This Article 
 Bibliographic References 
 Add to: 
Computer-Access Security Systems Using Keystroke Dynamics
December 1990 (vol. 12 no. 12)
pp. 1217-1222

An approach to securing access to computer systems is described. By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Two types of passwords were considered: phrases and individual names. A fixed phrase was used in the identification system. Individual names were used as a password in the verification system and in the overall recognition system. All three systems were tested and evaluated. The identification system used 10 volunteers and gave an indecision error of 1.2%. The verification system used 26 volunteers and gave an error of 8.1% in rejecting valid users and an error of 2.8% in accepting invalid users. The overall recognition system used 32 volunteers and gave an error of 3.1% in rejecting valid users and an error of 0.5% in accepting invalid users.

[1] N. M. Herbst and C. N. Liu, "Automatic signature verification based on accelerometry,"IBM J. Res. Develop., pp. 245-253, May 1977.
[2] R. W. Bailey,Human Performance Engineering. Englewood Cliffs, NJ: Prentice-Hall, 1982.
[3] C. Hicks,Fundamental Concepts in the Design of Experiments. New York: CBS College, 1982.
[4] J. T. Tou and R. C. Gonzalez,Pattern Recognition Principles. Reading, MA: Addison-Wesley, 1981.
[5] D. O'Shaughnessy, "Speaker recognition,"IEEE ASSP Mag., vol. 3, no. 4, pp. 4-17, Oct. 1986.
[6] L. R. Rabiner and R. W. Schafer,Digital Processing of Speech Signals. Englewood Cliffs, NJ: Prentice-Hall, 1978.
[7] T. Terzopoulos, "Co-occurrence analysis of speech waveforms,"IEEE Trans. Acoust., Speech, Signal Processing, vol. ASSP-33, no. 1, pp. 5-30, Feb. 1985.
[8] J. T. Tou, D. Lu, and J. McCarthy, "Automatic detection of document falsification," inProc. IEEE Conf. Image Processing and Pattern Recognition, Las Vegas, NV, 1982.
[9] D. Hoaglin, F. Mosteller, and J. Tukey,Understanding Robust and Exploratory Data Analysis. New York: Wiley, 1983.
[10] R. Duda and P. Hart,Pattern Classification and Scene Analysis. New York: Wiley, 1973.
[11] K. Zimmermann and J. Werner, "SIRSYS-A program facility for handwriting signature analysis," inCarnahan Conf. Proc., Lexington, KY, May 1978, pp. 153-155.
[12] G. Bills and K. Zimmermann, "Spectral analysis of right-handed versus left handed on-line script," inProc. IEEE Conf. Frontiers of Engineering and Computing on Health Care, Chicago, IL, Sept. 1985.
[13] M. Eden, "Handwriting and pattern recognition,"IRE Trans. Inform. Theory, vol. IT-8, 1962.
[14] J. S. Lew, "Optimal accelerometer layouts for data recovery in signature verification,"IBM J. Res. Develop., vol. 24, no. 4, pp. 496-511, July 1980.
[15] C. Liu, N. Herbst, and J. Anthony, "Automatic signature verification: system description and field test results,"IEEE Trans. Syst., Man, Cybern., vol. SMC-9, no. 1, Jan. 1979.
[16] J. Verdenbregt and W. Koster, "Analysis and synthesis of Handwriting,"Philips Tech. Rev., vol. 32, no. 3/4, pp. 73-78, 1971.
[17] K. Han, R. McLaren, and G. Lodwick, "The application of an image-compression/feature transgeneration technique to the computer-aided diagnosis of brain tumors,"IEEE Trans. Syst., Man, Cybern., vol. SMC-3, no. 4, pp. 410-415, July 1973.
[18] R. McLaren, G. Lodwick, and K. Han, "A technique for feature transgeneration applied to the automated diagnosis of medical data," inBiomedical Symp. Conf. Proc., San Diego, CA, 1972.
[19] S. Bleha, "Recognition systems based on keystroke dynamics," Ph.D. dissertation, Univ. Missouri--Columbia, May 1988.
[20] H. Almuallim and S. Yamaguchi, "A method of recognition of Arabic cursive handwriting,"IEEE Trans. Patt. Anal. Machine Intell., vol. PAMI-9, no. 5, Sept. 1987.
[21] H. S. Baird, "Feature identification for hybrid structural/statistical pattern classification," inComputer Vision and Pattern Recognition Conf. Proc., Miami Beach, FL, June 22-26, 1986.
[22] F. Lamarche and R. Plamondon, "Segmentation and feature extraction of handwritten signature patterns," inProc. Seventh Int. Conf. Pattern Recognition, Montreal, P.Q., Canada, July 30-Aug. 2, 1984.
[23] C. Tappert, "Adaptive on-line handwriting recognition," inProc. Seventh Int. Conf. Pattern Recognition, Montreal, P.Q., Canada, July 30- Aug. 2, 1984.
[24] G. Lorette, "On-line handwritten signature recognition based on data analysis and clustering," inProc. Seventh Int. Conf. Pattern Recognition, Montreal, P.Q., Canada, July 30-Aug. 2, 1984.
[25] B. Hussien, R. McLaren, and S. Bleha, "An application of fuzzy algorithms in a computer access security system,"Pattern Recog. Lett., vol. 9, no. 1, pp. 39-43, Jan. 1989.

Index Terms:
computer access security systems; keystroke dynamics; real-time; password; online recognition systems; identification system; verification system; computerised pattern recognition; real-time systems; security of data
S. Bleha, C. Slivinsky, B. Hussien, "Computer-Access Security Systems Using Keystroke Dynamics," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, no. 12, pp. 1217-1222, Dec. 1990, doi:10.1109/34.62613
Usage of this product signifies your acceptance of the Terms of Use.