Detail View

KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Kim, Yooshin -
dc.contributor.author Kwon, Namhyeok -
dc.contributor.author Shin, Donghoon -
dc.date.accessioned 2025-12-24T13:40:10Z -
dc.date.available 2025-12-24T13:40:10Z -
dc.date.created 2025-11-13 -
dc.date.issued 2026-01 -
dc.identifier.issn 0167-4048 -
dc.identifier.uri https://scholar.dgist.ac.kr/handle/20.500.11750/59277 -
dc.description.abstract Personal identification number (PIN) authentication remains prevalent in mobile and IoT systems due to its simplicity, yet it is inherently vulnerable to various attacks such as shoulder surfing, smudge analysis, and brute force attempts. To reinforce its security without compromising usability, we propose KDPrint, a passive authentication framework that transforms keystroke dynamics into graph-based image representations. By applying a hash-based permutation and standardized feature processing, KDPrint captures the temporal and spatial structure of user behavior while mitigating raw data exposure. The resulting images are used with lightweight anomaly detection models, enabling accurate user verification under resource-constrained environments. Experiments involving 50 participants across both laboratory and real-world environments demonstrated that KDPrint maintained robustness under two adversarial scenarios: an EER of 3.3 % when only the PIN was leaked, and an EER of 4.4 % when both the PIN and behavioral characteristics were exposed. These results demonstrate that KDPrint offers a practical and interpretable solution for augmenting PIN authentication in mobile and IoT systems, balancing robustness, efficiency, and user transparency. -
dc.language English -
dc.publisher Elsevier -
dc.title KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization -
dc.type Article -
dc.identifier.doi 10.1016/j.cose.2025.104725 -
dc.identifier.wosid 001610504900001 -
dc.identifier.scopusid 2-s2.0-105020372053 -
dc.identifier.bibliographicCitation Computers and Security, v.160 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Keystroke dynamics -
dc.subject.keywordAuthor Time-series to image -
dc.subject.keywordAuthor Mobile devices -
dc.subject.keywordAuthor Passive authentication -
dc.subject.keywordAuthor Behavioral biometrics -
dc.citation.title Computers and Security -
dc.citation.volume 160 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.relation.journalResearchArea Computer Science -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems -
dc.type.docType Article -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Related Researcher

신동훈
Shin, Donghoon신동훈

Department of Electrical Engineering and Computer Science

read more

Total Views & Downloads