PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics

Heewoong Lee,Deok Gyu Lee,Kihyo Nam,Mun‐Kweon Jeong
DOI: https://doi.org/10.1111/exsy.13806
IF: 3.3
2024-12-05
Expert Systems
Abstract:Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard‐based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.
computer science, artificial intelligence, theory & methods
What problem does this paper attempt to address?