Biometric Cryptosystem based on Keystroke Dynamics and K-medoids. Alarcon-Aquino, V., Ramirez-Cortes, J., Starostenko, O., Garcia-Baleon, H., & Gomez-Gil, P. IETE Journal of Research, 57(4):385, 2011.
Biometric Cryptosystem based on Keystroke Dynamics and K-medoids [link]Website  doi  abstract   bibtex   
An approach for a biometric cryptosystem based on keystroke dynamics and the k-medoids algorithm is proposed. The stages that comprise the approach are training enrollment and user verification. The proposed approach is able to verify the identity of individuals offline avoiding the use of a centralized database. The approach as reported in this paper may be implemented in stand-alone terminals or embedded in password-based systems to increase the security. The performance of the proposed approach is assessed using 20 samples of keystroke dynamics from 20 different users. Simulation results show a false acceptance rate of 2.89% and a false rejection rate of 3.35%. The cryptographic key released by the proposed architecture may be used in several potential applications such as user login, file encryption or even portable authentication to gain access to virtual private networks. 2011 by the IETE.
@article{
 title = {Biometric Cryptosystem based on Keystroke Dynamics and K-medoids},
 type = {article},
 year = {2011},
 keywords = {Biometrics,Cryptography,K-medoids,Keystroke dynamics,Minkowski distance},
 pages = {385},
 volume = {57},
 websites = {http://www.jr.ietejournals.org/text.asp?2011/57/4/385/86341},
 id = {004d83a5-1314-3567-b226-84e3a8133e99},
 created = {2022-08-29T17:43:01.255Z},
 file_attached = {false},
 profile_id = {940dd160-7d67-3a5f-b9f8-935da0571367},
 group_id = {92fccab2-8d44-33bc-b301-7b94bb18523c},
 last_modified = {2022-08-29T17:43:01.255Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 private_publication = {false},
 abstract = {An approach for a biometric cryptosystem based on keystroke dynamics and the k-medoids algorithm is proposed. The stages that comprise the approach are training enrollment and user verification. The proposed approach is able to verify the identity of individuals offline avoiding the use of a centralized database. The approach as reported in this paper may be implemented in stand-alone terminals or embedded in password-based systems to increase the security. The performance of the proposed approach is assessed using 20 samples of keystroke dynamics from 20 different users. Simulation results show a false acceptance rate of 2.89% and a false rejection rate of 3.35%. The cryptographic key released by the proposed architecture may be used in several potential applications such as user login, file encryption or even portable authentication to gain access to virtual private networks. 2011 by the IETE.},
 bibtype = {article},
 author = {Alarcon-Aquino, Vicente and Ramirez-Cortes, JuanManuel and Starostenko, Oleg and Garcia-Baleon, HectorAugusto and Gomez-Gil, Pilar},
 doi = {10.4103/0377-2063.86341},
 journal = {IETE Journal of Research},
 number = {4}
}

Downloads: 0