Biometric patterns recognition using keystroke dynamics
Resumo
This paper aims to describe a strategy for biometric authentication embedded system that uses keystroke dynamics to recognize the users. The main motivation of this work is a gap identified on the biometric authentication devices market that demonstrates the lack of a low cost and high efficiency product. Therefore, the use of low cost microcontrollers coupled with a good biometric authentication strategy could fill this gap. The PIC and ESP microcontrollers were used to create a prototype with the purpose of performing measurements and generating users' biometric models. During these measurements 9 volunteers had their typing characteristics extracted and stored. After data collection, several tests were performed and values of 36% for FRR and 7.2% for FAR were found. More expensive results can still be achieved by modifying some punctualities in data collection, as commented at the end of the paper.
Referências
DIMEP (2015). Entenda como funciona um notebook com leitor biométrico.
DLock (2018). Fechadura biométrica dl 2800.
FORSEN, G. E., NELSON, M. R., and STARON, R. J. (1977). Personal attributes authentication techniques. Rome Air Development Center.
GRABHAM, N. J. and WHITE, N. M. (2008). Use of a novel keypad biometric for enhanced user identity verification. IEEE International Instrumentation and Measurement Technology Conference.
HAIDER, S., ABBAS, A., and ZAIDI, A. K. (2000). A multi-technique approach for user identification through keystroke dynamics. Systems, Man, and Cybernetics, 2000 IEEE International Conference on, 2:1336–1341.
IBM (1975). Keyboard Apparatus for Personal Identification. IBM.
KILLOURGHY, K. S. and MAXION, R. A. (2009). Comparing anomaly-detection algorithms for keystroke dynamics. 2009 IEEE/IFIP International Conference on Dependable Systems Networks, pages 125–134.
LEE, H. S., LAU, T. S., LAI, W. K., KING, Y. C., and LIM, L. L. (2017). User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference. 2017 IEEE 15th Student Conference on Research and Development, pages 83–88.
Leroy Merlin (2018). Fechaduras eletrônicas.
MONROSE, F. and RUBIN, A. (2000). Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4):351–359.
Nandakumar, K. and Jain, A. K. (2012). Biometric authentication: System security and user privacy. Computer, 45:87–92.
SAINI, B. S., KAUR, N., and BHATIA, K. S. (2017). Keystroke dynamics based user authentication using numeric keypad. 2017 7th International Conference on Cloud Computing, Data Science Engineering - Confluence, pages 25–29.
SAMSUNG (2017). Leitor de íris: Samsung galaxy s8 e s8+.
SHANMUGAPRIYA, M. D. and PADMAVATHI, D. G. (2009). A survey of biometric keystroke dynamics: Approaches, security and challenges. International Journal of Computer Science and Information Security, 5(1):115–119.
TEH, P. S., TEOH, A. B. J., and YUE, S. (2013). A survey of keystroke dynamics biometrics. The Scientific World Journal, 2013.
TROJAHN, M. and ORTMEIER, F. (2013). Toward mobile authentication with keystroke dynamics on mobile phones and tablets. 2013 27th International Conference on Advanced Information Networking and Applications Workshops, pages 697–702. UFPR. Tabela normal padrão.
van de Weijer, S. G., Leukfeldt, R., and Bernasco, W. (2018). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology, 0(0):1477370818773610.
WAYMAN, J., JAIN, A., MALTONI, D., and MAIO, D. (2015). An introduction to biometric authentication systems. Biometric Systems, pages 1–20.