With ever increasing use of computers, internet and online transactions, the need for access control and web security is necessitated. Various methods are used for secure access and online user authentication but most of them are afflicted with some drawbacks. Password/PIN based access control for user authentication is easy to be forged using brute force attack. Similarly, tokens like smart cards used for authentication get lost or easily stolen. So, biometric systems employing both physiological and behavioral modalities have recently gained popularity. The physiological biometrics comprising physical traits such as face, fingerprint, iris, palm-print, speech and hand geometry has gained popularity in recent years. Behavioral biometrics is based on the human physical activity like gait, voice, signature and keystroke dynamics. Keystroke Dynamics depicts a natural typing rhythm captured through keyboard available on most computing systems including hand held devices like mobile/PDAs which possess touch based keyboard. Keystroke Dynamics is a strong behavioral biometrics with many advantages and offers solution to many problems faced with other access control mechanisms. Some of the advantages include: It cannot be copied as it is difficult to copy the human behavior, and it cannot be stolen, forged or lost. As no special device is required, it is a low-cost biometrics solution. Keystroke Dynamics has high user acceptance and can be operated in hidden mode. It can also be used for continuous user authentication while user is working on the system. Moreover, keystroke dynamics based authentication is best suited for online user verification as keystroke features comprise not so large timing vector.
1.1. Literature Survey
The features for keystroke dynamics mainly consist of timing data like time to move from one key to another also known as flight time and time for which a key is pressed also known as dwell time. Different researchers have used different timing features based on the above basic keystroke timings. Some researchers have used Down-Down Time, Up-Up Time, Up-Down and Down-Up Time where Down Time is the time instance when key is pressed and Up Time is the time instance when key is released. Similarly, Press-Press Time (PPTime), Press- Release Time (PRTime), Release-Press Time (RPTime) and Release-Release Time (RRTime) are used. Press Time is the same as Down Time and Release Time is the same as Up Time. In addition to timing features we can also include keystroke pressure, i.e. the pressure applied on the key, as part of keystroke dynamics features   , but this pressure measurement requires a special hardware; hence used scarcely.
The text entry in the form of fixed string predetermined at the initial instance of user interaction with the authentication system for extracting keystroke dynamics is static. Text entry can also be dynamic where user types the free text for continuous authentication of a user. The static entry datasets are publicly available in Killorhy and Maxion  , Giot et al.  , Loy et al.   . The free text databases are:Biochaves by Filho and Freire  and Clarksons University Keystroke Dataset by Vural et al.  .
User’s master profile is created based on keystroke dynamics behavior from username using trajectory dissimilarity technique in  . Master trajectory profile of the user is created by averaging the trajectories of the first 10 input records and used as authentication mechanism in addition to the user’s password. By this method the best results of 4% equal error rate or 96% authentication accuracy are achieved.
Killourhy and Maxion  have collected keystroke data of 51 users with 400 samples for each user and evaluated 14 detectors on the collected data. The error rates and the dataset collected are shared publicly to establish a benchmark for comparison. Hosseinzadeh and Krishnan  have used UUKL (Up-Up Keystroke latency) feature and made a comparison with other keystroke features using GMM based verification system. In this UUKL outperforms commonly used hold time and down-down keystroke latency. The user specific adaptive threshold is based on leave-one-out method (LOOM) that achieves EER of 4.4% on the dataset of 41 users. Çeker and Upadhyaya  have also used GMM with dynamic text of 30 users and obtained Equal Error Rate (EER) of 0.08% with 2 components whereas pure Gaussian gives EER of 1.3% for continuous authentication based system.
Deng and Zhong  have used GMM-UBM (Gaussian Mixture Model with Universal Background Model) and DBN (Deep Belief Networks) wherein the data from background users is employed as imposters’ data during the training phase. The EERs of 0.055 and 0.035 are achieved with GMM-UBM and DBN respectively.
Teh et al.  have proposed a statistical fusion approach using Gaussian Probability Density function and Direction Similarity Measure (DSM) which evaluates the consistency of user’s typing behavior. DSM is the difference in signs between the two consecutive keystrokes in a phrase. By this approach the best EER of 6.36% is obtained with the weighted sum rule on their own dataset.
A hybrid model involving the fusion of Gaussian probability density function (GPDF) and SVM based scores is developed in  . The mean and standard deviation are calculated from the training feature vectors that serve as template during testing. The scores are then calculated using GPDF and SVM and the score-level fusion is applied using four fusion rules. Best results are achieved with the combination of Press-Release and Release-Press time-measurements using the weighted sum rule.
Pisani et al.  have used the enhanced template update which adapts the user model as per the changes in the typing behavior over time. The templates are updated by considering the negative samples, i.e. samples classified as imposters in addition to the genuine samples. The experimental results show better predictive performance in terms of the reduced FMR (False Match Rate) and FNMR (False Non- Match Rate).
Ivannikova et al.  have introduced dependence clustering based approach for user authentication using keystroke dynamics. Cross validation process is designed and artificially generated impostor samples are used to improve the learning process. The best results in terms of EER of 0.077 and ZMFAR of 0.358 are achieved on CMU benchmark dataset due to Dependence Clustering using Manhattan distance.
Sliding windows of different sizes are used in  for template update methods. The double threshold method employs two thresholds: One update threshold to decide if query can be used for reference template update and another verification threshold to decide if a query is accepted or denied. It is shown that user-specific threshold that varies from one session to another because of the update mechanism yields lower error rates than those with the fixed threshold.
The present work is concerned with the generation of information set features using the possibilistic Renyi entropy function from the keystroke dynamics comprising dwell time and flight time. Our previous work  deals with generation of the information set features from the same measurements of keystroke dynamics but uses the Mamta-Hanman entropy function in  .
Though many classifiers falling under statistical methods, neural networks and pattern recognition techniques are in vogue for the authentication of a user using keystroke dynamics, we propose a new fuzzy classifier.
The organization of the paper is as follows: Section 2 gives the derivation for the possibilistic Renyi Entropy function. It also formulates the Information Set features and higher form of these features based on this entropy function. Section 3 develops an algorithm for the Composite Fuzzy classifier based on Composite convex Entropy function. Section 4 describes the databases used in the present work and Section 5 discusses the results of implementation. Section 6 gives the conclusions.
2. Renyi Entropy
To represent the probabilistic uncertainty, we have several entropy functions such as Shannon, Pal and Pal  , Renyi  , and Hanman-Anirban entropy functions  . Of which Hanman-Anirban entropy being an information theoretic entropy function is capable of representing both probabilistic and possibilistic uncertainties. In this work, we would like to investigate the suitability of Renyi entropy function for representing the possibilistic uncertainty because it has one free parameter which we can cash in to meet our objective. The original Renyi Entropy function is given by:
To represent the possibilistic uncertainty, pi is replaced by Ti in (1). This leads to
The unknown parameter in (2) is constant but we take it as a variable in the range (0, 1) and derive in the next section the adaptive Renyi entropy function by relating it to the Hanman-Anirban entropy function  given by
where is the information source value and a, b, c, and d are the parameters in the exponential gain function. These parameters are selected to be statistical parameters such that this gain function becomes the Gaussian function. For this
the choice of parameters is: , , and where is the mean value. Then (3) becomes .
2.1. Adaptive Renyi Function
To bring (2) into the possibilistic domain, let us consider only ith term in the summation and α to be a variable. This leads to
Assuming the membership function value as , we have . The membership function is taken to be Gaussian function
with its statistical parameters, the mean and the variance computed from the keystroke measurements as explained above.
Now replacing this in (4) we have ith component of adaptive Renyi entropy function is:
This r.h.s. of this equation is represented in modus ponen form as: . This in turn allows us to write , which means we can write , though we have taken it as the product.
Replacing in (5), we get one term of the adaptive Renyi entropy function as:
This is different from the entropy function term, derived in our previous work  . Looking at these two terms we notice that and assume opposite roles. When is an information source value, acts as a gain function value. Their roles are interchanged in (6), i.e. the complement membership function acts as the information source value and appears in the gain function. Thus the relations between information source value and the gain function value are shown to be varied and such different forms help us try on different applications. Recall the one term of Pal and Pal entropy function in  , that is and comparing this with (6) we find that only the information value differs. As is a function of involving statistical parameters it will have more flexibility if it is chosen as Gaussian function.
The above is in the form given by
This is an information value in Hanman-Anirban entropy function for , , and replacing by a function of T as . Thus the information source value is a complement membership function and the gain function is exponential. We have shown that one term of Renyi function takes one specific form of the Hanman-Anirban entropy function. From (6) it is easy to form an information set: by varying the index i and the resulting possibilistic Renyi entropy function is:
Let the mean membership be and substituting this in (1) for , we have
The difference is the error incurred in the approximation of Renyi function in the possibilistic domain.
2.2. Some Functions of Adaptive Renyi Entropy Function
1) Complement Renyi Function: By replacing with in Equation (6) we get Complement Renyi function as:
The above can be written as . With the substitution of proper values for the parameters in (2), we get what we call the basic information value . This is proved in     ; so Equation (10) is a variant of this entropy function.
2) Sigmoid Renyi Function: Considering Equation (6) as a unit of information, we will now apply a sigmoid function on it to get:
3) Complement Sigmoid Function: Replacing with in (8), we get:
4) Renyi Entropy Energy: This follows from (8) by multiplying it with .
5) Complement Renyi Energy: By taking complement of , we obtain this as:
6) Renyi Transform: Renyi entropy function is not amenable for conversion to transforms just as Hanman transform. When we put Renyi entropy function into the form of Hanman-Anirban entropy function, it offers us the facility to create transforms. Consider the Hanman-Anirban entropy function in the following form:
where in the original Hanman-Anirban entropy function. But we take to convert into the Renyi entropy function form. Further taking , , and we get the Renyi transform given by:
To introduce non-linearity in the values of we can modify it as a power of α
7) Complement Renyi Transform: Taking complement in place of we get Complement Renyi Transform as:
8) Modified Sigmoid Renyi Function: Applying sigmoid function to Equation (5), we get Modified Sigmoid Renyi Function as:
9) Modified Complement Sigmoid Renyi Function: Taking complement in Equation (19) by replacing with we get the modified complement sigmoid Renyi function as:
2.3. The Two-Component Information Set (TCIS)
In our previous work  we have proposed the use of Two Component Information System (TCIS) features for Keystroke Dynamics and the results were promising. In this approach, the first component I1 represents the temporal information and the membership function is derived from the data that includes all the training feature vectors. The second component I2 represents the spatial information and the membership function is derived using all the features contained in a single sample. When the above two information components are concatenated, Two-Component Information set features are obtained denoted by I. The concatenated features are input to the classifier for authentication.
Algorithm  :
Step 1: Calculate mean and variance of all the training samples.
Step 2: Calculate mean and variance of all the keystroke features in a single training sample.
Step 3: Compute using and and similarly compute using and . Next compute two components, and using and .
Step 4: Concatenate I1 and I2 to form I. Then train any classifier using concatenated I.
Step 5: Compute It1 using and from Step 1 for each test sample.
Step 6: Compute mean and variance of all the features in the test sample. Also compute It2 using and .
Step 7: Concatenate It1 and It2 to obtain It and feed this feature vector to any classifier.
3. Composite Fuzzy Classifier
Design of a Composite Fuzzy Classifier
Before proceeding to the design of a classifier we need the error vector between the training feature vector of lth user corresponding to mth training sample denoted by and the test feature vector . Let the size of the feature vector be n and the number of training feature vectors be s for each user. The error vector is computed from:
As we need a membership in the formulation of a fuzzy classifier, we select an exponential membership function as:
In view of (21), Equation (22) is rewritten as
We now apply Frank t-norm (tF) on a pair of error vectors and to yield the normed error vector denoted by as follows:
In the above, is given by
Similarly, we compute t-norm of a pair of membership functions and called the normed membership function using:
As proved in  that the information value is the product of information source value and the corresponding membership function value. Considering as the information source vector and as the corresponding membership function vector, their product gives the information vector.
Derivation of Composite Entropy Function: For this derivation, we take recourse to Mamta-Hanman entropy function in the form:
By substituting , and we obtain
with . To develop the composite entropy function, we apply logarithmic function on (28) leading to
The composite function is the result of applying logarithmic function on Mamta-Hanman entropy function. That is, we are modifying the entropy value by the logarithmic function. In this case the available information is Mamta- Hanman entropy value which we are modifying by applying logarithmic function. We will be making use of this composite function in the derivation of fuzzy classifier. To this end, an algorithm is outlined here.
Algorithm for the Composite Fuzzy Classifier
1) Find the error vector between the training feature vector and test feature vector for the lth user as:
2) Compute the membership function vectors for the lth user as follows:
3) Compute the normed error vector for the lth user from:
4) Compute the t-norm of a pair of membership functions, for the lth user as follows:
5) Compute using Composite entropy function
6) Repeat Steps 1-4 for all users and if , then the test sample belongs to kth user.
The above Renyi entropy features are applied on the publicly available dataset from CMU.
For the evaluation of the keystroke dynamics based authentication system, we have used the following publicly available dataset:
CMU Keystroke Dynamics Benchmark Dataset 
Data is collected from 51 users in 8 sessions and 50 repetitions of the same password are recorded in each session. So, for each user there are 400 samples. CMU benchmark dataset has keystroke features DD (Down-Down) time, UD (Up-Down) time and H (Hold) time. Each user has typed a 10-character password (“.tie5Roanl”). For the evaluation of Renyi Entropy based features, we have used Hold and Up-Down times. Therefore, we have 21 features which include: 11 Hold Time values for 10 characters and an enter key, 10 Up-Down Time values for latencies between 11 key release and subsequent key press.
Half of the samples for each user (i.e. 200 samples) is used as the training data and the remaining half is used for positive testing. Each user is considered as both genuine and imposter user; thus facilitating 51 × 50 experiments.
For the classification, three classifiers are employed. The first one is Random Forest Classifier in which ensemble of decision trees is generated based on the training data. The second is two-class SVM classifier with a linear kernel. The third is the proposed Composite Fuzzy Classifier inspired from the Hanman Classfier  .
To evaluate the performance of the derived features, error rates, viz., FAR (False Acceptance Rate), FRR (False Rejection Rate), EER (Equal Error Rate) and authentication accuracy are calculated for each of 51 × 50 experiments and reported.
5. Results of Implementation
Table 1 shows Error rates for different features derived above in terms of FAR, FRR, EER and Accuracy on CMU dataset with Random Forest as classifier. The best EER of 0.0152 is obtained with Sigmoid Renyi Function and the best accuracy of 0.9825 is obtained with Energy Renyi Feature.
Some of the features of Table 1 extracted from CMU database are classified using SVM and the results are given in Table 2. Here we get the best EER of 0.0279 with an accuracy of 0.9708 for Sigmoid Renyi Function.
The information set features derived from Renyi Entropy are applied on the Composite Fuzzy Classifier and the results are shown in Table 3. Here we get
Table 1. Comparison of results for different features with Random Forest classifier.
Table 2. Comparison of results for different features with SVM.
Table 3. Comparison of results for different features with Composite Fuzzy Classifier.
the best performance with Adaptive Renyi Function for EER of 0.0144 and an accuracy of 0.9846.
Now we will compare the performance of Composite Fuzzy Classifier with SVM and Random Forest in terms of ROC curves. EER is computed by taking the mean of EERs from 51 × 50 experiments and their ROC curves. So, the comparison of ROC curves is shown for one experiment for the user 20 and imposter 11 of CMU dataset.
ROC curves for the above derived information set features for user number 20 with imposter 11 are shown in Figures 1-10.
In almost all the cases presented above, the proposed composite fuzzy classifier clearly outperforms SVM and Random Forest Classifiers in terms of both error rates and ROC curves.
We have presented an approach for the authentication of users based on keystroke dynamics using the Information set features derived from the adaptive
Figure 1. ROC for user 20 (imposter user 11) of CMU dataset for Adaptive Renyi Function.
Figure 2. ROC for user 20 (with imposter user 11) of CMU dataset for Complement Renyi Function.
Figure 3. ROC for user 20 (with imposter user 11) of CMU dataset for Sigmoid Renyi Function.
Figure 4. ROC for user 20 (imposter user 11) of CMU dataset for Complement Sigmoid Renyi Function.
Figure 5. ROC for user 20 (with imposter user 11) of CMU dataset for Energy Renyi Feature.
Figure 6. ROC for user 20 (with imposter user 11) of CMU dataset for Complement Energy Feature.
Figure 7. ROC for user 20 (with imposter user 11) of CMU dataset for Renyi Transform.
Figure 8. ROC for user 20 (imposter user 11) of CMU dataset for Complement Renyi Transform.
Figure 9. ROC for user 20 (with imposter user 11) of CMU dataset for Modified Sigmoid Renyi Function.
Figure 10. ROC for user 20 (with imposter user 11) of CMU dataset for Modified Complement Sigmoid Renyi Function.
Renyi entropy function by establishing its connection with Hanman-Anirban function. This in turn has paved the way in deriving several features in similar lines with the already existing information set features based on Hanman-Anirban entropy function. The feature vectors of a particular feature type corresponding to samples of each user are arranged in matrix form. Using columns as representing the spatial information component and rows as representing the temporal information, Two-Component information set (TCIS) features are derived. Thus TCIS features for all feature types are obtained.
For the development of composite entropy function the log function is applied on the Mamta-Hanman entropy function in which the product of the T-normed error value and T-normed-membership function value is considered as the information source value. Thus we have made use of the higher form of Mamta- Hanman entropy function. This composite entropy function is converted into a composite fuzzy classifier. Its performance is compared with that of Random forest classifier (Treebagger) and SVM. The best results are obtained with Adaptive Renyi entropy features using Composite fuzzy classifier. The results due to Random Forest and SVM are slightly inferior.
We hope the new features will find applications in different domains.