Wei-guo SHEN, Wei WANG. Keystroke features recognition based on stable linear discriminant analysis[J]. Journal on Communications, 2017, 38(Z2): 26-29.
DOI:
Wei-guo SHEN, Wei WANG. Keystroke features recognition based on stable linear discriminant analysis[J]. Journal on Communications, 2017, 38(Z2): 26-29. DOI: 10.11959/j.issn.1000-436x.2017272.
Keystroke features recognition based on stable linear discriminant analysis
A novel keystroke features recognition method based on stable linear discriminant Analysis (SLDA) was put forward.First of all
it maximum the dispersion between different sequences
while minimizing the dispersion between the same sequence set
maintain the best discriminant characteristics of the keystroke sequences.Secondly
the local similarity graph between keystroke sequences is constructed
minimizing the dispersion of the local similarity sequences
to keep the local similarity of keystroke sequences.Finally
based on the principles above
the feature of keystroke sequences are extracted
and the nearest neighbor classification criterion is used to judge the outputs.The effectiveness of the proposed method is certified by experiment results.
关键词
Keywords
references
GAINES R , LISOWSKI W , PRESS S . Authentication by keystroke timing:some preliminary results [R ] . Rand Corporation:Rand Report R-2560-NSF , 1980 .
JOYCE R , GUPTA G . Identity authentication based on keystroke latencies [J ] . Commun ACM , 1990 , 33 ( 2 ): 168 - 176 .
ROBINSON J , LIANG V . Computer user verification login string keystroke dynamics [J ] . IEEE Trans Syst Man Cybern , 1998 , 28 ( 2 ): 236 - 241 .
LEGGETT J , WILLIAMS G , USNICK J . Dynamic identity verification via keystroke characteristics [J ] . International Journal of Man-machine Studies , 1991 ,( 35 ): 859 - 870 .
NAPIER R , LABERTY W , MAHAR W . Keyboard user verification:toward an accurate,efficient,andecologically valid algorithm [J ] . International Journal of Human Computer Studies , 1995 ( 43 ): 213 - 222 .
DUNN A . biometric authentication-real identities for a virtual world,MIDAS [R ] . Project Development Final Report , 2002 .
SALEH B , CHARLES S , BASSAM E . Computer-access security systems using keystroke dynamics [J ] . IEEE Transaction on Pattern Analysis and Machine Intelligence , 1990 , 12 ( 12 ): 1217 - 1222 .
GAO Y , GUAN X H , FENG L . The host-based intrusion detection based on real time keystroke sequences [J ] . Chinese Journal of Computers , 2004 , 27 ( 3 ): 396 - 401 .
MONROSE F , RUBIN A . Authentication via keystroke dynamics [C ] // Fourth ACM Conference on Computer and Communications Security , 1997 3.
SHI Y , CAO L M . User identity verification based on recognition of typing style [J ] . Computer Engineering , 2005 , 31 ( 6 ).
LIANG J , WANG X , CHEN W W . Recognition of user’s keystroke features based on difference subspace [J ] . Computer Engineering , 2007 , 33 ( 11 )
WANG Y J , ZHAO P H , WANG M M . Method of user identification based on keystroke behavior and its application [J ] . Computer Science , 2015 , 42 ( 11 ).
WANG Z H , WANG Z D , ZHI K M . User identity authentication based on mouse and keyboard behavioural biometrics combination [J ] . Computer Applications and Software , 2016 , 33 ( 7 ): 308 - 312 .
WANG X , CHEN W W , MA J F . User authentication algorithm with keystroke features based on genetic algorithms and grey relational analysis [J ] . Journal of Computer Applications , 2007 , 27 ( 5 ): 1054 - 1057 .