2021
DOI: 10.3390/s21062242
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamics-Based Authentication Using Unique Keypad

Abstract: Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are vulnerable to shoulder-surfing attacks, and PIN authentication, in particular, is poor in terms of security because PINs are short in length with just four to six digits. A wide range of research is currently underway to examine various biometric authentication methods, for example, using the user’s face, fingerprint, or iris informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…The input timing features such as press time, hold time, total duration, and inter key timing convey unique characteristics for user identification. [30,35,57] The elapsed time in between each successive key (such as 1-4, 4-2, and 2-3) to complete a 4-digit passcode "1423" and the total duration of the keypress were also analyzed 80 number of trials for each user. Figure S9 in the Supporting Information shows the plot of the time intervals for each user which includes total duration and the elapsed time between each keypress.…”
Section: Sp-hps Array-based User Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…The input timing features such as press time, hold time, total duration, and inter key timing convey unique characteristics for user identification. [30,35,57] The elapsed time in between each successive key (such as 1-4, 4-2, and 2-3) to complete a 4-digit passcode "1423" and the total duration of the keypress were also analyzed 80 number of trials for each user. Figure S9 in the Supporting Information shows the plot of the time intervals for each user which includes total duration and the elapsed time between each keypress.…”
Section: Sp-hps Array-based User Authenticationmentioning
confidence: 99%
“…[ 9 ] These days, finger touch password‐based electronic access and user authentication systems are highly admired in daily human activities for personalized securities at home/business and activity control applications, which are more user‐friendly and prosaic. [ 30,31 ] However, weak passwords are highly susceptible thus imposing security threats. The pressure sensing‐based password verification has been contrived as one of the reliable approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Keystroke dynamics data can be collected by typing standard or non-standard passwords. Features extracted from the raw data that represent the typing patterns are used to create a unique profile for each user and to authorize those users later to resources [8][9][10]. It can also be used to recognize the emotions of a person [11].…”
Section: Behavioral Biometrics Models In Literaturementioning
confidence: 99%
“…Continuous authentication offers a layer of protection to the service provider, which is utilised to increase usability in most circumstances [28]. As it is shown in the user verification model, the process of verifying the identity of the user is multi-step and can be time-consuming depending on the configuration of the underlying system.…”
Section: A Defending the Proposed User Verification Modelmentioning
confidence: 99%