Keystroke-based biometric authentication in mobile devices

EVC Urtiga, ED Moreno - IEEE Latin America Transactions, 2011 - ieeexplore.ieee.org
This paper presents a model for biometric authentication of users based on dynamic typing
(keystroke) in mobile devices. In our model, the user accesses the system by typing a string …

Continuous authentications using frequent English terms

A Darabseh, S Siami-Namini… - Applied Artificial …, 2018 - Taylor & Francis
Most of the current computer systems authenticate a user's identity only at the point of entry
to the system (ie, login). However, an effective authentication system includes continuous or …

A behavioral biometric challenge and response approach to user authentication on smartphones

U Burgbacher, M Prätorius… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Behavioral biometrics derived from the fingertip movement on the touchscreen of a mobile
device is a promising new authentication technique. A user is verified by the inherent …

Performance Analysis of Free Text Keystroke Authentication using XGBoost

I Kuzminykh, S Mathur, B Ghita - International Conference on Computer …, 2023 - Springer
Authentication based on keystroke dynamics is a form of behavioral biometric authentication
that uses the user typing patterns and keyboard interaction as a discriminatory input. This …

User authentication with adaptive keystroke dynamics

SI Hassan, MM Selim, HH Zayed - International Journal of …, 2013 - search.proquest.com
Recently, keystroke dynamics increasingly being a field of interest for researchers, where
users can access different systems through their typing styles, which increases the level of …

[PDF][PDF] Enhanced knowledge-based user authentication technique via keystroke dynamics

S Roy, U Roy, DD Sinha - Int. J. Eng. Sci. Invention (IJESI), 2014 - academia.edu
Some common words (name, address, E-mail ID, password,…), we press daily and we are
habituated to press it in same rhythm, which is unique and can be used to segregate and …

Analysis of free-text keystroke dynamics for Arabic language using Euclidean distance

SA Alsuhibany, M Almushyti… - … on Innovations in …, 2016 - ieeexplore.ieee.org
Online services play an increasingly important role in executing tasks in many aspects of our
lives. These services depend greatly on authentication mechanisms in order to give …

[PDF][PDF] An improved user identification based on keystroke-dynamics and transfer learning

A Tewari, P Verma - Webology, 2022 - pdfs.semanticscholar.org
Transfer learning is one of the most appreciated classification techniques, when a small size
of training dataset and limited computer capabilities exist along with the presence of noisy …

An authentication system using keystroke dynamics

FJ Zareen, C Matta, A Arora… - … Journal of Biometrics, 2018 - inderscienceonline.com
There are various biometrics-based methods for user authentication. However, the best
authentication method can be based on physiological/behavioural biometrics as capturing …

Mouse movement behavioral biometric for static user authentication

R Muda, NA Hamid, SDM Satar… - Advanced Science …, 2017 - ingentaconnect.com
Authentication is a way to enable an individual to be uniquely identified usually based on
passwords and personal identification number (PIN). The main problems of such …