WEB OF SCIENCE
SCOPUS
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Yooshin | - |
| dc.contributor.author | Kwon, Namhyeok | - |
| dc.contributor.author | Shin, Donghoon | - |
| dc.date.accessioned | 2025-12-24T13:40:10Z | - |
| dc.date.available | 2025-12-24T13:40:10Z | - |
| dc.date.created | 2025-11-13 | - |
| dc.date.issued | 2026-01 | - |
| dc.identifier.issn | 0167-4048 | - |
| dc.identifier.uri | https://scholar.dgist.ac.kr/handle/20.500.11750/59277 | - |
| dc.description.abstract | Personal identification number (PIN) authentication remains prevalent in mobile and IoT systems due to its simplicity, yet it is inherently vulnerable to various attacks such as shoulder surfing, smudge analysis, and brute force attempts. To reinforce its security without compromising usability, we propose KDPrint, a passive authentication framework that transforms keystroke dynamics into graph-based image representations. By applying a hash-based permutation and standardized feature processing, KDPrint captures the temporal and spatial structure of user behavior while mitigating raw data exposure. The resulting images are used with lightweight anomaly detection models, enabling accurate user verification under resource-constrained environments. Experiments involving 50 participants across both laboratory and real-world environments demonstrated that KDPrint maintained robustness under two adversarial scenarios: an EER of 3.3 % when only the PIN was leaked, and an EER of 4.4 % when both the PIN and behavioral characteristics were exposed. These results demonstrate that KDPrint offers a practical and interpretable solution for augmenting PIN authentication in mobile and IoT systems, balancing robustness, efficiency, and user transparency. | - |
| dc.language | English | - |
| dc.publisher | Elsevier | - |
| dc.title | KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1016/j.cose.2025.104725 | - |
| dc.identifier.wosid | 001610504900001 | - |
| dc.identifier.scopusid | 2-s2.0-105020372053 | - |
| dc.identifier.bibliographicCitation | Computers and Security, v.160 | - |
| dc.description.isOpenAccess | FALSE | - |
| dc.subject.keywordAuthor | Keystroke dynamics | - |
| dc.subject.keywordAuthor | Time-series to image | - |
| dc.subject.keywordAuthor | Mobile devices | - |
| dc.subject.keywordAuthor | Passive authentication | - |
| dc.subject.keywordAuthor | Behavioral biometrics | - |
| dc.citation.title | Computers and Security | - |
| dc.citation.volume | 160 | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.type.docType | Article | - |
Department of Electrical Engineering and Computer Science