Review Article

A Survey of Keystroke Dynamics Biometrics

Table 1

Overview of different authentication approaches.

ApproachAdvantageDisadvantageExample

KnowledgeEffortless
High acceptance
Forgotten
Shoulder spoofing
Password
PIN

TokenCheap
Simple deployment
Lost and theftSmart card
Minidevices

BiometricsDeter sharing
Unique
Unforgettable
Cost
Invasive
Fingerprint
Voice
Keystroke