Identity Security in Biometric Systems based on Keystroking

Lucjan Hanzlik, Wojciech Wodo

2013

Abstract

The most valuable element of biometric security systems are the personal features of its users. Characteristics of individuals are unique and must be protected. We focus in this paper on methods of protection of user identity in systems based on keystroking. Our approach assumes giving minimal information to adversaries and the best responsiveness of the system regardless of user representation or possible usage. We consider keystroking not only in the context of keyboard, but also touch screen, pin pad and any other input device that could be used for typing. We present as results several complete security solutions that are applicable for software as well as hardware systems.

References

  1. Bergadano, F., Gunetti, D., and Picardi, C. (2002). User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367-397.
  2. Bergadano, F., Gunetti, D., and Picardi, C. (2003). Identity verification through dynamic keystroke analysis. Intell. Data Anal., 7(5):469-496.
  3. Klonowski, M., Syga, P., and Wodo, W. (2012). Some remarks on keystroke dynamics - global surveillance, retrieving information and simple countermeasures. In SECRYPT, pages 296-301.
  4. Monrose, F. and Rubin, A. D. (1997). Authentication via keystroke dynamics. In ACM Conference on Computer and Communications Security, pages 48-56.
  5. Sim, T. and Janakiraman, R. (2007). Are digraphs good for free-text keystroke dynamics? In CVPR.
  6. Song, D. X., Wagner, D., and Tian, X. (2001). Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th conference on USENIX Security Symposium - Volume 10, pages 25-25, Berkeley, CA, USA. USENIX Association.
  7. Stefan, D., Shu, X., and Yao, D. D. (2012). Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Computers & Security, 31(1):109- 121.
  8. Wodo, W. (2012). Kradziez tozsamosci i podszywanie sie pod innych uzytkownikow w systemach biometrycznych opartych o keystroking. In Interdyscyplinarnosc badan naukowych 2012, pages 461-466, Wroclaw, Poland. Oficyna Wydawnicza Politechniki Wroclawskiej.
  9. Zahid, S., Shahzad, M., Khayam, S. A., and Farooq, M. (2009). Keystroke-based user identification on smart phones. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 7809, pages 224-243, Berlin, Heidelberg. Springer-Verlag.
  10. Zhong, Y., Deng, Y., and Jain, A. K. (2012). Keystroke dynamics for user authentication. In CVPR Workshops, pages 117-123.
Download


Paper Citation


in Harvard Style

Hanzlik L. and Wodo W. (2013). Identity Security in Biometric Systems based on Keystroking . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 524-530. DOI: 10.5220/0004526405240530


in Bibtex Style

@conference{secrypt13,
author={Lucjan Hanzlik and Wojciech Wodo},
title={Identity Security in Biometric Systems based on Keystroking},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={524-530},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526405240530},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Identity Security in Biometric Systems based on Keystroking
SN - 978-989-8565-73-0
AU - Hanzlik L.
AU - Wodo W.
PY - 2013
SP - 524
EP - 530
DO - 10.5220/0004526405240530