2021
DOI: 10.1016/j.future.2020.09.027
|View full text |Cite
|
Sign up to set email alerts
|

Time–frequency analysis of keystroke dynamics for user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…These results demonstrate the robustness and accuracy of the proposed authentication method. Toosi et al [32] presented a user authentication system based on keyboard dynamics, which operates at a novel level of analysis. The system leverages time-frequency analysis to directly measure the similarity between the input model and the user's reference model.…”
Section: Related Workmentioning
confidence: 99%
“…These results demonstrate the robustness and accuracy of the proposed authentication method. Toosi et al [32] presented a user authentication system based on keyboard dynamics, which operates at a novel level of analysis. The system leverages time-frequency analysis to directly measure the similarity between the input model and the user's reference model.…”
Section: Related Workmentioning
confidence: 99%
“…And Down-to-down time (DD.time) measures the duration between one keypress to another, Up-to-down time (UD.time) is the time from the release of one key and the press of another (in some literature, called flight time) [34]. The data-collection and training phase of keystroke dynamics can be categorized based on the length and type of the text [54]. Fixed-length models use a limited dataset that consist of username and password.…”
Section: User Keypress Data and Their Minimummentioning
confidence: 99%
“…All behavioral characteristics, including the KD, can gradually change with time; however, the probability of stealing or imitating these data is significantly lower than that for physiological data. That is why the KD can be useful for identification and authentication [ 11 , 12 ]. The advantages, disadvantages, and examples of the authentication methods considered above are summarized in Table 1 .…”
Section: Keystroke Authentication and Identificationmentioning
confidence: 99%
“…The analysis of the researches devoted to keystroke features showed that the most popular ones are DU and UD (dwell time and flight time): according to [ 12 , 20 ], the frequency of using each of them ranges from 30% to 40% in applied research.…”
Section: Hidden Monitoring In Online Examination Systemsmentioning
confidence: 99%