Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

User Authentication using Keystroke Dynamics

Print
PDF
IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development
© 2019 by IJCA Journal
ICRTSTMSD 2018 - Number 1
Year of Publication: 2019
Authors:
Vishesh Mishra
Raghav Gupta
Raghav Gupta
J. C. Patni

Vishesh Mishra, Raghav Gupta, Raghav Gupta and J C Patni. Article: User Authentication using Keystroke Dynamics. IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development ICRTSTMSD 2018(1):29-33, August 2019. Full text available. BibTeX

@article{key:article,
	author = {Vishesh Mishra and Raghav Gupta and Raghav Gupta and J. C. Patni},
	title = {Article: User Authentication using Keystroke Dynamics},
	journal = {IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development},
	year = {2019},
	volume = {ICRTSTMSD 2018},
	number = {1},
	pages = {29-33},
	month = {August},
	note = {Full text available}
}

Abstract

"User Authentication Using Keystroke Dynamics". It is a method to get the user authentication on an android application by using the keystroke dynamics of the user using Artificial Neural Networks with the help of Error Back Propagation algorithm. In this application the user enters the password 30 times and databases are used to record 45 factors that describes a user's keystroke patterns like di-graph, dwell time, tri-graph, flight time, finger size, button pressure, coordinate values which can be seen by the user in real time. Once this is done the data is taken and put in an Artificial Neural Network and trained using Error back propagation Algorithm. This process done over time produces trained set off weights that would produces an already calculated value in the output layer. This data from the network is again stored in a separate table which is then used to check the authentication of the user typing the password.

References

  • J. D. Umphress and G Williams, "Mobile Authentication Using Keystroke Dynamics", International Conference on communication, Jan 2015
  • Mayur Mahadev Sawant, Yogesh Nagargoje, Darshan Bora, Shrinivas Shelke and Vishal Borate, "Keystroke Dynamics: Review Paper", International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 10, October 2013.
  • Heather Crawford, Keystroke Dynamics : Characteristics and opportunities, Privacy Security and Trust (PST), 2010 Eighth Annual International Conference, Aug 2010
  • Pauli Henrique Pisani, Ana Carolina Lorena, A systematic review on key stroke Dynamics, Journal of the Brazilian Computer Society, Nov. 2013
  • Fabian Monrose, Aviel D. Rubin, Keystroke dynamics as a biometric for authentication, Feb 2000
  • Mahesh Babu B, Mary SairaBhanu UNIVERSITY, "Analyzing User Behaviour Using Keystrokes Dynamics to Protect Cloud from Malicious Insiders", IEEE 2016
  • Rohit A Patil,Amar L. Renke, "Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm",International Journal of Computer Applications vol. 144, nos. 9, June. 2016.
  • Hyoung-jooLee,Sungzoon Cho, "Retraining a keystroke dynamics-based authenticator with impostor patterns", in ELSEVIER.