{"title":"Increasing the reliability of authentication keyboard handwriting","authors":"V. Khitsenko, D. Krutohvostov","doi":"10.1109/APEIE.2014.7040894","DOIUrl":null,"url":null,"abstract":"The article presents authentication method that differs from other methods by possibility to determine probability of both kinds of errors a priori. At the first stage is comparison of keystrokes intervals with standard by the Spearman correlation coefficient. At the next stage is shift check by Wilcoxon signed-rank test and check of scale parameter difference by Sandvik-Ollson criterion. The very first case of difference leads to access denial. The article also provides results of experimental verification of authenticator, peculiarities of keystroke dynamics and recommendations for the standard sampling.","PeriodicalId":202524,"journal":{"name":"2014 12th International Conference on Actual Problems of Electronics Instrument Engineering (APEIE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 12th International Conference on Actual Problems of Electronics Instrument Engineering (APEIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APEIE.2014.7040894","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The article presents authentication method that differs from other methods by possibility to determine probability of both kinds of errors a priori. At the first stage is comparison of keystrokes intervals with standard by the Spearman correlation coefficient. At the next stage is shift check by Wilcoxon signed-rank test and check of scale parameter difference by Sandvik-Ollson criterion. The very first case of difference leads to access denial. The article also provides results of experimental verification of authenticator, peculiarities of keystroke dynamics and recommendations for the standard sampling.