A Survey on Keystroke Dynamics Based Authentication System
Keywords:
Behavioral Analysis, Static Authentication, User Authentication, Keystroke Dynamics, Verification.Abstract
In the keystroke dynamics, we face many types of error and problems in user authentication. In this new types of static authentication method where we found the selective data or information is described the user keystroke. By the experiments of this authentication problem we applicable to substantiated and optimize the condition for the selected and implemented of the method. In this approach, we only discuss the limitation, strength, facts which are combined the behavioral biometric trait. Finally, in this research field, we face the different types of open research problems and challenges.
References
- Prof. Dharmendra Singh, Bhawnesh Jaggi, Himanshu Nayyar, Amit Kumar, "Presskey- A Keystrokes Dynamics Based Authentication System" International Journal of Advanced Research in Computer Science, Volume 8 No. 5, May- June 2017, pp. 2665-2670.
- V. Yu. Kaganov, A.K. Korolev, M. N. Krylov, I. V. Mashechkin, M. I. Petrovskii, "Machine Learning Methods In Authentication Problems Using Password Keystroke Dynamics", Computational Mathematics and Modeling, Volume 26 No. 3, July 2015, pp. 398-407.
- Ahmed Mahfouz, Tarek M. Mahmoud, ahmed Sharaf Eldin, "A survey on behavioral biometrics authentication on smartphones", Journal of Information Security and Applications, Elsevier, 2017, pp. 28-37.
- Ravi Kiran, Sarita Soni, "A Keystroke Dynamics Based Authentication System", International Journal of Computer Science Trends and Technology, Volume 6 Issue 2, Mar-Apr 2018, pp. 53-55.
- P.H. Pisani, A.C. Lorena, "Emphasizing typing signature in keystroke dynamics using immune algorithms," Applied Soft Computing Volume 34, September 2015, pp 178–193, Elsevier Press, DOI: 10.1016/j.asoc.2015.05.008
- D. Shanmugapriya, G. Padmavathi, "Virtual Key Force-A New Feature for Keystroke," J. International Journal of Engineering Science and Technology, Vol. 3 No. 10 October 2011, pp. 738-743.
- A. K. Jain, R. Bolle, and S. Pankanti (editors), Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, 1999.
- K. Wangsuk, T.A. Amornkul, "Trajectory Mining for Keystroke Dynamics Authentication," Procedia Computer Science, Volume 24, 2013, Elsevier Press, pp 175-183, DOI: 10.1016/j.procs.2013.10.041
- R. Thanganayagam, A. Thangadurai, "Hybrid Model with Fusion Approach to Enhance the Efficiency of Keystroke Dynamics Authentication," Proc 3rd International Conference on Advanced Computing, Networking and Informatics, Oct 2015, SIST vol 43, Springer Press, pp 85-96, DOI: 10.1007/978-81-322-2538-6_10
- G. Jagadamba, S.P. Sharmila, T. Gouda, "A Secured Authentication System Using an Effective Keystroke Dynamics," Proc Emerging Research in Electronics, Computer Science and Technology, 2013. LNEE vol 248 Springer press, pp 453-460, DOI: 10.1007/978-81-322-1157-0_46
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.