A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

A systematic review on keystroke dynamics

PH Pisani, AC Lorena - Journal of the Brazilian Computer Society, 2013 - Springer
Computing and communication systems have improved our way of life, but have also
contributed to an increased data exposure and, consequently, to identity theft. A possible …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Greyc keystroke: a benchmark for keystroke dynamics biometric systems

R Giot, M El-Abed… - 2009 IEEE 3rd International …, 2009 - ieeexplore.ieee.org
Even if the market penetration rate of biometric technologies is still far below its potential,
many biometric systems are used in our daily real-life. One of the main reasons to its low …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Keystroke dynamics-based user authentication using long and free text strings from various input devices

P Kang, S Cho - Information Sciences, 2015 - Elsevier
Keystroke dynamics, which refers to the typing pattern of an individual, has been highlighted
as a practical behavioral biometric feature that does not require any additional recognition …

Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection

J Kim, H Kim, P Kang - Applied Soft Computing, 2018 - Elsevier
Keystroke dynamics has been used to strengthen password-based user authentication
systems by considering the typing characteristics of legitimate users. The main problem with …

Sok: Keylogging side channels

JV Monaco - 2018 IEEE Symposium on Security and Privacy …, 2018 - ieeexplore.ieee.org
The first keylogging side channel attack was discovered over 50 years ago when Bell
Laboratory researchers noticed an electromagnetic spike emanating from a Bell 131-B2 …

On the discriminability of keystroke feature vectors used in fixed text keystroke authentication

KS Balagani, VV Phoha, A Ray, S Phoha - Pattern Recognition Letters, 2011 - Elsevier
Heterogeneous and aggregate vectors are the two widely used feature vectors in fixed text
keystroke authentication. In this paper, we address the question “Which vectors …

Unconstrained keystroke dynamics authentication with shared secret

R Giot, M El-Abed, B Hemery, C Rosenberger - Computers & security, 2011 - Elsevier
Among all the existing biometric modalities, authentication systems based on keystroke
dynamics present interesting advantages. These solutions are well accepted by users and …