SlideShare uma empresa Scribd logo
1 de 19
Seminar On -

Keystroke Dynamics
Contents
• Introduction
 Overview of Biometrics
 Characteristics
• Various approaches of research on keystroke dynamics
 Techniques
 Analysis
• Advantages/Drawbacks of keystroke dynamics
• Research Available
• Conclusion
User Authentication Approaches
What is Biometric Authentication?
• An automatic method that identifies user or verifies the
identity of living individuals.

• Types of Biometric
 Physiological (Physical )
 Behavioural (Behavioural )
Physiological characteristics
• Biological/chemical based –
 Finger prints
 Iris, Retinal scanning
 Hand shape geometry
 blood vessel/vein pattern
 Facial recognition
 ear image
 DNA
Behavioral characteristics
• A reflection of an individual’s psychology
Hand written signatures
Voice pattern
Mouse movement dynamics
Gait (way of walking)
Keystroke dynamics
Keystroke Dynamics

• Keystroke dynamics, or typing dynamics, is the detailed
timing information that describes exactly when each key
was pressed and when it was released as a person is typing
at a computer keyboard.
• The recorded keystroke timing data is then processed
through a unique neural algorithm, which determines a
primary pattern for future comparison
Keystroke Verification Techniques
• Static verification (Fixed text mode)
 Only based on password typing rhythm
 Authentication only at login time

• Dynamic verification (free text mode)
 pattern regardless of the typed text
 A continuous or periodic monitoring (On-the-fly user
authentication)
Some metrics for user verification
•
•
•
•
•
•
•
•
•

Typing speed
Keystroke seek-time
Flight time
Characteristic sequences of keystrokes
Examination of characteristic errors
Frequency of error
Method of error correction
Pressure (Force of keystrokes)
Duration of a specific keystroke.
Keystroke analysis
• Variety of methods
Mean typing rate(wpm)
Inter-interval comparison
Digraph
Trigraph
Biometric System
Advantages :
• Software Only method. (No Additional Hardware
except a Keyboard)
• Simple To Deploy and Use (username &
passwords) – Universally accepted
• Cost Effective
• No End-User Training
• It provides a simple natural way for increased
computer security
• Can be used over the internet
Drawbacks:
• User’s susceptibility to fatigue
• Dynamic change in typing patterns

• Injury, skill of the user
• Change of keyboard hardware.
Applications:
• There are several home software and commercial software
products which claim to use keystroke dynamics to
authenticate a user :
 BioTracker -is a biometric authentication software that
uses continuous authentication to verify the identity of a
user.
 AdmitOneSecurity - formerly Bio Password is a patented
commercial system which uses keystroke dynamics.
 bioCheck- has a patented implementation which uses
keystroke dynamics for ubiquitous web-based login as well
as workstation authentication.
Further Research Available
• Researchers said that it will carry out more investigation on
the continuous authentication problem in our future work.
• From last few years researchers are also working on the
typing rhythm of an individuals.
• Working for the design of more robust authentication
systems.
Conclusions
•

It seems promising , still needs more efforts specially for
identification
 Iris scanners provide the lowest total error rate - on the
order of 10-6 in many cases
 Even fingerprints provide an less error rate.

• As security mechanism is not visible, un authorized users
cant have idea of security measure.
• It is quickly emerging, low cost, non intrusive alternative
• To traditional biometric technology.
References
• [1] IEEE Keystroke dynamics as a biometric for
authentication, Fabian Monrose, Aviel D. Rubin, March 1999.
• [2] IEEE, Keystroke-Dynamics Authentication Against
Synthetic Forgeries Deian Stefan
• [3] Zeljka Zorz [Online] Avaliable: http://www.netsecurity.org/article.php?id=1610
• [4] wikipedia[Online] Avaliable :
http://en.wikipedia.org/wiki/Keystroke_dynamics
Keystroke dynamics
Keystroke dynamics

Mais conteúdo relacionado

Mais procurados

Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationMayank Sachan
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 

Mais procurados (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Biometric
Biometric Biometric
Biometric
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 

Semelhante a Keystroke dynamics

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity managementMyAssignmenthelp.com
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 

Semelhante a Keystroke dynamics (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
User authentication
User authenticationUser authentication
User authentication
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Access Control
Access ControlAccess Control
Access Control
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 

Último

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Último (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Keystroke dynamics

  • 2. Contents • Introduction  Overview of Biometrics  Characteristics • Various approaches of research on keystroke dynamics  Techniques  Analysis • Advantages/Drawbacks of keystroke dynamics • Research Available • Conclusion
  • 4. What is Biometric Authentication? • An automatic method that identifies user or verifies the identity of living individuals. • Types of Biometric  Physiological (Physical )  Behavioural (Behavioural )
  • 5. Physiological characteristics • Biological/chemical based –  Finger prints  Iris, Retinal scanning  Hand shape geometry  blood vessel/vein pattern  Facial recognition  ear image  DNA
  • 6. Behavioral characteristics • A reflection of an individual’s psychology Hand written signatures Voice pattern Mouse movement dynamics Gait (way of walking) Keystroke dynamics
  • 7. Keystroke Dynamics • Keystroke dynamics, or typing dynamics, is the detailed timing information that describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard. • The recorded keystroke timing data is then processed through a unique neural algorithm, which determines a primary pattern for future comparison
  • 8. Keystroke Verification Techniques • Static verification (Fixed text mode)  Only based on password typing rhythm  Authentication only at login time • Dynamic verification (free text mode)  pattern regardless of the typed text  A continuous or periodic monitoring (On-the-fly user authentication)
  • 9. Some metrics for user verification • • • • • • • • • Typing speed Keystroke seek-time Flight time Characteristic sequences of keystrokes Examination of characteristic errors Frequency of error Method of error correction Pressure (Force of keystrokes) Duration of a specific keystroke.
  • 10. Keystroke analysis • Variety of methods Mean typing rate(wpm) Inter-interval comparison Digraph Trigraph
  • 12. Advantages : • Software Only method. (No Additional Hardware except a Keyboard) • Simple To Deploy and Use (username & passwords) – Universally accepted • Cost Effective • No End-User Training • It provides a simple natural way for increased computer security • Can be used over the internet
  • 13. Drawbacks: • User’s susceptibility to fatigue • Dynamic change in typing patterns • Injury, skill of the user • Change of keyboard hardware.
  • 14. Applications: • There are several home software and commercial software products which claim to use keystroke dynamics to authenticate a user :  BioTracker -is a biometric authentication software that uses continuous authentication to verify the identity of a user.  AdmitOneSecurity - formerly Bio Password is a patented commercial system which uses keystroke dynamics.  bioCheck- has a patented implementation which uses keystroke dynamics for ubiquitous web-based login as well as workstation authentication.
  • 15. Further Research Available • Researchers said that it will carry out more investigation on the continuous authentication problem in our future work. • From last few years researchers are also working on the typing rhythm of an individuals. • Working for the design of more robust authentication systems.
  • 16. Conclusions • It seems promising , still needs more efforts specially for identification  Iris scanners provide the lowest total error rate - on the order of 10-6 in many cases  Even fingerprints provide an less error rate. • As security mechanism is not visible, un authorized users cant have idea of security measure. • It is quickly emerging, low cost, non intrusive alternative • To traditional biometric technology.
  • 17. References • [1] IEEE Keystroke dynamics as a biometric for authentication, Fabian Monrose, Aviel D. Rubin, March 1999. • [2] IEEE, Keystroke-Dynamics Authentication Against Synthetic Forgeries Deian Stefan • [3] Zeljka Zorz [Online] Avaliable: http://www.netsecurity.org/article.php?id=1610 • [4] wikipedia[Online] Avaliable : http://en.wikipedia.org/wiki/Keystroke_dynamics