KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization (2405.01080v2)
Abstract: In contemporary mobile user authentication systems, verifying user legitimacy has become paramount due to the widespread use of smartphones. Although fingerprint and facial recognition are widely used for mobile authentication, PIN-based authentication is still employed as a fallback option if biometric authentication fails after multiple attempts. Consequently, the system remains susceptible to attacks targeting the PIN when biometric methods are unsuccessful. In response to these concerns, two-factor authentication has been proposed, albeit with the caveat of increased user effort. To address these challenges, this paper proposes a passive authentication system that utilizes keystroke data, a byproduct of primary authentication methods, for background user authentication. Additionally, we introduce a novel image encoding technique to capture the temporal dynamics of keystroke data, overcoming the performance limitations of deep learning models. Furthermore, we present a methodology for selecting suitable behavioral biometric features for image representation. The resulting images, depicting the user's PIN input patterns, enhance the model's ability to uniquely identify users through the secondary channel with high accuracy. Experimental results demonstrate that the proposed imaging approach surpasses existing methods in terms of information capacity. In self-collected dataset experiments, incorporating features from prior research, our method achieved an Equal Error Rate (EER) of 6.7%, outperforming the existing method's 47.7%. Moreover, our imaging technique attained a True Acceptance Rate (TAR) of 94.4% and a False Acceptance Rate (FAR) of 8% for 17 users.
- Ericsson. Number of smartphone mobile network subscriptions worldwide from 2016 to 2022, with forecasts from 2023 to 2028. Statista, June 2023. [Online] Available: https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/ [Accessed Mar 13, 2024].
- Smudge attacks on smartphone touch screens. In 4th USENIX workshop on offensive technologies (WOOT 10), 2010.
- The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In 2012 IEEE symposium on security and privacy, pages 553–567. IEEE, 2012.
- Mobile keystroke dynamics for biometric recognition: An overview. IET biometrics, 10(1):1–23, 2021.
- Forgery-resistant touch-based authentication on mobile devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 499–510, 2016.
- Bioprivacy: Development of a keystroke dynamics continuous authentication system. In European Symposium on Research in Computer Security, pages 158–170. Springer, 2021.
- Continuous authentication by free-text keystroke based on cnn and rnn. Computers & Security, 96:101861, 2020.
- Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access, 8:156177–156189, 2020.
- Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In Mobile Computing, Applications, and Services: 5th International Conference, MobiCASE 2013, Paris, France, November 7-8, 2013, Revised Selected Papers 5, pages 184–201. Springer, 2014.
- Keystroke dynamics-based authentication using unique keypad. Sensors, 21(6):2242, 2021.
- Mobile behavioral biometrics for passive authentication. Pattern Recognition Letters, 157:35–41, 2022.
- Pre-trained image processing transformer. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 12299–12310, 2021.
- Transformers in medical image analysis. Intelligent Medicine, 3(1):59–78, 2023.
- Time series as images: Vision transformer for irregularly sampled time series. Advances in Neural Information Processing Systems, 36, 2024.
- Orcan Alpar. Keystroke recognition in user authentication using ann based rgb histogram technique. Engineering Applications of Artificial Intelligence, 32:213–217, 2014.
- User keystroke authentication based on convolutional neural network. In Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers 2, pages 157–168. Springer, 2019.
- An improved user identification based on keystroke-dynamics and transfer learning. Webology, 19(1):5369–5387, 2022.
- Free-text keystroke dynamics for user authentication. In Artificial Intelligence for Cybersecurity, pages 357–380. Springer, 2022.
- Keystroke dynamics based user authentication using deep learning neural networks. In 2022 International Conference on Cyberworlds (CW), pages 220–227. IEEE, 2022.
- Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In proceedings of the 33rd annual ACM conference on human factors in computing systems, pages 1393–1402, 2015.
- Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pages 125–134. IEEE, 2009.
- Shared research dataset to support development of keystroke authentication. In IEEE International joint conference on biometrics, pages 1–8. IEEE, 2014.
- Shared keystroke dataset for continuous authentication. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1–6. IEEE, 2016.
- Hmog: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security, 11(5):877–892, 2015.
- Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning. In Proceedings of the 2018 2nd international conference on biometric engineering and applications, pages 50–57, 2018.
- Temporal signals to images: Monitoring the condition of industrial assets with deep learning image processing algorithms. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 236(4):617–627, 2022.
- Recurrence plots of dynamical systems. World Scientific Series on Nonlinear Science Series A, 16:441–446, 1995.
- Encoding time series as images for visual inspection and classification using tiled convolutional neural networks. In Workshops at the twenty-ninth AAAI conference on artificial intelligence, 2015.
- Deep one-class classification. In International conference on machine learning, pages 4393–4402. PMLR, 2018.
- Obfuscating keystroke time intervals to avoid identification and impersonation. arXiv preprint arXiv:1609.07612, 2016.