Knowledge

Keystroke dynamics

Source đź“ť

1423:
between them. Three different classifiers were applied, and in each case the key hold times were more effective features for discrimination than the interkey times. Best performance was achieved by an inductive learning classifier using both interkey and hold times. A high rate of typographical errors during login entry is reported. In practice, these are usually corrected errors-that is, they are strings which include backspaces to correct earlier errors-but their presence confounds the use of typing-style analysis as a practical means of securing access to computer systems.
121: 183: 25: 66: 379:
Keystroke dynamics is part of a larger class of biometrics known as behavioral biometrics, a field in which observed patterns are statistical in nature. Because of this inherent uncertainty, a commonly held belief is that behavioral biometrics are not as reliable as biometrics used for authentication
338:
The behavioral biometric of keystroke dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The user's keystroke rhythms are measured to develop a unique biometric template of the user's typing pattern for future authentication. Keystrokes are separated
306:
The behavioral biometric of keystroke dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The user's keystroke rhythms are measured to develop a unique biometric template of the user's typing pattern for future authentication. Keystrokes are separated
363:
In addition, sequences of letters may have characteristic properties for a user. In English, the use of "the" is very common, and those three letters may be known as a rapid-fire sequence. Common endings, such as "ing", may be entered far faster than the same letters in reverse order ("gni") to the
1422:
The keystroke dynamics of a computer user's login string provide a characteristic pattern that can be used for identity verification. Timing vectors for several hundred login attempts were collected for ten "valid" users and ten "forgers", and classification analysis was applied to discriminate
523: 354:
The time to seek and depress a key (seek-time) and the time the key is held down (hold-time) may be characteristic of an individual, regardless of the total speed at which they type. Most people take longer to find or get to specific letters on the keyboard than their average seek-time for all
442: 455: 403:
The benefit to keystroke dynamics (as well as other behavioral biometrics) is that FRR/FAR can be adjusted by changing the acceptance threshold at the individual level. This allows for explicitly defined individual risk mitigation that physical biometric technologies could not achieve.
507: 468: 371:", "homonyms" and hold-length-errors (for a shift key held down too short or too long a time). Even without knowing what language the user is working in, these errors may be detected by looking at the rest of the text and what letters the user goes back and replaces. 481: 410:
Because of these variations, any system will make false-positive and false-negative errors. Some successful commercial products have strategies to handle these issues and have proven effective in large-scale use in real-world settings and applications.
1263: 359:
people may be statistically faster in getting to keys they hit with their right-hand fingers than with their left-hand fingers. Index fingers may be faster than other fingers, consistent for a user, regardless of their overall speed.
327:. Using a methodology called "The Fist of the Sender," military intelligence identified that an individual had a unique way of keying in a message's "dots" and "dashes", creating a rhythm that could help distinguish ally from enemy. 339:
into static and dynamic typing, which are used to help distinguish between authorized and unauthorized users. Vibration information may be used to create a pattern for future use in both identification and authentication tasks.
307:
into static and dynamic typing, which are used to help distinguish between authorized and unauthorized users. Vibration information may be used to create a pattern for future use in both identification and authentication tasks.
1275:
Mahar, D.; Napier, R.; Wagner, M.; Laverty, W.; Henderson, R. D.; Hiron, M. (1995). "Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions".
494: 1004: 699: 342:
Keystroke dynamic information could be used to verify or determine the identity of the person producing the keystrokes. The techniques used to do this vary widely in sophistication and range from statistical techniques to
571: 407:
One of the major problems that keystroke dynamics runs into is that a user's typing varies substantially during a day and between different days and may be affected by any number of external factors.
364:
degree that varies consistently by user. This consistency may hold and reveal common sequences of the user's native language even when they are writing entirely in a different language.
367:
Common "errors" may also be quite characteristic of a user. There is a taxonomy of errors, such as the user's most common "substitutions", "reversals", "drop-outs", "double-strikes", "
1011: 706: 1460: 330:
Keyboard dynamics received attention as a potential alternative to short PIN numbers, which were widely used for authentication early in the expansion of networked computing.
1553: 1144:
Braund, Taylor A.; O’Dea, Bridianne; Bal, Debopriyo; Maston, Kate; Larsen, Mark E.; Werner-Seidler, Aliza; Tillman, Gabriel; Christensen, Helen (2023-05-15).
1487:
Jenkins, Jeffrey; Nguyen, Quang; Reynolds, Joseph; Horner, William; Szu, Harold (2011-05-13). "The physiology of keystroke dynamics". In Szu, Harold (ed.).
514:
P. Nordström, J. Johansson. Security system and method for detecting intrusion in a computerized system. Patent No. 2 069 993, European Patent Office, 2009.
400:
measurements. As such, the traditional benchmarks of False Acceptance Rate (FAR) and False Rejection Rates (FRR) no longer have linear relationships.
879: 625: 596: 1461:
https://web.archive.org/web/20110707084309/http://www.admitonesecurity.com/admitone_library/AOS_Compliance_Functional_Assessment_by_Coalfire.pdf
536:
Because human beings generate keystroke timings, they are not well correlated with external processes. They are frequently used as a source of
1517: 521:, A. Awad and I. Traore, "System and method for determining a computer user profile from a motion-based input device", issued 2012 1146:"Associations Between Smartphone Keystroke Metadata and Mental Health Symptoms in Adolescents: Findings From the Future Proofing Study" 440:, Raul-Laviniu Popa, and Kyle Hunt, "Systems and Methods for Using Typing Characteristics for Authentication", issued 2024 1428:
Young, J. R., & Hammon, R. W. (Inventors). (1989). Method and apparatus for verifying an individual's identity. 4805222). Notes:
453:, John D. Rome, Bethann G. Rome and Thomas E. Ketcham II, "User authentication via known text input cadence", issued 2012 572:
Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister,
928: 791: 1560: 1258:
Bender, S and Postley, H. (Inventors) (2007). Key sequence rhythm recognition system and method. (USA 7206938), Notes:
84: 76: 38: 1204: 1440:
October 2006). Notes: Vendor specializing in keystroke authentication solutions for government and commercial agencies.
1630: 1326: 1034: 751: 244: 226: 164: 142: 102: 52: 505:, J.R. Young and R.W. Hammon, "Method and apparatus for verifying an individual's identity", issued 1989 466:, John C. Checco, "Method for providing computer-based authentication utilizing biometrics", issued 2009 208: 135: 537: 319:
operators began to develop unique "signatures" that could be identified simply by their tapping rhythm. As late as
1450: 543:
Mental health symptoms such as depression and anxiety have also been correlated with keystroke timing features.
286:. Use of patterns in key operation to identify operators predates modern computing, and has been proposed as an 295: 193: 585:. Proceedings of the IEEE International Conference on Intelligence and Security Informatics. pp. 155–160. 1600: 771: 1438: 479:, S. Blender and H. Postley, "Key sequence rhythm recognition system and method", issued 2007 437: 518: 502: 489: 476: 463: 450: 1610: 552: 348: 1696: 590: 129: 1209:
Bergadano, F.; Gunetti, D.; Picardi, C. (2002). "User authentication through Keystroke Dynamics".
355:
letters. Which letters require more time vary dramatically and consistently for different people.
344: 204: 44: 1466:
Karnan, M.Akila (2011). "Biometric personal authentication using keystroke dynamics: A review".
1595: 146: 419:
Use of keylogging software may be in direct and explicit violation of local laws, such as the
1660: 1605: 1590: 1489:
Independent Component Analyses, Wavelets, Neural Networks, Biosystems, and Nanoengineering IX
973:"Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets" 918: 893: 873: 864:
Monrose, Fabian, and Aviel D. Rubin. "Keystroke dynamics as a biometric for authentication".
668:"Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets" 619: 610:
Monrose, Fabian, and Aviel D. Rubin. "Keystroke dynamics as a biometric for authentication".
200: 8: 1701: 1665: 1546: 1267:
Joyce, R., & Gupta, G. (1990). Identity authorization based on keystroke latencies.
1240:
May 2006). Notes: Vendor specializing in keystroke authentication for large enterprises.
1172: 1145: 573: 1650: 1580: 1369: 1307:
Proceedings of the 4th ACM conference on Computer and communications security - CCS '97
1293: 1249:
Garcia, J. (Inventor). (1986). Personal identification apparatus. (USA 4621334). Notes:
1226: 1085: 1059: 846: 820: 1357: 1615: 1413: 1361: 1322: 1297: 1177: 1126: 1077: 924: 838: 787: 747: 283: 1338: 1635: 1585: 1496: 1475: 1405: 1373: 1353: 1314: 1285: 1218: 1167: 1157: 1116: 1089: 1069: 984: 953: 945: 850: 830: 779: 739: 679: 648: 640: 1230: 577: 1670: 1454: 783: 1047: 808: 1645: 1479: 1398:
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
1381: 1305:
Monrose, Fabian; Rubin, Aviel (1997). "Authentication via keystroke dynamics".
1121: 1104: 1073: 834: 287: 1443:
Lopatka, M. & Peetz, M.H. (2009). Vibration Sensitive Keystroke Analysis.
1393: 778:. Advances in Intelligent and Soft Computing. Vol. 84. pp. 113–120. 731: 1690: 1675: 1625: 1620: 1417: 1386:
Proceedings of the 6th ACM Conference on Computer and Communications Security
1365: 1130: 1081: 950:
Proceedings of the 4th ACM conference on Computer and Communications Security
842: 645:
Proceedings of the 4th ACM conference on Computer and Communications Security
385: 772:"A Modified Algorithm for User Identification by His Typing on the Keyboard" 1655: 1445:
Proceedings of the 18th Annual Belgian-Dutch Conference on Machine Learning
1289: 1181: 424: 356: 320: 1318: 1222: 989: 972: 957: 743: 732:"Continuous authentication by analysis of keyboard typing characteristics" 684: 667: 652: 333: 492:, J. Garcia, "Personal identification apparatus", issued 1986 420: 381: 278:
information generated by key-press-related events that occur when a user
1433: 1409: 1404:(2). Institute of Electrical and Electronics Engineers (IEEE): 236–241. 1254: 1035:
Continuous authentication by analysis of keyboard typing characteristics
1569: 1392:
Robinson, J.A.; Liang, V.W.; Chambers, J.A.M.; MacKenzie, C.L. (1998).
1243:
AdmitOne Security - formerly BioPassword. (vendor web-site home . URL
1105:"Continuous authentication by free-text keystroke based on CNN and RNN" 368: 324: 275: 1500: 1448: 1310: 291: 211:. Statements consisting only of original research should be removed. 1103:
Lu, Xiaofeng; Zhang, Shengfei; Hui, Pan; Lio, Pietro (2020-09-01).
1064: 825: 316: 1394:"Computer user verification using login string keystroke dynamics" 1244: 1162: 1199:
Checco, J. (2003). Keystroke Dynamics & Corporate Security.
1518:"Websites can track us by the way we type—here's how to stop it" 1238: 1048:"Authentication of Smartphone Users Using Behavioral Biometrics" 809:"Authentication of Smartphone Users Using Behavioral Biometrics" 1525: 863: 609: 279: 1391: 1538: 1492: 1486: 1459:
Coalfire Systems Compliance Validation Assessment (2007)
389: 1384:(1999). Password hardening based on keystroke dynamics. 1274: 1005:"User authentication through typing biometrics features" 700:"User authentication through typing biometrics features" 1208: 380:
based on physically observable characteristics such as
374: 334:
Collection and potential use of keystroke dynamics data
1339:"Keystroke dynamics as a biometric for authentication" 1143: 1388:, 73-82. Notes: Kent Ridge Digital Labs, Singapore 1211:
ACM Transactions on Information and System Security
579:
Identity theft, computers and behavioral biometrics
1246:. Notes: Vendor specializing in keystroke dynamics 1688: 776:Image Processing and Communications Challenges 2 1278:International Journal of Human-Computer Studies 1271:, 33(2), 168-176. Notes: Review up through 1990 1045: 806: 414: 396:measurement in replacement of the traditional 1554: 1102: 769: 736:European Convention on Security and Detection 1336: 1304: 1046:Alzubaidi, Abdulaziz; Kalita, Jugal (2016). 943: 878:: CS1 maint: multiple names: authors list ( 807:Alzubaidi, Abdulaziz; Kalita, Jugal (2016). 638: 624:: CS1 maint: multiple names: authors list ( 595:: CS1 maint: multiple names: authors list ( 323:, the military transmitted messages through 1052:IEEE Communications Surveys & Tutorials 813:IEEE Communications Surveys & Tutorials 53:Learn how and when to remove these messages 1561: 1547: 1337:Monrose, Fabian; Rubin, Aviel D. (2000). 1171: 1161: 1120: 1063: 988: 824: 683: 245:Learn how and when to remove this message 227:Learn how and when to remove this message 165:Learn how and when to remove this message 103:Learn how and when to remove this message 729: 128:This article includes a list of general 1437:Vertical Company LTD. (vendor web-site 946:"Authentication via keystroke dynamics" 770:Panasiuk, Piotr; Saeed, Khalid (2010). 641:"Authentication via keystroke dynamics" 1689: 1465: 970: 916: 665: 423:, under which such use may constitute 1542: 576:, Lior Rokach, Yuval Elovici (2009). 1515: 765: 763: 375:Authentication versus identification 315:During the late nineteenth century, 176: 114: 59: 18: 1237:iMagic Software. (vendor web-site 1192: 13: 1509: 1346:Future Generation Computer Systems 866:Future Generation Computer Systems 612:Future Generation Computer Systems 134:it lacks sufficient corresponding 75:tone or style may not reflect the 14: 1713: 1631:Handwritten biometric recognition 760: 538:hardware-generated random numbers 34:This article has multiple issues. 257:All information is from a study 181: 119: 85:guide to writing better articles 64: 23: 1137: 1096: 1039: 1028: 997: 964: 944:Monrose, F.; Rubin, A. (1997). 937: 910: 886: 639:Monrose, F.; Rubin, A. (1997). 392:. Behavioral biometrics use a 42:or discuss these issues on the 1568: 1468:Applied Soft Computing Journal 857: 800: 723: 692: 659: 632: 603: 565: 1: 1358:10.1016/s0167-739x(99)00059-x 920:Ham Radio's Technical Culture 558: 531: 1601:Biometric voter registration 1380:Monrose, F. R. M. K., & 1352:(4). Elsevier BV: 351–359X. 784:10.1007/978-3-642-16295-4_13 345:artificial intelligence (AI) 7: 1516:Vaas, Lisa (30 July 2015). 1309:. New York, New York, USA: 546: 415:Legal and regulatory issues 274:refer to the collection of 207:the claims made and adding 10: 1718: 1480:10.1016/j.asoc.2010.08.003 1122:10.1016/j.cose.2020.101861 1074:10.1109/comst.2016.2537748 835:10.1109/comst.2016.2537748 430: 310: 301: 16:Biometrics from keystrokes 1576: 1269:Communications of the ACM 971:Deng, Y.; Yu, Y. (2013). 923:. MIT Press. p. 23. 666:Deng, Y.; Yu, Y. (2013). 517: 501: 488: 475: 462: 449: 436: 1109:Computers & Security 917:Haring, Kristen (2007). 730:Shepherd, S.J. (1995). 149:more precise citations. 1596:Biometric tokenization 1290:10.1006/ijhc.1995.1061 977:ISRN Signal Processing 672:ISRN Signal Processing 540:for computer systems. 438:US patent 11914690 1661:Signature recognition 1606:Eye vein verification 1591:Biometrics in schools 1319:10.1145/266420.266434 1223:10.1145/581271.581272 958:10.1145/266420.266434 653:10.1145/266420.266434 519:US patent 8230232 503:US patent 4805222 490:US patent 4621334 477:US patent 7206938 464:US patent 7509686 451:US patent 9430626 1201:WSTA Ticker Magazine 894:"Keystroke Dynamics" 738:. pp. 111–114. 369:adjacent letter hits 265:keystroke biometrics 1666:Speaker recognition 1581:Biometric passports 1495:. pp. 80581N. 1410:10.1109/3468.661150 990:10.1155/2013/565183 744:10.1049/cp:19950480 685:10.1155/2013/565183 347:approaches such as 269:typing dynamics, or 1651:Private biometrics 1641:Keystroke dynamics 1491:. Vol. 8058. 1453:2009-03-24 at the 1313:. pp. 48–56. 1150:JMIR Mental Health 952:. pp. 48–56. 647:. pp. 48–56. 261:Keystroke dynamics 192:possibly contains 1684: 1683: 1616:Forensic podiatry 1501:10.1117/12.887419 930:978-0-262-08355-3 793:978-3-642-16294-7 553:Fist (telegraphy) 272:typing biometrics 255: 254: 247: 237: 236: 229: 194:original research 175: 174: 167: 113: 112: 105: 79:used on Knowledge 77:encyclopedic tone 57: 1709: 1636:Iris recognition 1611:Face recognition 1586:Biometric points 1563: 1556: 1549: 1540: 1539: 1535: 1533: 1532: 1504: 1483: 1474:(2): 1565–1573. 1430:US Patent Office 1425: 1377: 1343: 1332: 1301: 1260:US Patent Office 1251:US Patent Office 1234: 1193:Other references 1186: 1185: 1175: 1165: 1141: 1135: 1134: 1124: 1100: 1094: 1093: 1067: 1058:(3): 1998–2026. 1043: 1037: 1032: 1026: 1025: 1023: 1022: 1016: 1010:. Archived from 1009: 1001: 995: 994: 992: 968: 962: 961: 941: 935: 934: 914: 908: 907: 905: 904: 890: 884: 883: 877: 869: 861: 855: 854: 828: 819:(3): 1998–2026. 804: 798: 797: 767: 758: 757: 727: 721: 720: 718: 717: 711: 705:. Archived from 704: 696: 690: 689: 687: 663: 657: 656: 636: 630: 629: 623: 615: 607: 601: 600: 594: 586: 584: 574:Sebastian Möller 569: 527: 526: 522: 511: 510: 506: 498: 497: 493: 485: 484: 480: 472: 471: 467: 459: 458: 454: 446: 445: 441: 421:U.S. Patriot Act 250: 243: 232: 225: 221: 218: 212: 209:inline citations 185: 184: 177: 170: 163: 159: 156: 150: 145:this article by 136:inline citations 123: 122: 115: 108: 101: 97: 94: 88: 87:for suggestions. 83:See Knowledge's 68: 67: 60: 49: 27: 26: 19: 1717: 1716: 1712: 1711: 1710: 1708: 1707: 1706: 1697:User interfaces 1687: 1686: 1685: 1680: 1671:Soft biometrics 1572: 1567: 1530: 1528: 1512: 1510:Further reading 1507: 1455:Wayback Machine 1341: 1329: 1195: 1190: 1189: 1142: 1138: 1101: 1097: 1044: 1040: 1033: 1029: 1020: 1018: 1014: 1007: 1003: 1002: 998: 969: 965: 942: 938: 931: 915: 911: 902: 900: 892: 891: 887: 871: 870: 862: 858: 805: 801: 794: 768: 761: 754: 728: 724: 715: 713: 709: 702: 698: 697: 693: 664: 660: 637: 633: 617: 616: 608: 604: 591:cite conference 588: 587: 582: 570: 566: 561: 549: 534: 524: 508: 495: 482: 469: 456: 443: 433: 417: 377: 349:neural networks 336: 313: 304: 290:alternative to 251: 240: 239: 238: 233: 222: 216: 213: 198: 186: 182: 171: 160: 154: 151: 141:Please help to 140: 124: 120: 109: 98: 92: 89: 82: 73:This article's 69: 65: 28: 24: 17: 12: 11: 5: 1715: 1705: 1704: 1699: 1682: 1681: 1679: 1678: 1673: 1668: 1663: 1658: 1653: 1648: 1646:Mouse tracking 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1577: 1574: 1573: 1566: 1565: 1558: 1551: 1543: 1537: 1536: 1522:Naked Security 1511: 1508: 1506: 1505: 1484: 1463: 1457: 1441: 1435: 1426: 1389: 1378: 1334: 1327: 1302: 1284:(4): 579–592. 1272: 1265: 1256: 1247: 1241: 1235: 1217:(4): 367–397. 1206: 1196: 1194: 1191: 1188: 1187: 1136: 1095: 1038: 1027: 996: 963: 936: 929: 909: 885: 856: 799: 792: 759: 752: 722: 691: 658: 631: 602: 563: 562: 560: 557: 556: 555: 548: 545: 533: 530: 529: 528: 515: 512: 499: 486: 473: 460: 447: 432: 429: 416: 413: 376: 373: 335: 332: 312: 309: 303: 300: 288:authentication 253: 252: 235: 234: 189: 187: 180: 173: 172: 127: 125: 118: 111: 110: 72: 70: 63: 58: 32: 31: 29: 22: 15: 9: 6: 4: 3: 2: 1714: 1703: 1700: 1698: 1695: 1694: 1692: 1677: 1676:Vein matching 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1637: 1634: 1632: 1629: 1627: 1626:Hand geometry 1624: 1622: 1621:Gait analysis 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1578: 1575: 1571: 1564: 1559: 1557: 1552: 1550: 1545: 1544: 1541: 1527: 1523: 1519: 1514: 1513: 1502: 1498: 1494: 1490: 1485: 1481: 1477: 1473: 1469: 1464: 1462: 1458: 1456: 1452: 1449: 1446: 1442: 1439: 1436: 1434: 1431: 1427: 1424: 1419: 1415: 1411: 1407: 1403: 1399: 1395: 1390: 1387: 1383: 1379: 1375: 1371: 1367: 1363: 1359: 1355: 1351: 1347: 1340: 1335: 1330: 1328:0-89791-912-2 1324: 1320: 1316: 1312: 1308: 1303: 1299: 1295: 1291: 1287: 1283: 1279: 1273: 1270: 1266: 1264: 1261: 1257: 1255: 1252: 1248: 1245: 1242: 1239: 1236: 1232: 1228: 1224: 1220: 1216: 1212: 1207: 1205: 1202: 1198: 1197: 1183: 1179: 1174: 1169: 1164: 1163:10.2196/44986 1159: 1155: 1151: 1147: 1140: 1132: 1128: 1123: 1118: 1114: 1110: 1106: 1099: 1091: 1087: 1083: 1079: 1075: 1071: 1066: 1061: 1057: 1053: 1049: 1042: 1036: 1031: 1017:on 2014-03-04 1013: 1006: 1000: 991: 986: 982: 978: 974: 967: 959: 955: 951: 947: 940: 932: 926: 922: 921: 913: 899: 895: 889: 881: 875: 867: 860: 852: 848: 844: 840: 836: 832: 827: 822: 818: 814: 810: 803: 795: 789: 785: 781: 777: 773: 766: 764: 755: 753:0-85296-640-7 749: 745: 741: 737: 733: 726: 712:on 2014-03-04 708: 701: 695: 686: 681: 677: 673: 669: 662: 654: 650: 646: 642: 635: 627: 621: 613: 606: 598: 592: 581: 580: 575: 568: 564: 554: 551: 550: 544: 541: 539: 520: 516: 513: 504: 500: 491: 487: 478: 474: 465: 461: 452: 448: 439: 435: 434: 428: 426: 422: 412: 408: 405: 401: 399: 395: 391: 387: 386:retinal scans 383: 372: 370: 365: 361: 358: 352: 350: 346: 340: 331: 328: 326: 322: 318: 308: 299: 297: 293: 289: 285: 281: 277: 273: 270: 266: 262: 258: 249: 246: 231: 228: 220: 217:February 2014 210: 206: 202: 196: 195: 190:This article 188: 179: 178: 169: 166: 158: 155:February 2014 148: 144: 138: 137: 131: 126: 117: 116: 107: 104: 96: 86: 80: 78: 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 1656:Retinal scan 1640: 1529:. Retrieved 1521: 1488: 1471: 1467: 1444: 1429: 1421: 1401: 1397: 1385: 1349: 1345: 1306: 1281: 1277: 1268: 1259: 1250: 1214: 1210: 1200: 1153: 1149: 1139: 1112: 1108: 1098: 1055: 1051: 1041: 1030: 1019:. Retrieved 1012:the original 999: 980: 976: 966: 949: 939: 919: 912: 901:. Retrieved 897: 888: 874:cite journal 865: 859: 816: 812: 802: 775: 735: 725: 714:. Retrieved 707:the original 694: 675: 671: 661: 644: 634: 620:cite journal 611: 605: 578: 567: 542: 535: 425:wire-tapping 418: 409: 406: 402: 397: 393: 382:fingerprints 378: 366: 362: 357:Right-handed 353: 341: 337: 329: 321:World War II 314: 305: 271: 268: 264: 260: 259: 256: 241: 223: 214: 191: 161: 152: 133: 99: 93:January 2014 90: 74: 50: 43: 37: 36:Please help 33: 147:introducing 1702:Biometrics 1691:Categories 1570:Biometrics 1531:2018-02-01 1382:Wetzel, S. 1333:much cited 1156:: e44986. 1115:: 101861. 1065:1911.04104 1021:2013-11-14 983:: 565183. 903:2018-01-18 898:Biometrics 826:1911.04104 716:2013-11-14 678:: 565183. 559:References 532:Other uses 394:confidence 325:Morse Code 201:improve it 130:references 39:improve it 1447:, 75-80. 1418:1083-4427 1366:0167-739X 1311:ACM Press 1298:206564985 1131:0167-4048 1082:1553-877X 843:1553-877X 398:pass/fail 298:numbers. 292:passwords 276:biometric 205:verifying 45:talk page 1451:Archived 1182:37184904 1173:10227695 547:See also 317:telegram 284:keyboard 1374:1202473 1090:8443300 851:8443300 431:Patents 311:History 302:Science 199:Please 143:improve 1526:Sophos 1416:  1372:  1364:  1325:  1296:  1231:507476 1229:  1180:  1170:  1129:  1088:  1080:  927:  849:  841:  790:  750:  525:  509:  496:  483:  470:  457:  444:  132:, but 1370:S2CID 1342:(PDF) 1294:S2CID 1227:S2CID 1086:S2CID 1060:arXiv 1015:(PDF) 1008:(PDF) 847:S2CID 821:arXiv 710:(PDF) 703:(PDF) 583:(PDF) 282:on a 280:types 1493:SPIE 1414:ISSN 1362:ISSN 1323:ISBN 1178:PMID 1127:ISSN 1078:ISSN 981:2013 925:ISBN 880:link 839:ISSN 788:ISBN 748:ISBN 676:2013 626:link 597:link 294:and 1497:doi 1476:doi 1432:- 1406:doi 1354:doi 1315:doi 1286:doi 1219:doi 1168:PMC 1158:doi 1117:doi 1070:doi 985:doi 954:doi 831:doi 780:doi 740:doi 680:doi 649:doi 390:DNA 388:or 384:or 296:PIN 203:by 1693:: 1524:. 1520:. 1472:11 1470:. 1420:. 1412:. 1402:28 1400:. 1396:. 1368:. 1360:. 1350:16 1348:. 1344:. 1321:. 1292:. 1282:43 1280:. 1262:- 1253:- 1225:. 1213:. 1203:, 1176:. 1166:. 1154:10 1152:. 1148:. 1125:. 1113:96 1111:. 1107:. 1084:. 1076:. 1068:. 1056:18 1054:. 1050:. 979:. 975:. 948:. 896:. 876:}} 872:{{ 845:. 837:. 829:. 817:18 815:. 811:. 786:. 774:. 762:^ 746:. 734:. 674:. 670:. 643:. 622:}} 618:{{ 593:}} 589:{{ 427:. 351:. 267:, 263:, 48:. 1562:e 1555:t 1548:v 1534:. 1503:. 1499:: 1482:. 1478:: 1408:: 1376:. 1356:: 1331:. 1317:: 1300:. 1288:: 1233:. 1221:: 1215:5 1184:. 1160:: 1133:. 1119:: 1092:. 1072:: 1062:: 1024:. 993:. 987:: 960:. 956:: 933:. 906:. 882:) 868:. 853:. 833:: 823:: 796:. 782:: 756:. 742:: 719:. 688:. 682:: 655:. 651:: 628:) 614:. 599:) 248:) 242:( 230:) 224:( 219:) 215:( 197:. 168:) 162:( 157:) 153:( 139:. 106:) 100:( 95:) 91:( 81:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
encyclopedic tone
guide to writing better articles
Learn how and when to remove this message
references
inline citations
improve
introducing
Learn how and when to remove this message
original research
improve it
verifying
inline citations
Learn how and when to remove this message
Learn how and when to remove this message
biometric
types
keyboard
authentication
passwords
PIN
telegram
World War II
Morse Code
artificial intelligence (AI)
neural networks
Right-handed
adjacent letter hits

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑