynamics in
lifelogging. We describe how we have used a simple keystroke logging
application called Loggerman, to create a dataset of longitudinal keystroke
timing data spanning a period of more than 6 months for 4 participants. We
perform a detailed analysis of this data by examining the timing information
associated with bigrams or pairs of adjacently-typed alphabetic characters. We
show how there is very little day-on-day variation of the keystroke timing
among the top-200 bigrams for some participants and for others there is a lot
and this correlates with the amount of typing each would do on a daily basis.
We explore how daily variations could correlate with sleep score from the
previous night but find no significant relation-ship between the two. Finally
we describe the public release of this data as well including as a series of
pointers for future work including correlating keystroke dynamics with mood and
fatigue during the day.Comment: Accepted to 27th International Conference on Multimedia Modeling,
Prague, Czech Republic, June 202
Recommended from our members
Stress and productivity patterns of interrupted, synergistic, and antagonistic office activities.
We describe a controlled experiment, aiming to study productivity and stress effects of email interruptions and activity interactions in the modern office. The measurement set includes multimodal data for n = 63 knowledge workers who volunteered for this experiment and were randomly assigned into four groups: (G1/G2) Batch email interruptions with/without exogenous stress. (G3/G4) Continual email interruptions with/without exogenous stress. To provide context, the experiment's email treatments were surrounded by typical office tasks. The captured variables include physiological indicators of stress, measures of report writing quality and keystroke dynamics, as well as psychometric scores and biographic information detailing participants' profiles. Investigations powered by this dataset are expected to lead to personalized recommendations for handling email interruptions and a deeper understanding of synergistic and antagonistic office activities. Given the centrality of email in the modern office, and the importance of office work to people's lives and the economy, the present data have a valuable role to play
Recommended from our members
Free-text keystroke dynamics authentication for Arabic language
This study introduces an approach for user authentication using free-text keystroke dynamics which incorporates text in Arabic language. The Arabic language has completely different characteristics to those of English. The approach followed in this study involves the use of the keyboard's key-layout. The method extracts timing features from specific key-pairs in the typed text. Decision trees were exploited to classify each of the users' data. In parallel for comparison, support vector machines were also used for classification in association with an ant colony optimisation feature selection technique. The results obtained from this study are encouraging as low false accept rates and false reject rates were achieved in the experimentation phase. This signifies that satisfactory overall system performance was achieved by using the typing attributes in the proposed approach, while typing Arabic text
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
We investigate whether a classifier can continuously authenticate users based
on the way they interact with the touchscreen of a smart phone. We propose a
set of 30 behavioral touch features that can be extracted from raw touchscreen
logs and demonstrate that different users populate distinct subspaces of this
feature space. In a systematic experiment designed to test how this behavioral
pattern exhibits consistency over time, we collected touch data from users
interacting with a smart phone using basic navigation maneuvers, i.e., up-down
and left-right scrolling. We propose a classification framework that learns the
touch behavior of a user during an enrollment phase and is able to accept or
reject the current user by monitoring interaction with the touch screen. The
classifier achieves a median equal error rate of 0% for intra-session
authentication, 2%-3% for inter-session authentication and below 4% when the
authentication test was carried out one week after the enrollment phase. While
our experimental findings disqualify this method as a standalone authentication
mechanism for long-term authentication, it could be implemented as a means to
extend screen-lock time or as a part of a multi-modal biometric authentication
system.Comment: to appear at IEEE Transactions on Information Forensics & Security;
Download data from http://www.mariofrank.net/touchalytics
Applying Feature Selection to Reduce Variability in Keystroke Dynamics Data for Authentication Systems
Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied to reduce the variability associated with keystroke dynamics raw data. Artificial Neural Networks were used for classification, and results were calculated as the false acceptance rate (FAR) and the false rejection rate (FRR). Experimental results returned an average FAR of 0.02766 and an average FRR of 0.0862, which were at least comparable with other research efforts in this field
Hardware design, development and evaluation of a pressure-based typing biometrics authentication system
The hardware design of a pressure based typing biometrics authentication system (BAS) is discussed in this paper. The dynamic keystroke is represented by its time duration (t) and force (F) applied to constitute a waveform, which when concatenated compose a complete pattern for the entered password. Hardware design is the first part in designing the complete pressure-based typing (BAS) in order to ensure that the best data to represent the keystroke pattern of the user is captured. The system has been designed using LabVIEW software. Several data preprocessing techniques have been used to improve the acquired waveforms. An experiment was conducted to show the validity of the design in representing keystroke dynamics and preliminary results have shown that the designed system can successfully capture password patterns
- …