Campus Units

Electrical and Computer Engineering, Industrial and Manufacturing Systems Engineering, Virtual Reality Applications Center, Human Computer Interaction, Education, School of

Document Type

Article

Publication Version

Submitted Manuscript

Publication Date

6-2013

Journal or Book Title

IT Professional

Volume

15

Issue

4

First Page

24

Last Page

28

DOI

10.1109/MITP.2013.52

Abstract

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of a special issue on security.

Comments

This is a manuscript of an article published as Chang, J. Morris, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, and Sun-Yuan Kung. "Capturing cognitive fingerprints from keystroke dynamics." IT Professional 15, no. 4 (2013): 24-28. DOI:10.1109/MITP.2013.52. Posted with permission.

Rights

Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”

Copyright Owner

IEEE

Language

en

File Format

application/pdf

Published Version

Share

COinS