We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Mixing and Matching Human Traits using Hand Typing

by Manoj Devare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 18
Year of Publication: 2013
Authors: Manoj Devare
10.5120/12838-9498

Manoj Devare . Mixing and Matching Human Traits using Hand Typing. International Journal of Computer Applications. 73, 18 ( July 2013), 1-5. DOI=10.5120/12838-9498

@article{ 10.5120/12838-9498,
author = { Manoj Devare },
title = { Mixing and Matching Human Traits using Hand Typing },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 18 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number18/12838-9498/ },
doi = { 10.5120/12838-9498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:25.334016+05:30
%A Manoj Devare
%T Mixing and Matching Human Traits using Hand Typing
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 18
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we have discussed few findings with respect to hand typing. The user behavior of simple typing for the lower case letters, and key stroke behavior during combination of lower and upper case letters is observed. During the entire cases user's keystroke latencies are measured and the use of combination of "shift key" and "caps lock" are observed. Here, the targeted (clear) text is in front of the user and key strokes were recorded. The results are illustrated for the traits finding which will be useful for verification of the user. The deliverable outcome of this work is a timer based program and a deployable library for running in background polling towards the keystrokes.

References
  1. Lívia C. F. Araújo, Luiz H. R. Sucupira Jr. , Miguel G. Lizárraga, Lee L. Ling, Andjoão B. T. Yabu-Uti (February 2005) "User Authentication Through Typing Biometrics Features" , IEEE Transactions On Signal Processing, Vol. 53, No. 2, , 851-855.
  2. Koichiro Niinuma, Anil K. Jain 2007, "Continuous User Authentication Using Temporal Information", Fujitsu Laboratories.
  3. Fabian Monrose, Aviel Rubin (2000) "Keystroke dynamics as a biometric for authentication", Future Generation Computer Systems, 351–359.
  4. Daniele Gunetti, Claudia Picardi, and Giancarlo Ruffo, 2005, "Keystroke Analysis of Different Languages: A Case Study", IDA 2005, LNCS 3646, 133–144.
  5. Daniele Gunetti, Claudia Picardi, and Giancarlo Ruffo , 2005, "Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text", LNAI 3673, 347–358.
  6. Romain Giot, Baptiste Hemery, Christophe Rosenberger 2010, "Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition", IEEE Computer Society, International Conference on Pattern Recognition 2010, 1128 -1131.
  7. Wasil Elsadig Eltahir, M. J. E. Salami, Ahmad Faris Ismail, and Weng Kin Lai 2008, "Design and Evaluation of a Pressure Based Typing Biometric Authentication System", Hindawi Publishing Corporation EURASIP Journal on Information Security Volume.
  8. http://en. wikipedia. org/wiki/Words_per_minute [accessed on date 10 February 2013].
  9. Patrick Bours, "Continuous keystroke dynamics: A different perspective towards biometric evaluation" , Information Security Technical Report, 2012, pp. 36-43, Elsevier Publications.
  10. Kevin S. Killourhy 2012, "A Scientific Understanding of Keystroke Dynamics" , Phd Thesis, School of Computer Science Computer Science Department Carnegie Mellon University.
  11. Jarmo Ilonen, "Keystroke dynamics", Lappeenranta University, Finland.
  12. Darren Clifford D'Souza 2002, "Typing Dynamics Biometric Authentication", Bachelor of Software Engineering Report, Department of Information Technology and Electrical Engineering, University of Queensland.
  13. A. Buchoux, N. L. Clarke 2008 , Deployment of Keystroke Analysis on a Smartphone, Edith Cowan University.
  14. Daniele Gunetti, Claudia Picardi August 2005, "Keystroke Analysis of Free Text ", ACM Transactions on Information and System Security, Vol. 8, No. 3, , Pages 312–347.
  15. Sam Hyland, April 7, 2004, "An Analysis of Keystroke Dynamics Use in User Authentication", Software engineering report.
  16. Dawn Xiaodong Song, David Wagner, Xuqing Tian, "Timing Analysis of Keystrokes and Timing Attacks on SSH", DARPA, NWSCSD, NSF Research Project report.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Security Hand Typing Keyboard Typing