PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics

ABSTRACT Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Expert systems 2025-02, Vol.42 (2), p.n/a
Hauptverfasser: Lee, Heewoong, Lee, Deok Gyu, Nam, Kihyo, Jeong, Mun‐Kweon
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 2
container_start_page
container_title Expert systems
container_volume 42
creator Lee, Heewoong
Lee, Deok Gyu
Nam, Kihyo
Jeong, Mun‐Kweon
description ABSTRACT Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard‐based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.
doi_str_mv 10.1111/exsy.13806
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3156276734</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3156276734</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1906-43be421fd9e8a6b55cc0fc8eaeac541d42915e81a7eded1b6b130c125c0313903</originalsourceid><addsrcrecordid>eNp9kM1KAzEUhYMoWH82PkHAhSBUcyczmZllHfyDikIVdDWkmTtt6jRTkwzanVt3PqNPYtq69m4uB757DvcQcgTsDMKc44dbngHPmNgiPYhF1mc8j7dJj0VC9OM0Yrtkz7kZYwzSVPTI10Px8_l9IR1W9MmhpUVrvDZd2zk66PwUg1LS69ZQbWjQdGC9rrXSsqG3xmPT6AkahfQO_bStqDQVHS2dx3nw02ayvlk5nzh6FXSIGHnbviItptJK5dFqFzLcAdmpZePw8G_vk6ery8fipj-8v74tBsO-gpyFH_gY4wjqKsdMinGSKMVqlaFEqZIYqjjKIcEMZIoVVjAWY-BMQZQoxoHnjO-T443vwrZvHTpfztrOmhBZckhElIqUx4E63VDKts5ZrMuF1XNplyWwclV1uaq6XFcdYNjA77rB5T9kefk8etnc_ALnUoRu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3156276734</pqid></control><display><type>article</type><title>PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics</title><source>Wiley Online Library Journals Frontfile Complete</source><creator>Lee, Heewoong ; Lee, Deok Gyu ; Nam, Kihyo ; Jeong, Mun‐Kweon</creator><creatorcontrib>Lee, Heewoong ; Lee, Deok Gyu ; Nam, Kihyo ; Jeong, Mun‐Kweon</creatorcontrib><description>ABSTRACT Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard‐based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.</description><identifier>ISSN: 0266-4720</identifier><identifier>EISSN: 1468-0394</identifier><identifier>DOI: 10.1111/exsy.13806</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>Accuracy ; Artificial intelligence ; biometrics ; Continuity (mathematics) ; continuous authentication ; convolution neural network ; Decision trees ; Delay time analysis ; Feature extraction ; Fingers ; Input devices ; keyboard stroke ; Keyboards ; QWERTY keyboards ; Rejection rate ; support vector machine</subject><ispartof>Expert systems, 2025-02, Vol.42 (2), p.n/a</ispartof><rights>2024 John Wiley &amp; Sons Ltd.</rights><rights>2025 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1906-43be421fd9e8a6b55cc0fc8eaeac541d42915e81a7eded1b6b130c125c0313903</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1111%2Fexsy.13806$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1111%2Fexsy.13806$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Lee, Heewoong</creatorcontrib><creatorcontrib>Lee, Deok Gyu</creatorcontrib><creatorcontrib>Nam, Kihyo</creatorcontrib><creatorcontrib>Jeong, Mun‐Kweon</creatorcontrib><title>PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics</title><title>Expert systems</title><description>ABSTRACT Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard‐based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.</description><subject>Accuracy</subject><subject>Artificial intelligence</subject><subject>biometrics</subject><subject>Continuity (mathematics)</subject><subject>continuous authentication</subject><subject>convolution neural network</subject><subject>Decision trees</subject><subject>Delay time analysis</subject><subject>Feature extraction</subject><subject>Fingers</subject><subject>Input devices</subject><subject>keyboard stroke</subject><subject>Keyboards</subject><subject>QWERTY keyboards</subject><subject>Rejection rate</subject><subject>support vector machine</subject><issn>0266-4720</issn><issn>1468-0394</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2025</creationdate><recordtype>article</recordtype><recordid>eNp9kM1KAzEUhYMoWH82PkHAhSBUcyczmZllHfyDikIVdDWkmTtt6jRTkwzanVt3PqNPYtq69m4uB757DvcQcgTsDMKc44dbngHPmNgiPYhF1mc8j7dJj0VC9OM0Yrtkz7kZYwzSVPTI10Px8_l9IR1W9MmhpUVrvDZd2zk66PwUg1LS69ZQbWjQdGC9rrXSsqG3xmPT6AkahfQO_bStqDQVHS2dx3nw02ayvlk5nzh6FXSIGHnbviItptJK5dFqFzLcAdmpZePw8G_vk6ery8fipj-8v74tBsO-gpyFH_gY4wjqKsdMinGSKMVqlaFEqZIYqjjKIcEMZIoVVjAWY-BMQZQoxoHnjO-T443vwrZvHTpfztrOmhBZckhElIqUx4E63VDKts5ZrMuF1XNplyWwclV1uaq6XFcdYNjA77rB5T9kefk8etnc_ALnUoRu</recordid><startdate>202502</startdate><enddate>202502</enddate><creator>Lee, Heewoong</creator><creator>Lee, Deok Gyu</creator><creator>Nam, Kihyo</creator><creator>Jeong, Mun‐Kweon</creator><general>Blackwell Publishing Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202502</creationdate><title>PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics</title><author>Lee, Heewoong ; Lee, Deok Gyu ; Nam, Kihyo ; Jeong, Mun‐Kweon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1906-43be421fd9e8a6b55cc0fc8eaeac541d42915e81a7eded1b6b130c125c0313903</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2025</creationdate><topic>Accuracy</topic><topic>Artificial intelligence</topic><topic>biometrics</topic><topic>Continuity (mathematics)</topic><topic>continuous authentication</topic><topic>convolution neural network</topic><topic>Decision trees</topic><topic>Delay time analysis</topic><topic>Feature extraction</topic><topic>Fingers</topic><topic>Input devices</topic><topic>keyboard stroke</topic><topic>Keyboards</topic><topic>QWERTY keyboards</topic><topic>Rejection rate</topic><topic>support vector machine</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Heewoong</creatorcontrib><creatorcontrib>Lee, Deok Gyu</creatorcontrib><creatorcontrib>Nam, Kihyo</creatorcontrib><creatorcontrib>Jeong, Mun‐Kweon</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Heewoong</au><au>Lee, Deok Gyu</au><au>Nam, Kihyo</au><au>Jeong, Mun‐Kweon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics</atitle><jtitle>Expert systems</jtitle><date>2025-02</date><risdate>2025</risdate><volume>42</volume><issue>2</issue><epage>n/a</epage><issn>0266-4720</issn><eissn>1468-0394</eissn><abstract>ABSTRACT Biometric technology, which performs continuous authentication based on user behaviour, has been developed in various ways depending on the type of device, input device, and sensor. Research on continuous authentication technology in PC‐based systems with few sensors installed is based on data from physical devices that extract and analyse features from keyboard and mouse input patterns. Among these, previous studies on continuous authentication through keyboard input performed continuous authentication using the key hold delay time that occurs when one key is pressed, the key interval delay time that occurs due to the interaction between fingers, and the key press delay time. However, the keyboard‐based continuous authentication model has limitations in increasing accuracy due to a small number of features. Therefore, in this paper, when a user inputs a sentence using a QWERTY keyboard in a PC system, the function is subdivided by reflecting the characteristics of each finger and used for continuous authentication. The features extracted by reflecting the characteristics of the finger were subdivided into a total of 151 latencies, and Support Vector Data Description (SVDD), decision tree and CNN were used as continuous authentication models. Experimental data was collected through the user's input of randomly displayed sentences, and features were created based on this. User keystroke behaviour was used to validate the continuous authentication in the artificial intelligence model. Validation metrics included thresholds for classification accuracy (ACC), ROC curves, false rejection rate (FRR), equal error rate (EER), and false acceptance rate (FAR). As a result of the experiment, it was found that continuous authentication including the user's finger input pattern was superior to the existing method.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/exsy.13806</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0266-4720
ispartof Expert systems, 2025-02, Vol.42 (2), p.n/a
issn 0266-4720
1468-0394
language eng
recordid cdi_proquest_journals_3156276734
source Wiley Online Library Journals Frontfile Complete
subjects Accuracy
Artificial intelligence
biometrics
Continuity (mathematics)
continuous authentication
convolution neural network
Decision trees
Delay time analysis
Feature extraction
Fingers
Input devices
keyboard stroke
Keyboards
QWERTY keyboards
Rejection rate
support vector machine
title PC‐Based User Continuous Authentication in the Artificial Intelligence Method and System Using the User's Finger Stroke Characteristics
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T20%3A18%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=PC%E2%80%90Based%20User%20Continuous%20Authentication%20in%20the%20Artificial%20Intelligence%20Method%20and%20System%20Using%20the%20User's%20Finger%20Stroke%20Characteristics&rft.jtitle=Expert%20systems&rft.au=Lee,%20Heewoong&rft.date=2025-02&rft.volume=42&rft.issue=2&rft.epage=n/a&rft.issn=0266-4720&rft.eissn=1468-0394&rft_id=info:doi/10.1111/exsy.13806&rft_dat=%3Cproquest_cross%3E3156276734%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3156276734&rft_id=info:pmid/&rfr_iscdi=true