Improving keystroke dynamics authentication system via multiple feature fusion scheme

Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

This paper reports the performance and effect of diverse keystroke features combination on keystroke dynamic authentication system by using fusion scheme. First of all, four types of keystroke features are acquired from our collected dataset, later then transformed into similarity scores by the use of Gaussian Probability Density Function (GPD) and Direction Similarity Measure (DSM). Next, three fusion schemes are introduced to merge the scores pairing with six fusion rules. Result shows that the finest performance is obtained by the combination of both dwell time and flight time collectively. Finally, this experiment also investigates the effect of using larger dataset on performance, which turns out to be rather consistent.

Original languageEnglish
Title of host publicationProceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
Pages277-282
Number of pages6
DOIs
Publication statusPublished - 2012 Oct 1
Event2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012 - Kuala Lumpur, Malaysia
Duration: 2012 Jun 262012 Jun 28

Publication series

NameProceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012

Other

Other2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
CountryMalaysia
CityKuala Lumpur
Period12/6/2612/6/28

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Safety, Risk, Reliability and Quality

Cite this

Teh, P. S., Yue, S., & Teoh, A. B. J. (2012). Improving keystroke dynamics authentication system via multiple feature fusion scheme. In Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012 (pp. 277-282). [6246096] (Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012). https://doi.org/10.1109/CyberSec.2012.6246096