Analysing keystroke dynamics using wavelet transforms

Ashhadul Islam, Samir Brahim Belhaouari

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Many smartphones are lost every year, with a meager percentage recovered. In many cases, users with malicious intent access these phones and use them to acquire sensitive data. There is a need for continuous monitoring and surveillance in smartphones, and keystroke dynamics play an essential role in identifying whether a phone is being used by its owner or an impersonator. Also, there is a growing need to replace expensive 2-tier authentication methods like One-time passwords (OTP) with cheaper and more robust methods. The methods proposed in this paper are applied to existing data and are proven to train more robust classifiers. A novel feature extraction method by wavelet transformation is demonstrated to convert keystroke data into features. The comparative study of classifiers trained on the extracted features vs. features extracted by existing methods shows that the processes proposed perform better than the state-of-art feature extraction methods.

Original languageEnglish
Title of host publication2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665493635
DOIs
Publication statusPublished - 2022
Event2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022 - Valec u Hrotovic, Czech Republic
Duration: 7 Sept 20229 Sept 2022

Publication series

NameProceedings - International Carnahan Conference on Security Technology
Volume2022-September
ISSN (Print)1071-6572

Conference

Conference2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022
Country/TerritoryCzech Republic
CityValec u Hrotovic
Period7/09/229/09/22

Keywords

  • feature-extraction
  • keystroke-dynamics
  • security
  • wavelets

Fingerprint

Dive into the research topics of 'Analysing keystroke dynamics using wavelet transforms'. Together they form a unique fingerprint.

Cite this