메뉴 건너뛰기




Volumn 38, Issue 6, 2008, Pages 816-826

Gaussian mixture modeling of keystroke patterns for biometric applications

Author keywords

Biometric; Digital signature; Down down keystroke latency (DDKL); Gaussian mixture model (GMM); Key hold down time (KD); Keystroke protocol; Keystroke verification; Leave one out method (LOOM); Typing pattern; Up up keystroke latency (UUKL)

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BIOMETRICS; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER WORKSTATIONS; DIGITAL ARITHMETIC; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE SEGMENTATION; KETONES; LOOMS; MAGNETOSTRICTIVE DEVICES; MIXTURES; OBJECT RECOGNITION; TRELLIS CODES;

EID: 56049086396     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2008.2001696     Document Type: Article
Times cited : (94)

References (39)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Dec
    • A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM vol. 42, no. 12, pp. 41-46, Dec. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • Oct
    • A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification," IEEE Secur. Privacy Mag., vol. 2, no. 5, pp. 40-47, Oct. 2004.
    • (2004) IEEE Secur. Privacy Mag , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 3
    • 33750814617 scopus 로고    scopus 로고
    • Intelligent technologies for managing fraud and identity theft
    • Apr
    • R. Bose, "Intelligent technologies for managing fraud and identity theft," in Proc. 3rd Int. Conf. Inf. Technol.: NewGenerations, Apr. 2006, pp. 446-451.
    • (2006) Proc. 3rd Int. Conf. Inf. Technol.: NewGenerations , pp. 446-451
    • Bose, R.1
  • 4
    • 33746176055 scopus 로고    scopus 로고
    • Biometric authentication systems for credit cards could put identity thieves out of business
    • Jul
    • A. K. Jain and S. Pankanti, "Biometric authentication systems for credit cards could put identity thieves out of business," IEEE Spectr., vol. 43, no. 7, pp. 22-27, Jul. 2006.
    • (2006) IEEE Spectr , vol.43 , Issue.7 , pp. 22-27
    • Jain, A.K.1    Pankanti, S.2
  • 6
    • 12844256823 scopus 로고
    • Keyboard apparatus for p ersonal identification
    • R. Spillane, "Keyboard apparatus for p ersonal identification," IBM Tech. Disclosure Bulletin, vol. 17, no. 3346, 1975.
    • (1975) IBM Tech. Disclosure Bulletin , vol.17 , Issue.3346
    • Spillane, R.1
  • 7
    • 0041108231 scopus 로고
    • Dynamic identity verification via keystroke characteristics
    • J. J. Leggett, G. Williams, M. Usnick, and M. Longnecker, "Dynamic identity verification via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 35, no. 6, pp. 859-870, 1991.
    • (1991) Int. J. Man-Mach. Stud , vol.35 , Issue.6 , pp. 859-870
    • Leggett, J.J.1    Williams, G.2    Usnick, M.3    Longnecker, M.4
  • 9
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Feb
    • R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 10
    • 0022129862 scopus 로고
    • Identity verification through keyboard characteristics
    • D. A. Umphress and G.Williams, "Identity verification through keyboard characteristics," Int. J. Man-Mach. Stud., vol. 23, no. 3, pp. 263-273, 1985.
    • (1985) Int. J. Man-Mach. Stud , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.A.1    Williams, G.2
  • 11
    • 0023843707 scopus 로고
    • Verifying identity via keystroke characteristics
    • J. J. Leggett and G.Williams, "Verifying identity via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 28, no. 1, pp. 67-76, 1988.
    • (1988) Int. J. Man-Mach. Stud , vol.28 , Issue.1 , pp. 67-76
    • Leggett, J.J.1    Williams, G.2
  • 12
    • 0025541584 scopus 로고    scopus 로고
    • S. Bleha, C. Slivinsky, andB.Hussien, Computer-access security systems using keystroke dynamics, IEEE Trans. Pattern Anal. Mach. Intell. 12, no. 12, pp. 1217-1222, Dec. 1990.
    • S. Bleha, C. Slivinsky, andB.Hussien, "Computer-access security systems using keystroke dynamics," IEEE Trans. Pattern Anal. Mach. Intell. vol. 12, no. 12, pp. 1217-1222, Dec. 1990.
  • 14
    • 0347560656 scopus 로고
    • The basis of transcription skill
    • L. H. Shaffer and J. Hardwick, "The basis of transcription skill," J. Exp. Psychol., vol. 84, no. 3, pp. 424-440, 1970.
    • (1970) J. Exp. Psychol , vol.84 , Issue.3 , pp. 424-440
    • Shaffer, L.H.1    Hardwick, J.2
  • 15
    • 56049111829 scopus 로고
    • Latency Experiments in Transcription
    • S. Kornblum, Ed. New York: Academic
    • L. H. Shaffer, Latency Experiments in Transcription (ser. Attention and Performance), vol. 4, S. Kornblum, Ed. New York: Academic, 1973.
    • (1973) ser. Attention and Performance , vol.4
    • Shaffer, L.H.1
  • 16
    • 0040534362 scopus 로고
    • A model for subjective grouping in typewriting
    • E. Thomas and R. Jones, "A model for subjective grouping in typewriting," Q. J. Exp. Psychol., vol. 22, pp. 354-367, 1970.
    • (1970) Q. J. Exp. Psychol , vol.22 , pp. 354-367
    • Thomas, E.1    Jones, R.2
  • 17
    • 0005322028 scopus 로고    scopus 로고
    • D. Mahar, R. Napier,M.Wagner,W. Laverty, R. Henderson, andM.Hiron, Optimizing digraph-latency based biometric typist verification systems: Inter and intra typist differences in digraph latency distributions, Int. J. Human-Comput. Stud., 43, no. 4, pp. 579-592, 1995.
    • D. Mahar, R. Napier,M.Wagner,W. Laverty, R. Henderson, andM.Hiron, "Optimizing digraph-latency based biometric typist verification systems: Inter and intra typist differences in digraph latency distributions," Int. J. Human-Comput. Stud., vol. 43, no. 4, pp. 579-592, 1995.
  • 18
    • 56049086814 scopus 로고    scopus 로고
    • A. J. Mansfield and J. L.Wayman, Best practices in testing and reporting performance of biometric devices, Centre Math. Sci. Comput., Nat. Phys. Laboratory, U.K., Tech. Rep. NPL CMSC 14/02, Aug. 2002.
    • A. J. Mansfield and J. L.Wayman, "Best practices in testing and reporting performance of biometric devices," Centre Math. Sci. Comput., Nat. Phys. Laboratory, U.K., Tech. Rep. NPL CMSC 14/02, Aug. 2002.
  • 19
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • Feb
    • F. Monrose and A. Rubin, "Keystroke dynamics as a biometric for authentication," Future Generation Comput. Syst. (FGCS), vol. 16, no. 4, pp. 351-359, Feb. 2000.
    • (2000) Future Generation Comput. Syst. (FGCS) , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.2
  • 20
    • 0030721345 scopus 로고    scopus 로고
    • Computer-access authentication with neural network based keystroke identity verification
    • Jun
    • D.-T. Lin, "Computer-access authentication with neural network based keystroke identity verification," in Proc. IEEE Int. Conf. Neural Netw. vol. 1, Jun. 1997, pp. 174-178.
    • (1997) Proc. IEEE Int. Conf. Neural Netw , vol.1 , pp. 174-178
    • Lin, D.-T.1
  • 21
    • 0031121887 scopus 로고    scopus 로고
    • Verification of computer users using keystroke dynamics
    • Apr
    • M. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst., Man Cybern. - Part B: Cybern., vol. 27, no. 2, pp. 261-269, Apr. 1997.
    • (1997) IEEE Trans. Syst., Man Cybern. - Part B: Cybern , vol.27 , Issue.2 , pp. 261-269
    • Obaidat, M.1    Sadoun, B.2
  • 22
    • 0039921279 scopus 로고
    • User identification via keystroke characteristics of typed names using neural networks
    • Dec
    • M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999-1014, Dec. 1993.
    • (1993) Int. J. Man-Mach. Stud , vol.39 , Issue.6 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 23
    • 0141522840 scopus 로고    scopus 로고
    • GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
    • Jul
    • E.Yu and S.Cho, "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification," in Proc. IEEE Int. Joint Conf. Neural Netw., Jul. 2003, pp. 2253-2257.
    • (2003) Proc. IEEE Int. Joint Conf. Neural Netw , pp. 2253-2257
    • Yu, E.1    Cho, S.2
  • 24
    • 16244403658 scopus 로고    scopus 로고
    • Applying hidden Markov models to keystroke pattern analysis for password verification
    • Nov
    • W. Chen and W. Chang, "Applying hidden Markov models to keystroke pattern analysis for password verification," in Proc. IEEE Int. Conf. Inform. Reuse Integr. (IRI), Nov. 2004, pp. 467-474.
    • (2004) Proc. IEEE Int. Conf. Inform. Reuse Integr. (IRI) , pp. 467-474
    • Chen, W.1    Chang, W.2
  • 25
    • 33745728505 scopus 로고    scopus 로고
    • Improving hidden Markov models with a similarity histogram for typing pattern biometrics
    • Aug
    • W. Chang, "Improving hidden Markov models with a similarity histogram for typing pattern biometrics," in Proc. IEEE Int. Conf. Inf. Reuse Integr. (IRI), Aug. 2005, pp. 487-493.
    • (2005) Proc. IEEE Int. Conf. Inf. Reuse Integr. (IRI) , pp. 487-493
    • Chang, W.1
  • 26
    • 14244251045 scopus 로고    scopus 로고
    • Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data
    • S. Mandujano and R. Soto, "Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data," in Proc. 5th Mexican Int. Conf. Comput. Sci. (ECN'04), pp. 181-187.
    • Proc. 5th Mexican Int. Conf. Comput. Sci. (ECN'04) , pp. 181-187
    • Mandujano, S.1    Soto, R.2
  • 32
    • 0033738539 scopus 로고    scopus 로고
    • The nist speaker recognition evaluation - Overview, methodology, systems, results, perspectives
    • Jun
    • G. R. Doddington, M. A. Przybocki, A. F. Martin, and D. A. Reynolds, "The nist speaker recognition evaluation - Overview, methodology, systems, results, perspectives," Speech Commun., vol. 31, no. 2-3, pp. 225-254, Jun. 2000.
    • (2000) Speech Commun , vol.31 , Issue.2-3 , pp. 225-254
    • Doddington, G.R.1    Przybocki, M.A.2    Martin, A.F.3    Reynolds, D.A.4
  • 33
    • 0002629270 scopus 로고
    • Maximum likelihood from incomplete data via the EM algorithm
    • A. Dempster, N. Laird, and D. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. R. Stat. Soc. Series B (Methodol.), vol. 39, no. 1, pp. 1-38, 1977.
    • (1977) J. R. Stat. Soc. Series B (Methodol.) , vol.39 , Issue.1 , pp. 1-38
    • Dempster, A.1    Laird, N.2    Rubin, D.3
  • 34
    • 0029209272 scopus 로고
    • Robust text-independent speaker identification using Gaussian mixture speaker models
    • Jan
    • D. A. Reynolds and R. C. Rose, "Robust text-independent speaker identification using Gaussian mixture speaker models," IEEE Trans. Speech Audio Process., vol. 3, no. 1, pp. 72-83, Jan. 1995.
    • (1995) IEEE Trans. Speech Audio Process , vol.3 , Issue.1 , pp. 72-83
    • Reynolds, D.A.1    Rose, R.C.2
  • 35
    • 0001091769 scopus 로고
    • Automatic speaker recognition using gaussian mixture speaker models
    • D. A. Reynolds, "Automatic speaker recognition using gaussian mixture speaker models," Lincoln Lab. J., vol. 8, no. 2, pp. 173-192, 1995.
    • (1995) Lincoln Lab. J , vol.8 , Issue.2 , pp. 173-192
    • Reynolds, D.A.1
  • 38
    • 84894355098 scopus 로고
    • Selecting the optimal number of components for a Gaussian mixture model
    • Jun
    • P. McKenzie andM. Alder, "Selecting the optimal number of components for a Gaussian mixture model," in Proc. IEEE Int. Symp. Inf. Theory Jun. 1994, p. 393.
    • (1994) Proc. IEEE Int. Symp. Inf. Theory , pp. 393
    • McKenzie andM, P.1    Alder2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.