Table 4: Error rates (in %) if different devices are used for enrolment and verification.
enrolment Nexus S2 S3
verification
S2 S3 Nexus S3 Nexus S2
FAR FRR FAR FRR FAR FRR FAR FRR FAR FRR FAR FRR
treter 12.2 18.2 10.4 8.6 12.7 12.4 13.6 13.7 7.8 5.4 12.9 10.7
module 12.8 11.8 7.6 6.1 12.8 9.6 13.2 10.7 6.0 5.9 13.3 10.2
sommer
13.4 12.2 7.6 6.2 12.6 9.1 13.3 9.6 7.9 3.7 14.1 8.0
feature groups are more robust for using them on dif-
ferent devices than other. Mostly, it depends on the
used of sensor. To observe the impact of different
sensors, we first presented the experimental proce-
dure which we designed. Furthermore, we explained
which feature, classifier and the algorithm to compare
different devices we used for authentication. Based
on these, we presented the error rates for a single de-
vice. Especially, the comparison of the different fea-
ture groups showed how features depend on the dif-
ferent device. In addition, we showed how good the
proposed algorithm works if an enrolment is done on
one device and authenticate on another.
Overall, the proposed algorithm showed an im-
provement for the error rates. With an EER of smaller
than 10 % for several devices and keywords. It is im-
portant to select a widespread password and to choose
a device with sensors which are suitable for extract-
ing keystroke dynamics (in our study Nexus Galaxy
or S2).
However, further work is planned in designing a
keystroke authentication system that supports one en-
rolment for different devices. Furthermore, we plan
to analyse whether this framework can be adapted to
tablets. Moreover, we want to analyse how the length
of the password affects the error rates.
REFERENCES
Banerjee, S. and Woodard, D. (2012). Biometric authen-
tication and identification using keystroke dynamics:
A survey. Journal of Pattern Recognition Research,
7:116–139.
Buchoux, A. and Clarke, N. L. (2008). Deployment of
keystroke analysis on a smartphone. In Proceedings
of the 6th Australian Information Security & Manage-
ment Conference.
Campisi, P., Maiorana, E., and Neri, A. (2009). User
authentication using keystroke dynamics for cellular
phones. In IET Signal Processing, volume 3, Issue: 4,
pages 333–341.
Chora´s, M. and Mroczkowski, P. (2007). Keystroke dynam-
ics for biometrics identification. In Proceedings of the
8th international conference on Adaptive and Natural
Computing Algorithms, Part II, ICANNGA ’07, pages
424–431, Berlin, Heidelberg. Springer-Verlag.
Clarke, N. L. and Furnell, S. M. (2006). Authenticating
mobile phone users using keystroke analysis. In Int. J.
Inf. Secur, volume 6, pages 1–14, Berlin, Heidelberg.
Springer-Verlag.
Luca, A. d., Hang, A., Brudy, F., Lindner, C., and Huss-
mann, H. (2012). Touch me once and i know it’s you!:
implicit authentication based on touch screen patterns.
In CHI’12, pages 987–996.
Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choud-
hury, R. R. (2012). Tapprints: your finger taps have
fingerprints. In Proceedings of the 10th international
conference on Mobile systems, applications, and ser-
vices, MobiSys ’12, pages 323–336, New York, NY,
USA. ACM.
Obaidat, M. and Sadoun, B. (1997). Verification of com-
puter users using keystroke dynamics. Systems, Man,
and Cybernetics, Part B: Cybernetics, IEEE Transac-
tions on, 27(2):261–269.
O’Gorman, L. (2003). Comparing passwords, tokens, and
biometrics for user authentication. Proceedings of the
IEEE, 91(12):2019–2020.
Trojahn, M. and Ortmeier, F. (2012). Biometric authen-
tication through a virtual keyboard for smartphones.
International Journal of Computer Science & Infor-
mation Technology (IJCSIT).
Trojahn, M. and Ortmeier, F. (2013). Toward mobile
authentication with keystroke dynamics on mobile
phones. 7th International Symposium on Security and
Multimodality in Pervasive Environment (SMPE).
Twentyman, J. (2009). Lost smartphones pose significant
corporate risk. http://www.scmagazineuk.com/lost-
smartphones-pose-significant-corporate-
risk/article/126759/. [Online; accessed 01-March-
2013].
Vielhauer, C. (2006). Biometric User Authentication for IT
Security: From Fundamentals to Handwriting. Ad-
vances in information security. Springer-Verlag.
KeystrokeAuthenticationwithaCapacitiveDisplayusingDifferentMobileDevices
585