Corpus ID: 9355130

Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics

@article{Kobojek2016ApplicationOR,
  title={Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics},
  author={Pawel Kobojek and Khalid Saeed},
  journal={Journal of telecommunications and information technology},
  year={2016}
}
  • Pawel Kobojek, K. Saeed
  • Published 2016
  • Computer Science
  • Journal of telecommunications and information technology
Keystroke dynamics is one of the biometrics techniques that can be used for the verification of a human being. This work briefly introduces the history of biometrics and the state of the art in keystroke dynamics. Moreover, it presents an algorithm for human verification based on these data. In order to achieve that, authors’ training and test sets were prepared and a reference dataset was used. The described algorithm is a classifier based on recurrent neural networks (LSTM and GRU). High… Expand
Continuous authentication by free-text keystroke based on CNN and RNN
TLDR
The method proposed in this paper authenticates users via their keystrokes when they type free text via a model that combines a convolutional neural network and a recursive neural network to obtain individual keystroke features for identity authentication. Expand
User Keystroke Authentication and Recognition of Emotions Based on Convolutional Neural Network
TLDR
Experimental studies showed that the proposed coding procedure made it possible to use CNN for analyzing Keystroke Dynamics and achieve recognition error of emotions and personality at the level of the best modern recognition systems. Expand
Deep Neural Networks Applied to User Recognition Based on Keystroke Dynamics: Learning from Raw Data
TLDR
The objective of this work is to demonstrate the hypothesis that user recognition algorithms applied to keystroke dynamics raw ( original) data can perform better than the ones that depend on Feature Engineering, and proposes a deep neural network named DRK. Expand
Significant Parameters of the Keystroke for the Formation of the Input Field of a Convolutional Neural Network
TLDR
The article shows that improvement of personality and emotion recognizers based on the keystroke pattern can be implemented using neural network solutions and justified the need for further research on improvement of keystroke parameters preprocessing procedures in order to increase their informational value. Expand
Typing Biometrics for User Authentication-a One-shot Approach
In a world of bad passwords, alternative methods for user authentication is becoming increasingly important. Keystroke dynamics is the time series data describing the keyboard typing rhythm of aExpand
Keystroke Dynamics using Auto Encoders
TLDR
This paper will look at an Autoencoder model for learning the keystroke dynamics of specific users, which shows an improvement over the traditional tried and tested statistical approaches with an Equal Error Rate of 6.51%, with the additional benefits of relatively low training times and less reliance on feature engineering. Expand
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
TLDR
This paper proposes a double serial adaptation strategy that considers a single-capture-based enrollment process that considers the template of users and the decision/adaptation thresholds are updated when using the authentication system. Expand
Free-Text Keystroke Dynamics for User Authentication
TLDR
A novel feature engineering method is employed that generates image-like transition matrices for verifying user identity based on keystroke dynamics obtained from free-text and a convolution neural network with cutout achieves the best results. Expand
AUTHENTICATION OF LEGITIMATE USER S OF SMARTPHONES BASED ON APP USAGE SEQUENCES by ENRIC
Nowadays, it is hard to understand society without smartphones. People may own one or even more of these devices and use them regularly. Consequently, such a trend brings up many security issues,Expand
Fuzzy rule based intelligent system for user authentication based on user behaviour
TLDR
A security system based on fuzzy rule based intelligent system which can be used for authentication process based on the user’s behavior, cost effective and robust in security aspect is proposed. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 29 REFERENCES
Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network
TLDR
This work presents a deep learning approach to keystroke authentication, and shows how it can leverage a unique set of advanced build in sensors, including accelerometer and gyroscope to capture rich typing information than raw timing pattern. Expand
Comparing anomaly-detection algorithms for keystroke dynamics
TLDR
The objective is to collect a keystroke-dynamics data set, to develop a repeatable evaluation procedure, and to measure the performance of a range of detectors so that the results can be compared soundly. Expand
Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets
TLDR
The Gaussian mixture model with the universal background model (GMM-UBM) and the deep belief nets (DBN) are introduced, which are two generative model-based approaches to user authentication using keystroke dynamics that make no assumption about the underlying probability distribution and are fast for training and testing. Expand
TapDynamics : Strengthening User Authentication on Mobile Phones with Keystroke Dynamics
The convenience and ubiquity of mobile devices make them a rich source of personal data such as email and financial information. Unfortunately, this data is often guaded by only a simple drawingExpand
Typing Pattern Recognition Using Keystroke Dynamics
TLDR
A k-nearest neighbor approach is introduced to classify users’ keystroke dynamics profiles to authenticate user based on their typing samples. Expand
Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions
TLDR
It was found that typist verification accuracy improved when a digraph-specific index of the distance between test and reference digraph latencies was employed and the utility of nonlinear modelling as a tool to establish optimum verification parameter settings was shown. Expand
Keystroke dynamics as a biometric for authentication
TLDR
This paper examines an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type in an effort to confront the new threats unveiled by the networking revolution. Expand
Long Short Term Memory Networks for Anomaly Detection in Time Series
TLDR
The efficacy of stacked LSTM networks for anomaly/fault detection in time series on ECG, space shuttle, power demand, and multi-sensor engine dataset is demonstrated. Expand
Dropout: a simple way to prevent neural networks from overfitting
TLDR
It is shown that dropout improves the performance of neural networks on supervised learning tasks in vision, speech recognition, document classification and computational biology, obtaining state-of-the-art results on many benchmark data sets. Expand
Authentication by Keystroke Timing: Some Preliminary Results
TLDR
The authors found that of the large number of digraphs represented in most ordinary paragraphs, there were five which could serve as a basis for distinguishing among the subjects, and that this method of distinguishing subjects might provide the basis for a computer authentication system. Expand
...
1
2
3
...