Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions

@article{Mahar1995OptimizingDB,
  title={Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions},
  author={Doug Mahar and R. Napier and M. Wagner and W. Laverty and Ron Henderson and Michael Hiron},
  journal={Int. J. Hum. Comput. Stud.},
  year={1995},
  volume={43},
  pages={579-592}
}
  • Doug Mahar, R. Napier, +3 authors Michael Hiron
  • Published 1995
  • Computer Science
  • Int. J. Hum. Comput. Stud.
  • Umphress and Williams have shown that individual differences in digraph latency may provide a means of accurately verifying the identity of computer users. The present research refined this technique by exploring inter and intra subject differences in digraph latency distributions. Experiment 1 showed that there is marked heterogeneity in the latency with which individual subjects type different digraphs. Consequently, it was found that typist verification accuracy improved when a digraph… CONTINUE READING
    36 Citations

    Topics from this paper

    A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
    • 73
    Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
    • 99
    • Highly Influenced
    User authentication through keystroke dynamics
    • 486
    • PDF
    Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
    • 31
    Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
    • 25
    • PDF
    A machine learning approach to keystroke dynamics based user authentication
    • 61
    • PDF
    Typing Biometrics: Impact of Human Learning on Performance Quality
    • 29
    • Highly Influenced
    Passphrase Authentication Based on Typing Style Through an Art 2 Neural Network
    • 10
    • PDF

    References

    SHOWING 1-8 OF 8 REFERENCES
    Dynamic Identity Verification via Keystroke Characteristics
    • 193
    Identity Verification Through Keyboard Characteristics
    • 217
    Verifying Identity via Keystroke Characteristics
    • 157
    Keystroke Timing in Transcription Typing
    • 66
    Research Design & Statistical Analysis
    • 80