Enhanced-TypeNet for Biometric Keystroke Authentication Using Key Embedding
Received: 13 April 2025 | Revised: 20 May 2025 | Accepted: 6 June 2025 | Online: 2 August 2025
Corresponding author: Mahmoud Bahaa
Abstract
Deep learning models have demonstrated significant success across various domains, including authentication tasks such as biometric authentication using keystrokes. This paper introduces an advanced model, named Enhanced-TypeNet, based on Long Short-Term Memory (LSTM) with an embedding layer. This model exhibited exceptional performance in large-scale free-text scenarios. Enhanced-TypeNet is an improved version of the original TypeNet model, which had already achieved state-of-the-art results. Model training employed two distinct learning approaches, distinguished by their loss functions: softmax and triplet loss. Building on this foundation, Enhanced-TypeNet shows notable improvements, especially in scenarios with limited enrollment sequences. In the most challenging scenario, involving only one enrollment sequence, the proposed model demonstrates significant improvements in the Equal Error Rate (EER) of 8% and 2% for softmax and triplet loss, respectively, on physical devices compared to the original model. On touchscreen devices, the model achieves even greater enhancements, with EER improvements of approximately 10% and 9% for softmax and triplet loss, respectively. These findings highlight the efficacy of Enhanced-TypeNet across diverse authentication scenarios, emphasizing its potential for real-world applications.
Keywords:
DL, LSTM, embedding, biometric authentication, keystroke authenticationDownloads
References
S. P. Banerjee and D. Woodard, "Biometric Authentication and Identification Using Keystroke Dynamics: A Survey," Journal of Pattern Recognition Research, vol. 7, no. 1, pp. 116–139, 2012. DOI: https://doi.org/10.13176/11.427
A. Kolakowska, "A review of emotion recognition methods based on keystroke dynamics and mouse movements," in 2013 6th International Conference on Human System Interactions (HSI), Sopot, Poland, Jun. 2013, pp. 548–555. DOI: https://doi.org/10.1109/HSI.2013.6577879
D. Buschek, A. De Luca, and F. Alt, "Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices," in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul Republic of Korea, Apr. 2015, pp. 1393–1402. DOI: https://doi.org/10.1145/2702123.2702252
J. Hernandez-Ortega, R. Daza, A. Morales, J. Fierrez, and J. Ortega-Garcia, "edBB: Biometrics and Behavior for Assessing Remote Education." arXiv, Dec. 10, 2019.
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia, "Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database," PLOS ONE, vol. 12, no. 5, May 2017, Art. no. e0176792. DOI: https://doi.org/10.1371/journal.pone.0176792
S. F. N. Sadikan, A. A. Ramli, and M. F. Md. Fudzee, "A survey paper on keystroke dynamics authentication for current applications," presented at the Advances in Electrical Engineering and Electronic Engineering From Theory to Applications (Series 2): Proceedings of the International Conference of Electrical and Electronic Engineering (ICon3E 2019), Putrajaya, Malaysia, 2019, Art. no. 020010. DOI: https://doi.org/10.1063/1.5133925
S. Minaee, A. Abdolrashidi, H. Su, M. Bennamoun, and D. Zhang, "Biometrics recognition using deep learning: a survey," Artificial Intelligence Review, vol. 56, no. 8, pp. 8647–8695, Aug. 2023. DOI: https://doi.org/10.1007/s10462-022-10237-x
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia, "DeepSign: Deep On-Line Signature Verification," IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 2, pp. 229–239, Apr. 2021. DOI: https://doi.org/10.1109/TBIOM.2021.3054533
A. Maalej and I. Kallel, "Does Keystroke Dynamics tell us about Emotions? A Systematic Literature Review and Dataset Construction," in 2020 16th International Conference on Intelligent Environments (IE), Madrid, Spain, Jul. 2020, pp. 60–67. DOI: https://doi.org/10.1109/IE49459.2020.9155004
J. Kim and P. Kang, "Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features," Pattern Recognition, vol. 108, Dec. 2020, Art. no. 107556. DOI: https://doi.org/10.1016/j.patcog.2020.107556
P. Maharjan et al., "Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence," Advanced Science, vol. 8, no. 15, Aug. 2021, Art. no. 2100711. DOI: https://doi.org/10.1002/advs.202100711
B. S. Saini et al., "A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics," IEEE Access, vol. 8, pp. 125909–125922, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3008019
G. Stragapede, P. Delgado-Santos, R. Tolosana, R. Vera-Rodriguez, R. Guest, and A. Morales, "Mobile Keystroke Biometrics Using Transformers," in 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), Waikoloa Beach, HI, USA, Jan. 2023, pp. 1–6. DOI: https://doi.org/10.1109/FG57933.2023.10042710
L. Xiaofeng, Z. Shengfei, and Y. Shengwei, "Continuous authentication by free-text keystroke based on CNN plus RNN," Procedia Computer Science, vol. 147, pp. 314–318, 2019. DOI: https://doi.org/10.1016/j.procs.2019.01.270
J. V. Monaco and C. C. Tappert, "The partially observable hidden Markov model and its application to keystroke dynamics," Pattern Recognition, vol. 76, pp. 449–462, Apr. 2018. DOI: https://doi.org/10.1016/j.patcog.2017.11.021
A. O. Aljahdali, F. Thabit, H. Aldissi, and W. Nagro, "Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10906–10915, Jun. 2023. DOI: https://doi.org/10.48084/etasr.5841
A. Acien, A. Morales, J. V. Monaco, R. Vera-Rodriguez, and J. Fierrez, "TypeNet: Deep Learning Keystroke Biometrics," IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 4, no. 1, pp. 57–70, Jan. 2022. DOI: https://doi.org/10.1109/TBIOM.2021.3112540
V. Dhakal, A. M. Feit, P. O. Kristensson, and A. Oulasvirta, "Observations on Typing from 136 Million Keystrokes," in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal, Canada, Apr. 2018, pp. 1–12. DOI: https://doi.org/10.1145/3173574.3174220
K. Palin, A. M. Feit, S. Kim, P. O. Kristensson, and A. Oulasvirta, "How do People Type on Mobile Devices?: Observations from a Study with 37,000 Volunteers," in Proceedings of the 21st International Conference on Human-Computer Interaction with Mobile Devices and Services, Taipei Taiwan, Oct. 2019, pp. 1–12. DOI: https://doi.org/10.1145/3338286.3340120
A. Wahab, D. Hou, S. Schuckers, and A. Barbir, "Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism:," in Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021, pp. 33–42. DOI: https://doi.org/10.5220/0010191200330042
I. Loshchilov and F. Hutter, "Decoupled Weight Decay Regularization." arXiv, Jan. 04, 2019.
A. Morales, J. Fierrez, and J. Ortega-Garcia, "Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics," in Computer Vision - ECCV 2014 Workshops, vol. 8926, L. Agapito, M. M. Bronstein, and C. Rother, Eds. Springer International Publishing, 2015, pp. 711–724. DOI: https://doi.org/10.1007/978-3-319-16181-5_54
J. Huang, D. Hou, S. Schuckers, and Z. Hou, "Effect of data size on performance of free-text keystroke authentication," in IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015), Hong Kong, Mar. 2015, pp. 1–7. DOI: https://doi.org/10.1109/ISBA.2015.7126361
Downloads
How to Cite
License
Copyright (c) 2025 Mahmoud Bahaa, Fahad A. Aloufi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
