Literature DB >> 35061684

Distinguishability of keystroke dynamic template.

Napa Sae-Bae1, Nasir Memon2.   

Abstract

When keystroke dynamics are used for authentication, users tend to get different levels of security due to differences in the quality of their templates. This paper addresses this issue by proposing a metric to quantify the quality of keystroke dynamic templates. That is, in behavioral biometric verification, the user's templates are generally constructed using multiple enrolled samples to capture intra-user variation. This variation is then used to normalize the distance between a set of enrolled samples and a test sample. Then a normalized distance is compared against a predefined threshold value to derive a verification decision. As a result, the coverage area for accepted samples in the original space of vector representation is discrete. Therefore, users with the higher intra-user variation suffer higher false acceptance rates (FAR). This paper proposes a metric that can be used to reflect the verification performance of individual keystroke dynamic templates in terms of FAR. Specifically, the metric is derived from statistical information of user-specific feature variations, and it has a non-decreasing property when a new feature is added to a template. The experiments are performed based on two public keystroke dynamic datasets comprising of two main types of keystroke dynamics: constrained-text and free-text, namely the CMU keystroke dynamics dataset and the Web-Based Benchmark for keystroke dynamics dataset. Experimental results based on multiple classifiers demonstrate that the proposed metric can be a good indicator of the template's false acceptance rate. Thus, it can be used to enhance the security of the user authentication system based on keystroke dynamics.

Entities:  

Mesh:

Year:  2022        PMID: 35061684      PMCID: PMC8782503          DOI: 10.1371/journal.pone.0261291

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


1 Introduction

Text passwords have long been used as an authentication factor in computer systems. As a password can be guessed or observed, the system cannot ensure that the one who types the correct password is indeed the authorized user or simply an attacker who might have obtained the password by means of guessing [1], shoulder surfing [2], or by the other side-channel information [3-5], etc. One solution to enhance the security of password-based authentication mechanisms is to use two-factor authentication systems (2FA). Here the first factor is the password itself which is based on knowledge (what you know) factor, the second factor can be either a possession factor (what you have) or a biometric factor (what you are). It has been argued that a possession factor (or token) could cause security issues as it can be lost or stolen. In addition, its usability is limited as tokens need to be carried around. Therefore, the use of keystroke dynamic as a second authentication factor has been proposed to improve security without posting any extra burden on the users as it can be extracted while the password is being entered [6-9]. As a result, there has been a lot of work attempting to improve the verification performance of keystroke dynamic classifiers. However, keystroke dynamics recognition or verification performance is highly user-dependent since it is a behavioral biometric [10]. Therefore, another research direction to improve verification performance of a keystroke dynamic classifier is to predict the quality of the keystroke dynamic template in order to detect and to disqualify or remove those low quality templates from the system, as their existence has been reported in a number of previous behavioral biometric work [11, 12]. Regarding this, [13] have proposed a method to classify the quality of keystroke dynamic templates based on their verification performance. However, this metric is not designed to indicate the causes of verification inaccuracy. That is, verification errors can be classified into two types: false acceptance and false rejection. The first one is when genuine samples are falsely rejected by the system (the ratio between the number of falsely rejected genuine samples and the total number of genuine samples is called false rejection rate or FRR). The second one occurs when imposter samples are falsely accepted by the system (the ratio between the number of falsely accepted imposter samples and the total number of imposter samples is called false acceptance rate or FAR). These two types of errors cause different issues to the user. That is, the templates with high rates of FRR would cause a usability issue as the user would be rejected more often, while the templates with high rates of FAR would make the user particularly vulnerable to impersonation. As such, strategies to deal with templates with high FAR and FRR are different [14, 15]. Therefore, it is important to identify whether the problem of each low-quality template stems from a high FRR or a high FAR (or both). This work specifically focuses on the quality index that could infer FAR of the template. That is, a method to assess the quality of keystroke dynamic templates in terms of FAR is proposed. Experiments are performed on two public datasets: the CMU keystroke dynamics dataset and the Web-Based Benchmark, comprising of two types of keystroke dynamic templates: free-text and constrain-text to demonstrate the effectiveness of the proposed method. The rest of the paper is organized as follows. Section 3, provides background on keystroke dynamic verification algorithms used in this paper. Then, in Section 4, the proposed metric for assessing keystroke dynamic template distinctiveness is described. Next, details of the two datasets, experimental procedure, and the evaluation results, are presented in Section 5. Lastly, conclusions and possibilities for future work are discussed in Section 6.

2 Related work

As the number of approaches for user authentication has been proposed as an alternative to password, Bonneau et al. [16] has proposed a framework to compare and contrast those authentication schemes based on three main factors: usability, deployability, and security. In addition, the study revealed that, while traditional biometric-based authentication schemes (fingerprint, iris, voice) have some advantages over password based authentication in terms of usability (memorability, scalable-for-user, and physically-effortless) and security (physical observation and throttled-guessing), its deployability is the main setback for the schemes as it is not server and browser compatible. As such, the current use is limited to on-device authentication such as unlocking the phone or authorizing device access to use services. Consequently, the password still plays an important role for general-purpose user authentication mechanisms. On the other hand, many proposals to resolve these issues of the original password authentication scheme have been proposed. For example, password managers that require the users to log in with their master password can be used to resolve usability in terms of memorability, scalable-for-user, physically-effortless, physical observation and but fail to resolve security in terms of physical observation and throttled-guessing. In this case, behavioral biometric gleaned from keystroke information can be used to provide resilience to physical observation and throttled-Guessing. In addition, Qiu et al. [17] has proposed a secure three-factor authentication protocol where all three types of authentication factors are provided by a user. Moreover, Jiang et al. [18] has proposed another secure three-factor remote authentication protocol to preserve the privacy of biometric information. These proposals allow behavioral biometric gleaned from keystroke information to be used in remote setting thereby enhancing deployability of password-based two factor authentication (password string and typing pattern). As such, the mechanism can also be used for user-IoT devices authentication where data and services on these devices are becoming more sensitive and the need for secure authentication mechanism is increasing [19, 20].

3 Keystroke dynamic algorithm

Generally, a biometric verification system comprises of two stages: the enrollment stage where a set of biometric samples used to derive a template to later verify a user is collected, and the verification stage where a user claims an identity by providing an input biometric at the time of authentication. The system would then accept or reject the claim according to the classifier output. Details on the feature extraction methods and the classifiers used in the keystroke dynamic authentication system are described below.

3.1 Keystroke timing features

N-gram latency features derived from keystroke timing sequences are widely used as a feature set in keystroke dynamic recognition applications. This feature set can be applied to keystroke captured from both keyboards and touch displays (soft-keyboards) [21, 22]. Specifically, the set of n-gram features deployed in this paper was the one used in [8]. The set comprises of three types of features: an interval time (time between key-down), flight time (time between key-up and next key-down), and hold time (time between key-down and key-up) for all keys in the phrase. That is, let be a keystroke dynamic sample where n is the number of typing characters, and are the timestamp of the i keystrokes, respectively. The three types of features can be formulated as follows. Interval time: Flight time: Hold time:

3.2 Classifier

Once features are computed for each sample, the user template is derived from feature sets of all enrolled samples. The system then accepts the identity claimed by the user if a distance score between the enrolled samples and the input sample is less than a pre-defined threshold. The three distance functions employed in this paper are Manhattan, Euclidean, and Mahalanobis distance. Note that, as the experiment performed in this work was comprised of two datasets with fixed and varied keystroke lengths, all the keystroke feature vectors are normalized by their respective lengths before computing the distance. Details of each distance function and its template construction are as follows.

3.2.1 Manhattan distance

The template for this classifier consists of the mean and standard deviation of each feature derived from enrolled samples. That is, let F = f be a feature set representing a keystroke dynamic sample. Then, the template could be defined as , where is the mean of feature f of the enrolled samples and is the standard deviation of feature f of the enrolled samples. Then the distance between template and a keystroke dynamic sample can be computed as: where and N is the total number of features derived from a sample F (N = |F|).

3.2.2 Euclidean distance

The template for this classifier is the same as the previous one where the distance between the template and a keystroke dynamic sample can be derived as:

3.2.3 Mahalanobis distance

The template for this classifier is constructed by simply concatenating feature vectors of all enrolled keystroke dynamic samples. Then the distance between the template and a keystroke dynamic sample can be derived as: where S is the covariance matrix of the user template (or concatenation of enrolled samples features), X is the feature vector of a test sample, and μ is the mean feature vector derived from the template. Unlike the previous two, Mahalanobis distance takes into consideration the correlation between features which is more suitable when features are not independent.

3.3 Verification performance evaluation

Once the distance between the template and the input sample is computed, the system decides whether to accept or reject the sample. If the score is lower than the pre-defined threshold, the sample is accepted, and it is rejected otherwise. Generally, FAR (False Acceptance Rate), FAR (False Rejection Rate), and EER (Equal Error Rate) are three metrics used to evaluate the performance of the verification system. Specifically, given a pre-defined threshold, FAR is the rate at which the system incorrectly accepts imposter samples (samples from imposter users) and FRR is the rate at which the system incorrectly rejects genuine samples (samples from genuine and honest users). EER is the rate at which FAR and FRR are equal (at the corresponding threshold). Note that for the dataset that the number of genuine and forgery samples for each user is not equal, these rates is computed per user and the average FAR, FRR, and EER are reported.

4 Distinctiveness of keystroke dynamic template

As can be observed from Fig 1, the verification performance of keystroke dynamic templates in terms of the FAR show a great variation. That is, a small number of templates contribute to a large portion of the error rate in terms of FAR. In this section, a method to derive the quality of keystroke dynamic templates in terms of FAR will be described.
Fig 1

A false acceptance rate of a keystroke template of each user at EER threshold according to Manhattan classifier described in [8].

Typically, the distance between templates and a test sample is normalized by template feature variations [8]. As a result, feature space decreases as feature variation increases. Consequently, the template with higher feature variation would result in the higher false acceptance rate. Therefore, the inverse of feature statistical dispersion is one measure that can be used to quantify this characteristic. That is, feature distinctiveness derived f from each feature x is formulated as: where each feature variance is defined as: In general, keystroke dynamic templates are represented by a set of features. Thus, statistical dispersion for template distinctiveness could be formulated from a multivariate distribution. Two approaches to measure statistical dispersion of multivariate distribution or total variability are total dispersion and generalized variance [23]. These two statistical dispersion measurement approaches are defined as follows. The total dispersion or total variation is defined as the sum of all feature variances as follows: The generalized variance is defined as the determinant of the covariance metric or the product of all the eigenvalues λ of a feature covariance matrix as follows: Nevertheless, neither of the inverse forms of these two dispersion measures satisfy a monotonic property of template distinctiveness which is one important property for the proposed quality measurement to be applied on the variable-length keystroke dynamic template. That is, when another feature is added, the discrimination power of the template should not decrease. However, the inverse of total variation increases whereas, the generalized variance may decrease or increase depending on the variance of an adding feature and the correlation between an adding feature and the features currently in the set. One way to formulate the non-decreasing function of a template distinctiveness score is to compute the inverse of feature variation individually as a feature distinctiveness. Then, the sum of these feature distinctiveness is taken as a template distinctiveness score. That is, the distinctiveness D for each template can be derived from the sum of the inverse of feature variance as follows: Using the proposed metric, the template with lower intra-user variation between enrolled samples (lower σ) would have higher distinctiveness as the coverage area for accepted samples in the original space of vector representation would be smaller. In addition, the keystroke template with an additional typing character would always have a higher distinctiveness. This is an important property as the distinctiveness should never decrease when additional sequences are appended to the keystroke. The effectiveness of the proposed distinctiveness score in indicating FAR will be evaluated in the following section.

5 Experimental result

In this section, the experimental procedures used and the results obtained are presented. Details are described below.

5.1 Dataset

In this paper, we used two public keystroke datasets to validate the performance of the proposed template quality score. One was the CMU Keystroke Dynamics—Benchmark Data Set (available at https://www.cs.cmu.edu/~keystroke/), and the other was the Web-Based Benchmark for Keystroke Dynamics (available at https://www.researchgate.net/publication/259497002_Web_based_keystroke_dynamics_dataset). Details of these two datasets are the following. The CMU keystroke dynamics dataset comprised of samples from 51 subjects. Each subject provided 400 samples from 8 sessions (50 samples per session). All samples were collected from the same typing phrase “.tie5Roanl”. Note that the EER in [8] were computed per user basis and the reported performance were the average one. In addition, the imposter samples were from the first five samples of all other users instead of all 400 samples. The Web-Based Benchmark for keystroke dynamics dataset [24] comprised of samples from 118 subjects. Each subject provided both free-text and fixed-text keystroke samples. That is, free-text keystroke was where users created their own username and password phrases, and constraint or fixed-text keystroke was where username and password phrases were provided (the username was ‘laboratoire greyc’ and the password was ‘S2SAME’). All users provided samples through browsers using their own devices. In constraint or fixed-text keystroke data, the number of sessions provided by each user ranged from 1 to 47 with an average of 9.7542. In free-text keystroke data, the number of sessions provided by each user ranged from 0 to 47 with an average of 9.2034. In each session, users provided different numbers of samples. Note that not all the samples from all users were used in the experiment. First, the samples that were not typed correctly were removed. Then the samples from users that did not provide enough valid sessions were removed. Also, in order to alleviate the performance bias issue due to an imbalance number of samples from each user, the performance reported in this section was computed from the average performance of all the users (the performance numbe was computed for each user individually before computing the average).

5.2 Protocol

For each user, genuine samples were divided into two parts: the first N samples were used as training samples to derive a user-specific template as well as the respective distinctiveness score and the rest were used as genuine test samples to evaluate the FRR of the system for that particular user. Then the FAR and FRR of the system were computed from the average FARs and FRRs from all the users. This was to prevent the user with a larger pool of (genuine and imposter) samples from having greater impact on system performance. For the CMU dataset, training samples comprised of samples from the first four sessions (200 samples per user). Note that, in the CMU dataset, all users provided 400 genuine samples equally whereas in the Web-based Benchmark dataset the number of samples provided varies from user to user. Therefore, we limited the use of this dataset only for the user with at least four valid sessions (a valid session was a session with at least five valid samples or the samples that their keystroke were identical to the registered one) Then, all samples from that four valid sessions were used as training samples, and the rest were used as test samples. With these datasets and constraints, the performance results for three distance functions described in the previous section were at 16.00-17.16% EER for the CMU Keystroke Dynamics dataset and 13.28-25.16% average EER and for the Web-Based Benchmark Keystroke Dynamics dataset, respectively.

5.3 Result

In this subsection, the effectiveness of distinctiveness scores of keystroke dynamic templates are illustrated. First, the scores for all user templates were computed. Then, the templates were divided into three groups according to their distinctiveness scores. Specifically, the templates were divided into three groups according to the scores as follows, ’GOOD’ group comprised of the templates with the highest 25th percentiles. ’BAD’ group comprised of the templates with the lowest 25th percentiles. ’MID’ group comprised of the rest templates. Note that, computational overhead for deriving distinctiveness score is O(n) where n is the number of features used to compute the metric (or the number of input characters). It took 0.127 milliseconds on average to compute the distinctiveness from a set of keystroke samples for each template with 10 characters (or 0.0127 milliseconds per character) using Matlab R2019b running on Windows 10 with AMD Ryzen 7 3800x. For the CMU dataset, imposter score distributions for the three groups of templates are plotted in Fig 2. A one-tailed two-sample t-test with unequal variance shows that, the mean of imposter scores of high distinctiveness templates is statistically higher than that of low distinctiveness ones, p = (<0.001).
Fig 2

Imposter score distributions of three template groups according to their distinctiveness derived from the Manhattan distance classifier.

The characteristic difference in terms of FAR—decision threshold trade-off, the Spearman rank coefficient, and verification performance between each template group are demonstrated in the following.

5.3.1 False acceptance rate

In order to verify the effectiveness of the proposed distinctiveness scores across different types of classifier, the curves between FAR and verification threshold derived from three classifiers: Manhattan, Euclidean, and Mahalanobis distance are plotted when possible. Using these imposter scores to derive false acceptance rate for these two groups of templates across the range of verification threshold, the result in Fig 3–7 demonstrates that the FAR of high distinctiveness templates is always lower than that of low distinctiveness ones. That is, at a fixed given threshold value, the templates with low distinctiveness is more likely to accept imposter samples than the ones with high distinctiveness. The similar separation between FAR of the three groups of templates trends are observed.
Fig 3

The CMU keystroke’s performance trade-off curves between false acceptance rate and the threshold value for each template group based on three classifiers: (a) the Manhattan distance, (b) the Euclidean distance, and (c) the Mahalanobis distance.

Fig 7

The Web-Based Benchmark (free-text password field) performance trade-off curves between false acceptance rate and the threshold value for each template group based on two classifiers: (a)the Manhattan distance and (b) the Euclidean distance.

Note that, for constraint keystroke in the Web-Based Benchmark for keystroke dynamics dataset, the number of training sample from the username field were not enough for constructing the Mahalanobis distance classifier. Similarly, for free-text keystroke, some users did not have enough training samples for constructing the Mahalanobis distance classifier. Therefore, only the experiments for the Manhattan and Euclidean distance were conducted in those settings.

5.3.2 Spearman rank correlation

The coefficients of the Spearman rank correlation between the proposed distinctiveness score and the FAR of the manhattan classifier system at the EER threshold derived from the CMU dataset is presented in Table 1 along with the performance result from classifiers employed in this study. The coefficient of -0.63 (p < 0.001) indicated the strong (negative) relationship between the rank of distinctiveness score and the verification performance of the templates in terms of FAR. That is, the higher the distinctiveness score implies the lower rank of FAR. Lastly, the stronger correlation found at the Euclidean and Mahalanobis distance classifiers confirmed that the proposed score can be indicative of FAR of keystroke dynamic templates on several classifiers. Similarly, the coefficient of the Spearman rank correlation between the proposed distinctiveness score and the FAR of the Manhattan classifier system at the EER threshold derived from the Web-Based Benchmark dataset is presented in Table 2.
Table 1

The Spearman rank correlation (ρ) between the proposed distinctiveness score and the FAR along with the EER(%) of the system for the CMU dataset.

Classifier ρ p-valueEER
Manhattan-0.635.71e-0716.00
Euclidean-0.723.22e-0916.73
Mahalanobis-0.81017.16
Table 2

The Spearman rank correlation (ρ) between the proposed distinctiveness score and the FAR along with the EER(%) of the system for the Web-based keystroke dataset.

FieldClassifier ρ p-valueEER
Constrain text
Username ‘laboratoire greyc’Manhattan-0.77013.28
Euclidean-0.83016.86
Password ’S2SAME’Manhattan-0.621.65e-0624.40
Euclidean-0.702.42e-0824.93
Mahalanobis-0.662.53e-0725.16
Free-text
UsernameManhattan-0.681.84e-0818.19
Euclidean-0.706.21e-0917.94
PasswordManhattan-0.671.15e-0416.99
Euclidean-0.671.44e-0418.91

5.3.3 Verification performance

As demonstrated in Figs 3–7, the templates with higher distinctiveness result in lower FAR but similar FRR when compared to the template with lower distinctiveness. This inferred that the ROC curve of templates with higher distinctiveness would be better than the one with lower distinctiveness. The FAR and FRR of these three groups of templates from the CMU dataset are presented at Table 3.
Table 3

FAR and FRR of each template group from the CMU dataset at various threshold settings.

ClassifierGroupThresholding
EER5% FRR10% FRR
FARFRRFARFRRFARFRR
ManhattanAll16.01%15.99%35.72%5.00%23.55%10.00%
GOOD3.88%12.44%13.72%4.53%6.98%7.94%
MID19.42%19.00%41.86%5.97%28.05%12.24%
BAD24.74%16.53%51.57%4.50%35.61%9.82%
EuclideanAll16.73%16.74%46.85%5.00%28.77%10.00%
GOOD3.80%15.12%20.80%5.21%9.03%9.53%
MID18.52%19.32%51.23%5.35%31.64%11.12%
BAD27.88%15.76%68.52%4.44%45.64%9.35%
MahalanobisAll17.16%17.16%47.65%5.00%29.77%10.00%
GOOD3.52%15.24%20.58%5.59%8.69%9.50%
MID16.41%20.12%49.48%5.26%29.39%11.18%
BAD31.56%16.12%72.90%4.15%51.21%9.32%
Similarly, the results from the Web-Based Benchmark dataset are presented at Table 4. Note that, the 10% FRR and 5% FRR threshold is derived at the average FRR of all users. That is the threshold is defined where the average FRR is at 10% FRR and 5%, respectively. The results clearly show that the FAR performance of the GOOD user group is much lower than the MID and BAD group in all three thresholds although this verification performance is still impractical for many applications.
Table 4

FAR and FRR of each template group from the Web-Based Benchmark dataset at various threshold settings.

ClassifierGroupEER5% FRR10% FRR
FARFRRFARFRRFARFRR
Constraint text–Username (’laboratoire greyc’)
ManhattanAll13.11%13.34%45.03%5.00%20.97%10.04%
Good2.34%21.70%13.65%7.53%4.13%15.94%
Mid12.31%11.31%46.75%4.34%20.14%8.70%
Bad25.42%8.04%73.05%3.50%39.41%6.13%
EuclideanAll16.63%16.87%72.20%5.02%40.20%10.07%
Good2.78%23.19%40.48%6.50%10.85%13.52%
Mid14.17%15.71%77.94%4.95%39.34%9.69%
Bad35.27%12.12%92.79%3.49%71.21%6.94%
Constraint text–Password (’S2SAME’)
ManhattanAll24.21%24.01%67.98%5.00%50.42%9.82%
Good12.36%35.50%46.54%8.16%31.17%17.85%
Mid22.28%21.45%68.53%4.61%49.15%7.88%
Bad40.08%15.21%88.28%1.80%72.30%4.03%
EuclideanAll24.80%24.49%72.57%4.97%55.03%9.82%
Good11.69%36.47%49.96%7.31%32.87%16.73%
Mid22.57%21.85%74.60%4.50%53.91%8.04%
Bad42.56%15.24%90.94%3.04%79.51%5.09%
MahalanobisAll24.93%24.99%68.37%4.97%52.20%9.95%
Good12.11%35.20%49.99%6.04%32.81%12.92%
Mid23.11%22.41%70.01%4.88%52.48%9.67%
Bad41.53%17.92%83.35%3.79%71.00%6.73%
Free-text –Username
ManhattanAll17.86%18.04%43.27%4.98%26.88%9.89%
Good5.61%23.92%16.13%5.16%7.91%11.92%
Mid15.14%16.77%42.39%4.53%24.68%8.86%
Bad35.96%14.21%72.31%5.89%50.57%10.00%
EuclideanAll17.58%17.80%49.34%4.96%28.67%9.90%
Good4.07%23.77%19.15%4.84%7.31%12.10%
Mid14.77%16.46%49.68%4.77%26.19%9.19%
Bad37.16%14.03%78.81%5.56%55.38%9.02%
Free-text –Password)
ManhattanAll16.32%17.87%51.32%5.45%27.66%10.24%
Good4.32%18.51%27.15%4.13%11.91%9.12%
Mid14.34%18.02%51.81%6.20%27.26%11.43%
Bad39.46%16.11%83.59%4.73%51.03%7.43%
EuclideanAll18.25%19.81%59.09%5.15%37.98%10.18%
Good4.69%21.34%39.32%3.97%18.46%8.03%
Mid17.19%19.55%59.44%5.46%36.12%11.07%
Bad40.59%18.18%85.67%5.98%71.28%10.43%
Lastly, keystrokes of free-text username and password from the Web-Based Benchmark dataset could be combined in order to improve the verification rate. To do so, the valid pairs of correct free-text usernames and passwords must be the ones that both usernames and passwords are correctly captured (its keystroke must be identical to the registered one). Then, only the users who had at least four valid sessions—password sessions with at least five samples per session—were included in this experiment. With this, the total number of users reduced from 118 to 23 with 2,386 genuine pairs out of the total 9,544 genuine pairs and 2,169 imposter pairs. The verification performance of these username and password combinations is reported in Fig 8. It demonstrates the strong recognition performance for the GOOD users achieving 3.28% FAR at 10% FRR threshold and it is 21 folds lower than those BAD users. Note that, verification performance results in terms of EER for all users are in line with the ones reported in [24].
Fig 8

Verification performance of free-text username and password combination for each group in terms of FAR and FRR.

Experiments were performed on the Web-based Benchmark dataset based on: (a) Manhattan distance and (b) Euclidean distance.

Verification performance of free-text username and password combination for each group in terms of FAR and FRR.

Experiments were performed on the Web-based Benchmark dataset based on: (a) Manhattan distance and (b) Euclidean distance. These results highlight the potential of the proposed distinctiveness metric to be used for constructing a template selection mechanism to enhance the verification performance of the system. That is, keystroke dynamic can be used as an optional secondary authentication factor—it can be ignored or used at choice (of the system) for each user depending on his or her template distinctiveness. Then the system can achieve a strong verification performance at about 5-7% average HTER for GOOD templates compared to 17% HTER for all templates. That is, once template quality can be quantified, it enhances the possibilities for behavioral biometric to be used for validating the identity of the user when adequate template quality is met. As a result, higher security could be provided to those users.

5.3.4 Performance comparison to existing approaches

In this subsection, the efficacy of the proposed quality metric for keystroke dynamic templates when compared to existing keystroke dynamic approaches is demonstrated. In addition, the security of keystroke dynamic in comparison to other authentication factors is evaluated. The performance result of the algorithm used in this paper is reported in Table 5 along with that of existing work. Note that, we have followed the protocol described in [8] to evaluate the overall performance of the algorithm used in this work when compared to existing approaches. That is, the threshold is set individually for each subject and the imposter samples for each subject were from the first five samples of all other subjects. While the reported performance using this protocol can be viewed as the upper bound performance of each algorithm, one challenging issue to be solved when the system is to be used in practical applications is how to set a threshold for each subject to achieve that level of performance. Nevertheless, this result demonstrates that the verification algorithm used in this work is comparable to other existing work when the same dataset and validation protocol is used. In addition, it confirms that the proposed metric can be used to measure quality of the keystroke dynamic template regardless of whether local or global thresholding approaches are used.
Table 5

Verification performance comparison of existing keystroke dynamic approaches.

Ref.DatasetNumber of usersKeystroke lengthAlgorithmEER (%)
[25]SUNY7510CNN plus RNN9.75
[26]CMU5110Dependence Clustering7.70
[27]CMU5110Nearest Neighborg8.40
[8]CMU5110Manhattan (scaled with average absolute deviation)9.60
This workCMU5110Manhattan (scaled with standard deviation)9.16
• Good users4.50
• Mid users10.27
• bad users12.70
Lastly, entropy is another important metric to assess the security level of the system. In Table 6, the entropy measures of different authentication factors are reported. With this information, password-based two-factor authentication is estimated at 23.48-26.48 bits. Note that, the biometric entropy reported in this table is the relative entropy computed from KL divergence between genuine and imposter score distributions [28]. While the entropy of the keystroke dynamic is lower than that of the iris and fingerprint, it offers additional security at no user and hardware cost. That is, users are not required to perform additional tasks and user devices are required to equip with additional hardware.
Table 6

Entropy measures of different authentication factors.

Ref.Authentication factorDataset descriptionEntropy (bits)
[29]4-digits PINDodonew, CSDN, Rockyou, Yahoo (total 3.4 M)8.41
[29]6-digits PINDodonew, CSDN, Rockyou, Yahoo (total 6.4 M)13.21
[30]Password14 datasets (total 113.3 M)20-23
[28]IrisICE (High quality set—374 iris, 10 samples each)8.9-108.9-10 bits
[31]Finger VeinVERA (220 fingers, 2 samples each)4.2—13.2
UTFVP (360 fingers, 4 images each)18.9-19.5
This workKeystrokeCMU (51 typists, 400 samples each)3.48
• Good user4.62 bits

6 Conclusion and future work

In this paper, we proposed a method to derive a quality score of keystroke dynamic templates in terms of distinctiveness. The effectiveness of this proposed score is demonstrated by dividing the keystroke dynamic templates into three equal-size groups according to their distinctiveness scores: the low quality, the middle quality, and the high quality ones. Using the scores computed from the sum of inverse feature variance, the difference between the trade-off curve between the threshold value and corresponding FAR of these two groups of users is also clearly observed. That is, at a range of an operational threshold, the FAR of the templates with higher distinctiveness is lower than that of the lower distinctiveness ones. The same observation that holds for all three classifiers implies that the proposed distinctiveness score can be used to indicate FAR of the templates across various types of classifiers. One area of future work is to develop a mechanism to cope with low distinctiveness templates in order to enhance verification performance and reliability of keystroke dynamic verification system. For example, the quality of low distinctiveness templates may be improved intelligently if inconsistent samples are detected and removed. In addition, this paper has demonstrated the efficacy of a derived distinctiveness score when it is used in conjunction with three simple classifiers (Manhattan, Euclidean, and Mahalanobis distance). It is important to investigate the use of the proposed scores when it is applied to more effective or diverse classifiers, e.g., function-based approaches, or feature-based approaches with different sets of features [32], in order to enhance a verification performance of the GOOD users. Also, while the metric is designed to capture the distinctiveness of keystroke dynamic template (both constraint-text and free-text), it can also be applied to other feature-based biometric templates. This could be another fertile research area. Finally, one step towards the practicality of using keystroke dynamic (and other behavioral biometric) as an optional factor for validating the user’s identity is to benchmark this quality index using more diverse datasets in terms of the environment of data collection, input device, as well as languages used. 28 Sep 2021
PONE-D-21-28587
Distinguishability of Keystroke Dynamic Template
PLOS ONE Dear Dr. Sae-bae, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please submit your revised manuscript by Nov 12 2021 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript:
A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Pandi Vijayakumar, Ph.D Academic Editor PLOS ONE Journal Requirements:
When submitting your revision, we need you to address these additional requirements.
 
1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 
https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 
https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf
 
2. We suggest you thoroughly copyedit your manuscript for language usage, spelling, and grammar. If you do not know anyone who can help you do this, you may wish to consider employing a professional scientific editing service. 
 
Whilst you may use any professional scientific editing service of your choice, PLOS has partnered with both American Journal Experts (AJE) and Editage to provide discounted services to PLOS authors. Both organizations have experience helping authors meet PLOS guidelines and can provide language editing, translation, manuscript formatting, and figure formatting to ensure your manuscript meets our submission guidelines. To take advantage of our partnership with AJE, visit the AJE website (http://learn.aje.com/plos/) for a 15% discount off AJE services. To take advantage of our partnership with Editage, visit the Editage website (www.editage.com) and enter referral code PLOSEDIT for a 15% discount off Editage services.  If the PLOS editorial team finds any language issues in text that either AJE or Editage has edited, the service provider will re-edit the text for free.
 
Upon resubmission, please provide the following:
 
The name of the colleague or the details of the professional service that edited your manuscript
 
A copy of your manuscript showing your changes by either highlighting them or using track changes (uploaded as a *supporting information* file)
 
A clean copy of the edited manuscript (uploaded as the new *manuscript* file)”
 
3. Thank you for stating the following in the Acknowledgments Section of your manuscript: 
 
"This work was supported by the grant from National Science and Technology Development Agency (Grant No. FDA-CO-2562-9854-TH). "
 
We note that you have provided funding information that is not currently declared in your Funding Statement. However, funding information should not appear in the Acknowledgments section or other areas of your manuscript. We will only publish funding information present in the Funding Statement section of the online submission form. 
Please remove any funding-related text from the manuscript and let us know how you would like to update your Funding Statement. Currently, your Funding Statement reads as follows: 
 
"NS
FDA-CO-2562-9854-TH
National Science and Technology 313
Development Agency
https://www.nstda.or.th/
The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript"
 
Please include your amended statements within your cover letter; we will change the online submission form on your behalf.
Additional Editor Comments: The paper needs a major revision. [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #1: Yes Reviewer #2: Yes ********** 2. Has the statistical analysis been performed appropriately and rigorously? Reviewer #1: Yes Reviewer #2: Yes ********** 3. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #1: Yes Reviewer #2: Yes ********** 4. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #1: Yes Reviewer #2: Yes ********** 5. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #1: -Abstract is not able to convey what is the technical contribution of this paper. I suggest to re-write it. -Improve the quality of figures and explain those properly. -Result section is weak and I suggest authors to add more results and compare those with the existing approaches. -Although this paper is well written, there are still some typos in the current version. I would like to suggest the authors carefully proofread this paper and correct all the typos in the revision. -Some very related and recent work may be discussed to improve the quality of literature. e.g. Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols Security in Internet of Things: issues, challenges, taxonomy, and architecture Improving Road Safety for Driver Malaise and Sleepiness Behind the Wheel Using Vehicular Cloud Computing and Body Area Networks, A trust infrastructure based authentication method for clustered vehicular ad hoc networks The optimal path finding algorithm based on reinforcement learning The Effect of Gender, Age, and Education on the Adoption of Mobile Government Services IoT-based Big Data secure management in the Fog over a 6G Wireless Network, Using vehicles as fog infrastructures for transportation cyber-physical systems (T-CPS): Fog computing for vehicular networks -The authors are expected to report the running time of the proposed algorithm in the revision. -As an additional remark, references need to be completed with all the required information (e.g. page number, name of journal/conference, vol., issues, etc). Based on the comments above, I would like to accept this paper if my following concerns are carefully addressed. Reviewer #2: This paper addresses the issue of varied security level of Keystroke Dynamic by proposing a metric to quantify the quality of keystroke dynamic templates. Specifically, the metric is derived from statistical information of user specific feature variations and it can be used to reflect the verification performance of individual keystroke dynamic template in terms of false acceptance rate (FAR). The results seem nice. Overall, I like this paper, yet there are some issues to be addressed before publication. Strength: 1) The motivation and idea are good. 2) The comprison of different template groups of keystroke behavior based user authentication in Table is very nice. 3) The experimental results seem to be reseaonable and practical. Weakness: 1. There is no rationale to explain why the proposed template/metric works. The authors shall use one or two key sentenses to explain why the new template/metric works better than existing schemes. 2. Recently, there have been quite a number of new behavior authentication schemes proposed (as well as other kinds ofauthentication schemes like multi-factor authentication schemes). The authors shall compare the proposed new template with these existing schemes using a table like Table I of the IEEE S&P12 paper and Table IV of the IEEE TII'18 paper. "The quest to replace passwords- a framework for comparative evaluation of Web authentication schemes", IEEE S&P 2012. "Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks." IEEE TII, 2018. "Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics", Proc. Asiaccs 2017. 3. The entropy (security) is also a key factor for biometric/behavior identification. I suggest the authors compare the entropy of keystroke with other authentication factors. Otherwise, it is difficult to show the superiority of the keystroke authentication factor. For instance, Sadeghi et. al. showed that EEG biometric entropy is at best 83-bits; Wang et al. showed that the entropy of human chosen 4-digit PINs is 8.41 bits and 6-digit PINs 13.21 bits; Feng et al. showed that the entropy of human face template is 75 bits; Wang et al. showed that the entropy of human chosen passwords is 20-22 bits; Inthavisas et al. showed that the entropy of voice is 18-30 bits. Wang et al., Understanding Human-Chosen PINs: Characteristics, Distribution and Security. Proc. ACM ASIACCS 2017. Sadeghi et al., Geometrical anal- ysis of machine learning security in biometric authentication systems, in: 2017 16th IEEE International Conference on Machine Learning and Ap- plications (ICMLA), 2017 Feng et al., Binary discriminant analysis for generating binary face template, IEEE Transactions on Information Forensics and Security, 2012. Wang et al., Zipf's law in passwords, IEEE Transactions on Information Forensics and Security, 2017 2776–2791. Inthavisas et al., Secure speech biometric templates for user authenti- cation, IET Biometrics, 2012. 5. Behavior based user authentication factors are generally not separately used as authentication, especially for behaviors that can be relatively easy recorded/leaked/stealed. Thus, they are often combined with tradtional authentication factors like passwords and PINs. "Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices", IEEE Transactions on Dependable and Secure Computing, 2020, Doi: 10.1109/TDSC.2020.3022797 "Unified Biometric Privacy Preserving Three-factor Authentication and Key Agreement for Cloud-assisted Autonomous Vehicles".?IEEE Transactions on Vehicular Technology. DOI: 10.1109/TVT.2020.297125 "Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound." IEEE TDSC 2018. In all, I suggest a “major revision'' to this paper. ********** 6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #1: No Reviewer #2: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. 12 Nov 2021 Dear Editor and reviewers, We are grateful for their critical assessment of our work. These comments have helped us improve our work. We have revised our work according to the recommendation. The concerns are addressed point by point in the response letter as well as in the revised manuscript. Submitted filename: Response to reviewer.pdf Click here for additional data file. 29 Nov 2021 Distinguishability of Keystroke Dynamic Template PONE-D-21-28587R1 Dear Dr. Sae-bae, We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements. Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication. An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org. If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org. Kind regards, Pandi Vijayakumar, Ph.D Academic Editor PLOS ONE Additional Editor Comments (optional): Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #1: (No Response) Reviewer #2: All comments have been addressed ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #1: (No Response) Reviewer #2: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #1: (No Response) Reviewer #2: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #1: (No Response) Reviewer #2: (No Response) ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #1: (No Response) Reviewer #2: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #1: Distinguishability of Keystroke Dynamic Template is presented in this paper. Paper is revised well. Reviewer #2: The revised version has addressed most of my concerns, and I suggest an acceptance. The experiments are performed based on two public keystroke dynamic datasets comprising of two main types of keystroke dynamics: constrained-text and free-text, namely the CMU keystroke dynamics dataset and the Web-Based Benchmark for keystroke dynamics dataset. Experimental results based on multiple classifiers demonstrate that the proposed metric can be a good indicator of the template’s false acceptance rate. Thus, it can be used to enhance the security of the user authentication system based on keystroke dynamics ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #1: No Reviewer #2: No 3 Dec 2021 PONE-D-21-28587R1 Distinguishability of Keystroke Dynamic Template Dear Dr. Sae-bae: I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department. If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org. If we can help with anything else, please email us at plosone@plos.org. Thank you for submitting your work to PLOS ONE and supporting open access. Kind regards, PLOS ONE Editorial Office Staff on behalf of Dr. Pandi Vijayakumar Academic Editor PLOS ONE
  2 in total

1.  A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures.

Authors:  N Poh; J Kittler
Journal:  IEEE Trans Pattern Anal Mach Intell       Date:  2011-05-19       Impact factor: 6.226

Review 2.  A survey of keystroke dynamics biometrics.

Authors:  Pin Shen Teh; Andrew Beng Jin Teoh; Shigang Yue
Journal:  ScientificWorldJournal       Date:  2013-11-03
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.