User Authentication based on Dynamic Keystroke Recognition

User Authentication based on Dynamic Keystroke Recognition

Khaled Mohammed Fouad (Department of Information Systems, Faculty of Computers and Informatics, Benha University, Benha, Egypt), Basma Mohammed Hassan (Department of Electrical Engineering Technology, Faculty of Engineering, Benha University, Benha, Egypt) and Mahmoud F. Hassan (Department of Basic Sciences, Faculty of Engineering, Benha University, Benha, Egypt)
Copyright: © 2016 |Pages: 32
DOI: 10.4018/IJACI.2016070101
OnDemand PDF Download:


Biometric identification is a very good candidate technology, which can facilitate a trusted user authentication with minimum constraints on the security of the access point. However, most of the biometric identification techniques require special hardware, thus complicate the access point and make it costly. Keystroke recognition is a biometric identification technique which relies on the user behavior while typing on the keyboard. It is a more secure and does not need any additional hardware to the access point. This paper presents a developed behavioral biometric authentication method which enables to identify the user based on his Keystroke Static Authentication (KSA) and describes an authentication system that explains the ability of keystroke technique to authenticate the user based on his template profile saved in the database. Also, an algorithm based on dynamic keystroke analysis has been presented, synthesized, simulated and implemented on Field Programmable Gate Array (FPGA). The proposed algorithm is tested on 25 individuals, achieving a False Rejection Rate (FRR) about 4% and a False Acceptance Rate (FAR) about 0%. This performance is reached using the same sampling text for all the individuals. In this paper, two methods are used to implement the proposed approach: method one (H/W based Sorter) and method two (S/W based Sorter) are achieved execution time about 50.653 ns and 9.650 ns, respectively. Method two achieved a lower execution time; the time in which the proposed algorithm is executed on FPGA board, compared to some published results. As the second method achieved a small execution time and area utilization so it is the preferred method to be implemented on FPGA.
Article Preview

1. Introduction

The word “Biometric” is an ancient Greek word which referees to bio means “life” and metric means “measure” (Babaeizadeh et al., 2015). Biometric authentication supports three important factors of information security system. These factors are authentication, identification, and non-repudiation (Smith et al., 2013). Authorization and Authentication (Emam, 2013) are kind of security and privacy issues of biometric authentication system. However, a lot of research discussed this problem and tried to introduce many solutions to decrease the gap among security, authentication and security environment which prevents the spread of that technology. Biometrics (Jaiswal et al., 2011) is a set of technologies based on the measurement of unique behavioral or physical characteristics for the purpose of identifying or authentication an individual (Bandara et al., 2015).

Biometric authentication systems (BAS) are believed to be the effective technologies compared to the traditional authentication methods such as passwords, tokens and PINs (Tin, 2015) that failed to keep up with the challenges presented because they can be stolen or lost (Babaeizadeh et al., 2015), this means infirm security system. Authentication types can be classified under three different security field (Liu et al., 2001) such as Table 1 shows an overview of different authentication approaches:

Table 1.
Overview of different authentication approaches
KnowledgeEffortless High acceptanceForgotten Shoulder spoofingPassword,
TokenCheap Simple deploymentLost, theftSmart Card
BiometricsDeter sharing Unique UnforgettableCost InvasiveFingerprint, Voice, Keystroke
  • Something you Know: Something only you remember like password, PIN, or a piece of personal information such as (where are you born?) and knowledge approaches.

  • Something you Have: Something only you possess such as a Smart card, Card key or a token approaches like a secure – ID card.

  • Something you Are: Some biometric property.

  • Combinations: (Multiple factors)

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing