{"id":"https://openalex.org/W1966013184","doi":"https://doi.org/10.1109/icb.2013.6613015","title":"Biometric authentication via keystroke sound","display_name":"Biometric authentication via keystroke sound","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W1966013184","doi":"https://doi.org/10.1109/icb.2013.6613015","mag":"1966013184"},"language":"en","primary_location":{"id":"doi:10.1109/icb.2013.6613015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icb.2013.6613015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Biometrics (ICB)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041852716","display_name":"Joseph Roth","orcid":null},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joseph Roth","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409052","display_name":"Xiaoming Liu","orcid":"https://orcid.org/0000-0003-3215-8753"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoming Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061834795","display_name":"Arun Ross","orcid":"https://orcid.org/0000-0001-8850-3013"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arun Ross","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA#TAB#","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064437234","display_name":"Dimitris Metaxas","orcid":"https://orcid.org/0000-0001-7142-7640"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dimitris Metaxas","raw_affiliation_strings":["Department of Computer Science, Rutgers University, Piscataway, NJ, USA","Department of Computer Science Rutgers University  Piscataway NJ USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Department of Computer Science Rutgers University  Piscataway NJ USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041852716"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":12.5333,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.98218752,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13289","display_name":"Infant Health and Development","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/3611","display_name":"Pharmacy"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.9275590181350708},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8229854702949524},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7975815534591675},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7152542471885681},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.615729570388794},{"id":"https://openalex.org/keywords/modality","display_name":"Modality (human\u2013computer interaction)","score":0.5597199201583862},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.40166330337524414},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3861285150051117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37854501605033875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29641038179397583},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.26568806171417236}],"concepts":[{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.9275590181350708},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8229854702949524},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7975815534591675},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7152542471885681},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.615729570388794},{"id":"https://openalex.org/C2780226545","wikidata":"https://www.wikidata.org/wiki/Q6888030","display_name":"Modality (human\u2013computer interaction)","level":2,"score":0.5597199201583862},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.40166330337524414},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3861285150051117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37854501605033875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29641038179397583},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.26568806171417236},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icb.2013.6613015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icb.2013.6613015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Biometrics (ICB)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.431.601","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.601","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.msu.edu/~rossarun/pubs/RothKeystrokeSound_ICB2013.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.707.1720","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.707.1720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.msu.edu/%7Erothjos1/papers/2013ICB_Roth_Liu_Ross_Metaxas.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1682084018","https://openalex.org/W1981157808","https://openalex.org/W2065394208","https://openalex.org/W2066453892","https://openalex.org/W2072619486","https://openalex.org/W2083358597","https://openalex.org/W2099668761","https://openalex.org/W2107589078","https://openalex.org/W2107661464","https://openalex.org/W2116679772","https://openalex.org/W2128025167","https://openalex.org/W2129841138","https://openalex.org/W2131877534","https://openalex.org/W2131976234","https://openalex.org/W2132123667","https://openalex.org/W2136928336","https://openalex.org/W2140959843","https://openalex.org/W2141605726","https://openalex.org/W2142896541","https://openalex.org/W2148154194","https://openalex.org/W2158176328","https://openalex.org/W6637200004","https://openalex.org/W6643242635"],"related_works":["https://openalex.org/W3185561589","https://openalex.org/W1917645424","https://openalex.org/W2155670618","https://openalex.org/W1966864883","https://openalex.org/W1563893514","https://openalex.org/W274642192","https://openalex.org/W4283259439","https://openalex.org/W2095735921","https://openalex.org/W2545016324","https://openalex.org/W2982224826"],"abstract_inverted_index":{"Unlike":[0],"conventional":[1],"\u201cone":[2],"shot\u201d":[3],"biometric":[4,69,192],"authentication":[5,8,23,55,162],"schemes,":[6],"continuous":[7,54],"has":[9],"a":[10,29,64,81,93,96,113,160,166,176],"number":[11],"of":[12,28,59,104,127,148,171,190],"advantages,":[13],"such":[14,43],"as":[15,44,130,132,186,188],"longer":[16],"time":[17],"for":[18],"sensing,":[19],"ability":[20],"to":[21,138,158],"rectify":[22],"decisions,":[24],"and":[25,47,67,89,95,155],"persistent":[26],"verification":[27],"user's":[30],"identity,":[31],"which":[32,121],"are":[33,136,146,156],"critical":[34],"in":[35,53,107],"applications":[36],"demanding":[37],"enhanced":[38],"security.":[39],"However;":[40],"traditional":[41],"modalities":[42],"face,":[45],"fingerprint":[46],"keystroke":[48,73,77,109,117,168],"dynamics,":[49,110],"have":[50],"various":[51],"drawbacks":[52],"scenarios.":[56],"In":[57],"light":[58],"this,":[60],"this":[61,191],"paper":[62],"proposes":[63],"novel":[65],"nonintrusive":[66],"privacy-aware":[68],"modality":[70],"that":[71],"utilizes":[72],"sound.":[74],"Given":[75],"the":[76,102,122,149,184],"sound":[78,98,118,153,169],"recorded":[79],"by":[80,101],"low-cost":[82],"microphone,":[83],"our":[84],"system":[85],"extracts":[86],"discriminative":[87],"features":[88,135],"performs":[90],"matching":[91],"between":[92,151],"gallery":[94],"probe":[97],"stream.":[99],"Motivated":[100],"concept":[103],"digraphs":[105],"used":[106,137],"modeling":[108],"we":[111],"learn":[112],"virtual":[114,128],"alphabet":[115],"from":[116,120],"segments,":[119],"digraph":[123],"latency":[124],"within":[125],"pairs":[126],"letters":[129],"well":[131,187],"other":[133],"statistical":[134],"generate":[139],"match":[140],"scores.":[141],"The":[142],"resultant":[143],"multiple":[144],"scores":[145],"indicative":[147],"similarities":[150],"two":[152],"streams,":[154],"fused":[157],"make":[159],"final":[161],"decision.":[163],"We":[164],"collect":[165],"first-of-its-kind":[167],"database":[170],"45":[172],"subjects":[173],"typing":[174],"on":[175,179],"keyboard.":[177],"Experiments":[178],"static":[180],"text-based":[181],"authentication,":[182],"demonstrate":[183],"potential":[185],"limitations":[189],"modality.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
