skip to main content
10.1145/2379616.2379617acmotherconferencesArticle/Chapter ViewAbstractPublication PageslaserConference Proceedingsconference-collections
research-article

Free vs. transcribed text for keystroke-dynamics evaluations

Published:18 July 2012Publication History

ABSTRACT

Background. One revolutionary application of keystroke dynamics is continuous reauthentication: confirming a typist's identity during normal computer usage without interrupting the user.

Aim. In laboratory evaluations, subjects are typically given transcription tasks rather than free composition (e.g., copying rather than composing text), because transcription is easier for subjects. This work establishes whether free and transcribed text produce equivalent evaluation results.

Method. Twenty subjects completed comparable transcription and free-composition tasks; two keystroke-dynamics classifiers were implemented; each classifier was evaluated using both the free-composition and transcription samples.

Results. Transcription hold and keydown-keydown times are 2--3 milliseconds slower than free-text features; t-tests showed these effects to be significant. However, these effects did not significantly change evaluation results.

Conclusions. The additional difficulty of collecting freely composed text from subjects seems unnecessary; researchers are encouraged to continue using transcription tasks.

References

  1. F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Transactions on Information and System Security (ACM TISSEC), 5(4):367--397, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Bergadano, D. Gunetti, and C. Picardi. Identity verification through dynamic keystroke analysis. Intelligent Data Analysis, 7(5):469--496, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. E. P. Box, J. S. Hunter, and W. G. Hunter. Statistics for Experimenters: Design, Innovation, and Discovery. Wiley, New York, 2nd edition, 2005.Google ScholarGoogle Scholar
  4. F. Bretz, T. Hothorn, and P. Westfall. Multiple Comparisons Using R. CRC Press, Boca Raton, FL, 2011.Google ScholarGoogle Scholar
  5. S. K. Card, T. P. Moran, and A. Newell. The keystroke-level model for user performance time with interactive systems. Communications of the ACM, 23(7):396--410, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. S. Dowland, S. M. Furnell, and M. Papadaki. Keystroke analysis as a method of advanced user authentication and response. In Security in the Information Society: Visions and Perspectives---Proceedings of the 17th International Conference on Information Security (SEC-2002), pages 215--226, May 7--9, 2002, Cairo, Egypt, 2002. Kluwer Academic Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. M. Furnell, J. P. Morrissey, P. W. Sanders, and C. T. Stockel. Applications of keystroke analysis for improved login security and continuous user authentication. In S. K. Katsikas and D. Gritzalis, editors, Information Systems Security: Facing the Information Society of the 21st Century, pages 283--294. Chapman & Hall, on behalf of the International Federation for Information Processing (IFIP), 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro. Authentication by keystroke timing: Some preliminary results. Technical Report R-2526-NSF, RAND Corporation, May 1980.Google ScholarGoogle Scholar
  9. D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Transactions on Information and System Security (TISSEC), 8(3):312--347, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer Series in Statistics. Springer, New York, NY, 2001.Google ScholarGoogle Scholar
  11. M. H. Hennessey and A. Knutson. Norman Rockwell: Pictures for the American People. Harry N. Abrams, New York, 1999.Google ScholarGoogle Scholar
  12. A. Madansky. Prescriptions for Working Statisticians (Springer Texts in Statistics). Springer-Verlag, NY, 1988.Google ScholarGoogle Scholar
  13. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Monrose and A. Rubin. Authentication via keystroke dynamics. In 4th ACM Conference on Computer and Communications Security (CCS 1997), pages 48--56, Apr 1--4, 1997, Zurich, Switzerland, 1997. ACM, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Montalvão, C. A. S. Almeida, and E. O. Freire. Equalization of keystroke timing histograms for improved identification performance. In International Telecommunications Symposium, pages 560--565, September 3--6, 2006, Fortaleza, Brazil, 2006. IEEE, Piscataway, NJ.Google ScholarGoogle ScholarCross RefCross Ref
  16. R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2008. http://www.R-project.org.Google ScholarGoogle Scholar
  17. T. Sim and R. Janakiraman. Are digraphs good for free-text keystroke dynamics? In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 1--6, June 17--22, 2007, Minneapolis, MN, 2007. IEEE Computer Society, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  18. D. Umphress and G. Williams. Identity verification through keyboard characteristics. International Journal of Man-Machine Studies, 23(3):263--273, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  19. D. D. Wackerly, W. Mendenhall III, and R. L. Scheaffer. Mathematical Statistics with Applications. Duxbury, Thomson Learning, sixth edition, 2002.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    LASER '12: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
    July 2012
    62 pages
    ISBN:9781450311953
    DOI:10.1145/2379616

    Copyright © 2012 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 July 2012

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader