key: cord-0788579-g1mzriay authors: Thomas, Princy Ann; Preetha Mathew, K. title: A broad review on non-intrusive active user authentication in biometrics date: 2021-06-04 journal: J Ambient Intell Humaniz Comput DOI: 10.1007/s12652-021-03301-x sha: 66ac6c4ef99098ab6c4474395c24e688e84205ee doc_id: 788579 cord_uid: g1mzriay Authentication is the process of keeping the user’s personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is employed to verify the own users by some authentication methods like biometrics, voice recognition, and so on. Traditionally, a one-time login based credential verification method was utilized for user authentication. Recently, several new approaches were proposed to enhance the user authentication framework but those approaches have been found inconsistent during the authentication execution process. Hence, the main motive of this review article is to analyze the advantage and disadvantages of authentication systems such as voice recognition, keystroke, and mouse dynamics. These authentication models are evaluated in a continuous non-user authentication environment and their results have been presented in way of tabular and graphical representation. Also, the common merits and demerits of the discussed authentication systems are broadly explained discussion section. Henceforth, this study will help the researchers to adopt the best suitable method at each stage to build an authentication framework for non-intrusive active authentication. In the present decade, the uses of digital devices have been tremendously increased in common places (Kuppusamy 2019) . Also, it is hard to find anyone who does not use a computer, a laptop, or an android phone (Teh et al. 2019 ). All of these devices are internet-enabled and providing web access round for regular users (Vittori 2019) . In addition, the banking sector is an area that faces numerous challenges (Partila et al. 2020) in the security field like payment authorization and identity verification (Shirvanian et al. 2019) . Hence, the primary steps in bank applications are developing the privacy module for user verification (Dobbie 2020 ). This allows the user to be relatively confident, so that an intruder is not allowed without checking access of each account (Messerman et al. 2011) . Some of the traditional authentication systems are signature verification, identity card verification (Clarke et al. 2009 ), and photographic evidence for verification. Also, authentication documents like passports o visas, and so on (Furnell et al. 2008 ). There are three types of authentications that are presently in use (Cao et al. 2020) . First is a statement given by a person or some trusted authority with personal contact. Here, the person or object able to test the authenticity of the object that is being verified (Clarke et al. 2002) . Second is a comparison of similar attributes of the authenticated object, which is previously known to be true of that object (Alshehri et al. 2017) . The third type allows for using documents such as trademarks or certifications that are issued by a trusted authenticating authority. The second type is useful only if the forgery of the attributes is not easily accomplished (Bernabe et al. 2020) . In computer security, user authentication is meant to prove that the user is the one who he claims to be (Zheng et al. 2014) . The logon method is a type 1 authentication factor that tests something the user knows (Saevanee et al. 2015) . Moreover, remembering the complex pass-phrases is difficult for computer users, so that an identify management system was introduced to retrieve the required content of each user (Sinigaglia et al. 2020) . But in some cases, the phrase retrieving model based on the management system is vulnerable to malicious activities (Rodwell et al. 2007 ). Furthermore, a token like a debit card is type 2 authentication factor, which indicates, what a user has to be. Biometrics like iris scanner or voice recognition is categorized as type 3 authentication factor that represents user status. On the other hand, a verification system based on speaker voice is an advanced technique in biometrics fields (Clarke and Furnell 2007) . Here, the verification module has functioned on the basis of voice features, the features include, sound and pronunciation of each individual. Also, unimodal-based continuous authentication frames rely on single information sources such as face profiling, touch gesture, and so on (Kim et al. 2007 ). In today's digital life scenario, the authentication based on biometric system is widely reliable because the usual authentication system like password (Lee and Yim 2020) , security codes, key sensors, etc., are high expensive in cost and need more resources to process the function. To minimize the work complexity the system known as biometrics is organized (Jagadeesan and Hsiao 2009) . To reduce the execution time of authentication system the most people can prefer the login process (Jorgensen and Yu 2011) . But in this logion process, several limitations are listed as impractical verification times, uncontrolled environment variables, and authentication for remote access. To end these issues, the smart authentication frame is introduced like keystroke, mouse dynamics, voice recognition, and so on. In keystroke authentication process, the user is authenticated through the typing style. In mouse-based authentication, users are authenticated via mouse action. Also, a voice authentication system is executed based on user voice (Zheng et al. 2011) . Nowadays, humans' lifestyles and needs are digitalized so securing the privacy information is a significant task. Moreover, the user would switch on his/her computer and start using the device for their normal work (Shirvanian et al. 2019 ). The security software should be confirmed that he/she are the authenticated users have the access token to access the system. This kind of system would be considered as non-intrusive user authentication system. Also to make the smart verification model, keystrokes, voice biometric, and mouse dynamics are discussed in this review article. Here, the mouse dynamics paradigm is functioned based on recording the mouse actions and keystroke dynamics are functioned based on typing style of each individual. Subsequently, the function parameters of mouse dynamics, voice biometrics, and keystroke dynamics are analysed and comparison assessment is made in tabular and graphical representation. Nonintrusive behavioural biometrics was utilized to provide security for the stored data in the computer system. It attempts to study the normal behaviour of authentic users on a system and then to identify abnormal behaviour from the normal behavioural pattern (Fourati et al. 2020) . Behavioural biometrics capture the characteristic patterns of the user's input, navigation through interfaces, and regular use patterns on both input devices as well as applications to create a virtual fingerprint of authentic user behaviour (Lang and Haar 2020) . Hence, the behavioural biometrics has been provided a wide range of merits over conventional biometric strategies (Kaur and Khanna 2020) . In addition, the gathered behavioural data no need any specific hardware architecture. So it has diminished the cost complexity (Ferrag et al. 2020) . The different types of behavioural biometric systems are normally characterized as voice identification, signature authentication, mouse dynamics, keystroke dynamics, swipe patterns, graphical confirmation system, gait recognition, emotion recognition, lip movement detection, biometric, and bio-signals (Patro et al. 2020 ). These parameters are proficiently utilized in Electrocardiogram (ECG) (Kim et al. 2019) and Electroencephalogram (EEG) (Bidgoly et al. 2020) . The most recent research in each of these types has emphasized and shown greater potential for non-intrusive and continuous or active user authentication. The wide degree-based reliable security in biometric technology can obtain a huge rate of potential measure to verify each user. Moreover, behavioural biometrics is functioned based on the body actions of each individual. Hence, the body actions include fingerprint, lip movement, voice, and eye movement. Biometric authentication has many important applications especially in light of the current Covid-19 crisis like e-learning (Baró et al. 2020) , digital banking, remote device access in IoT, and many more. Voice biometric recognition leverages the unique features of the human voice to identify and authenticate an own user as shown in Fig. 1 . The voice recognition system has a training phase and a recognition phase. During training, the system learns the characteristic traits of the user are enrolled. Later in the recognition phase, the system simply captures the user voice features and the audio recognition system compares it with the enrolled voice metrics. If a match occurs then the user is authenticated, else user is rejected by the verification system. Here, the chief significant score of voice-based biometric system is the speech by user is not recorded only it recognizes the sound to make the verification. The form of sound is produced based on the amount of air stream and obstructions in the way of airstreams like tongue, gums, and lips. Thus the high standard authentication strategy is appropriate for high-risk and security systems. Relatively, some applications need text analysis, because in some cases it is too difficult to beat an excellent profitable speaker authentication system by recording. Moreover, the input signal of voice is collected from telephone or microphone. Here, the telephone and microphone were placed very close to the mouth, thus the voice was differed based on each user. From the literature, it is concluded that voice biometric recognition normally operates in three ways namely textdependent speaker confirmation, text prompted speaker authentication, and text-independent speaker verification. Moreover, the merits and limitations of voice biometrics are shown in Table 1 . Almaadeed et al. (2012) has discussed the speaker identification system that uses multimodal neural networks and wavelet analysis to authenticate the users. This system is a text-independent recognition system that uses a voting scheme for decision-making. Hence, the design improves the classical Mel-frequency Cepstral Coefficients (MFCC) as 15%, Equal Error Rate (EER) as 5%, accuracy 84 to 99%, and identification time as 40%. Moreover, the obtained results clearly revealed the performance of authentication process with the support of extracted features. The downside is that computational time is directly proportional to the number of features. Devising effective techniques to select features with the highest relevance would alleviate this problem to a certain extent. The joint speaker verification design was discussed by Sizov et al. (2015) ; it is another text-independent system that combines narrator verification and anti-spoofing by using an i-vector strategy for speaker modelling. The proficient score of the developed strategy is proven by incorporating the possible attacks. Hence, the designed model has gained EER as 0.81% and 0.54% FAR for female voice. Moreover, this strategy has represented the speech by a high dimension vector incorporating background information to enhance the recognition system. The limitation behind in this model is the proposed replica is only developed for female voice datasets. The computation complexity of i-vector methods can be reduced using dimensionality reduction (Medikonda et al. 2020) . Even it has only achieved 15-30% accuracy under various simulated noisy conditions. Moreover, features extracted on different MFCC derivatives based on time series are analysed to improve the accuracy up to 98% using a Gaussian Mixture Model (GMM) for classification (Rakshit 2020). All of the above text-independent verification methods are usable with the non-intrusive active authentication process that satisfied user needs in the normal course of work. Voice recognition systems are widely used in a part of access control systems for security. In addition, an access control system based on the EN 50133-1:1996 European standard (Galka et al. 2014 ) contains a voice authentication module that basically depends on text passwords. The system has utilized a modified background scheme called Gaussian Mixture and Hidden Markov Model for authentication process. Therefore, the proposed model has attained an EER rate of 3.4%. Navarro et al. (2015) has presented another interesting work on voice verification system. Here, the system hardware is enhanced with a vector floatingpoint unit in the microprocessor that increased the vector floating-point operation rapidity in the speaker verification algorithms. The modified architecture has yielded an EER of 7% under ideal conditions and yields 15% to 17% in adverse conditions. The downside of this method is in real-time environment the hardware needs modification to make the best results (Lin et al. 2013) . Voice biometric identification and authentication have been applied in many important applications especially user authentication on smart devices (Teh et al. 2019) . Here, lip movement and voice authentication can work effectively even in noisy environments by using the already available device sensors (Vittori 2019) . Intelligent voice bots [8] are a useful and cost-effective way to assure remote user authorization in digital banking (Partila et al. 2020) . Moreover, voice has been combined with other biometric modalities to improve performance like EEG (Moreno-Rodriguez and Ramirez-Cortes 2020) with 90% accuracy. Also, other features are recorded that are swipe gestures, facial images with voice (Gupta et al. 2020) . In several cases, the voice authentication model is designed using Gaussian membership with fuzzy vectors. Hence, the obtained exactness rate using this scheme is 95.45% (Abdul-Hassan and Hadi 2020). Voice has also been investigated with voice mimicry attack ) and found to be vulnerable. Voice biometric security is normally tested against general datasets with less percentage of similar signature imposter data (Shirvanian et al. 2019; Sholokhov et al. 2020) . The testing of ASV systems needs to incorporate the closest imposter model framework for more accurate results (Lakshmi et al. 2020) with the use of chaotic maps. The keystroke dynamics paradigm is the study of keying rhythm of a user. Several studies have shown that experienced users have a specific typing pattern (Verwey 2019) that does not change much even with deliberate external stimuli. Hence, this makes the keystroke dynamics as very good candidate for a biometric signature. There is several comprehensive review works conducted on keystroke dynamics (Ali et al. 2017) . Moreover, the keystroke process mostly depends on the timing of key presses and releases. The behaviour of keystroke for users may change depending on the layout of the keyboard (Rude 2019) and behavioural pattern of the user. So, it is seen that many of the distinctive behavioural patterns persist across different devices (Lipke-Perry et al. 2019) like a pianist who may have a distinct feel for a familiar instrument. In addition, the keystroke dynamics are divided into fixed text or static text analysis and free text or dynamic text analysis. If there are different authentication processes then static approaches are utilized. Here, free text analysis of keystroke information was discussed, which allows continuous Here, the developed model has utilized the coefficients of mel-frequency to process the audio signal. Finally, the developed strategy has gained accuracy as 98.2% If the dataset is complex then the developed frame model has gained high error rate and this leads to fall in accuracy rate Moreover, the key reason for achieving high error percentage is in this model the coefficients of linear function is not defined Sizov et al. (2015) Backend scheme It has gained the finest accuracy rate with short duration The chief limitation behind in this model is similar voice features were trained to verify the own users. Thus, the proposed system is not applicable in miss-match model The proposed scheme is evaluated under three diverse datasets and has diminished computational complexity and simulation time But in some cases, it lacks in security because of high noise signal Gałka et al. (2014) Embedded scheme Here, the experimental works are done to validate the system reliability and function rate However, the voice recognition model using micro processer paradigm is quite complicated task because of its memory size and processor components Navarro et al. (2015) Microprocessor-MicroBlaze in FPGA The scheme required less period for voice recognition In some circumstances, the gadget architecture needs some modifications and updates to perform voice verification system process. So, the FPGA frame needs more memory spaces to execute the function or periodic authentication of a user. To incorporate varying behaviour of users over time, different machine learning approaches were studied to contribute the verification objective. As in voice and keystroke dynamics, several security threats were raised that tends to gain very less accuracy (Belman et al. 2020). One of the pioneering works in the area of free script analysis was projected by Gunetti and Picardi (2005) . The projected strategy has analyzed free text for authentication purposes using a custom interface in which the user is to type any text about 700-900 words. The typing rhythm is studied based on timing information of individual keystrokes and n-graph comparison of consecutive text entries. The process of keystroke function is elaborated in Fig. 2 . The setup shows that the capture of keystroke data on a number pad is utilized to train the system. Once the training phase is complete the system is tested, where once again user keystroke dynamics is captured and matched against the user keystroke profile, which is stored during the training phase. If the user is authenticated then a prompt to type in a password is given. Another statistic method based on mutual feature vectors is used for authentication which was proposed by Wang et al. (2012) . During the training phase, keystroke features of the authentic user are periodically generated and the events are stored in the database. Hereafter, while authenticating the keystroke of current users, previously saved feature vectors and distortion were calculated. Here experiments were conducted based on many passwords typed by the user. This work concentrates on short fixed texts, but the possibility of change in user behaviour with time is not taken into the consideration. Chang et al. (2013) presented the hypothesize model, which states that the pause time intervals between different characters typing on the keyboard are caused since the user is unable to comprehend the spelling, unfamiliar words, and so on. Besides, the cognitive factor is unique for an individual. So, diverse ML is possible to apply in the authenticated system to verify the own users. Subsequently, by the analysis, the best results were reported for SVM as 0.055% FAR and 0.007% FRR. The set of experiments were conducted only on simulated environments thus its translation into real-time authentication is not clear. Moreover, the time required to train the system is not discussed. To overcome the problem of biometric permanence in biometric systems Pisani et al. (2015) proposed a timing phase system using keystroke dynamics authentication. Here the effect of change in a biometric signature over time is studied. Moreover, to estimate the time some adaptive biometric systems were utilized, which are usually worn to reduce intra-class variability with oneclass classification algorithms. Another interesting work on keystroke information by Kang and Cho (2015) made the important observation that current methods need to be customized for keyboards other than the traditional PC keyboard. Also, from the implementation, it is verified that authentication accuracy varies with the length of reference and test keystroke. There are several application areas for this particular biometric method namely intrusion detection, which provides the solution for lost or forgotten password problems (Gunetti and Picardi 2005) in smartphones and other mobile devices (Gupta et al. 2020; Ali et al. 2019 ). Keystroke dynamics have been used in the area of identifying user attitudes (Antal and Egyed-Zsigmond 2019) and confirming user demographics like age to prevent various cybercrimes. Finally, keystroke verification is less suitable for web-based applications since the mouse is used more frequently in this environment (Feher et al. 2012) . The summary of keystroke dynamics revealed that in all biometric systems hacking and loss of privacy could be at risk when a system is compromised. Keylogging is another disadvantage of this system, which can be alleviated using cryptography. The method is also vulnerable to replay attacks and spoofing. There is very little research in the area of security of keystroke dynamics. Keeping the captured data secure is the one-way solution for most issues and it needs to be studied in future. Mouse dynamics are similar to keystroke dynamics, the difference is that here the mouse movements and actions are used to regulate whether a user is reliable or not. Typically, mouse movements, gestures, clicks, and their timing information are collected in authentication systems based on mouse dynamics (Antal and Egyed-Zsigmond 2019) . Just as in keystroke dynamics, the method has been used for both static authentication and active authentication with varied results. In static authentication, the mouse movement for a fixed task is collected during the training phase and a profile for the authentic user is created based on this fixed task. In the testing stage, the user once again performs the same task and the authentication system determines whether the user is authentic or an imposter. In an active user authentication, (Yıldırım and Anarım 2019) the task is not fixed and the scheme tries to authenticate the operator of a particular arrangement when he/she may be doing different tasks. Hence, the advantages and disadvantages of mouse dynamics are detailed in Table 2 . The training phase in this case would allow normal working without any restriction on the type of task or with limited restrictions. Consequently, during the testing phase, the system would try to match the profile created at the training phase and then determine how different the current user is from the registered user. Much of the existing work in mouse dynamics is on multimodal authentication systems but keystroke dynamics are most often clubbed with mouse dynamics. It is suggested that better performance may be attained when the mouse dynamics are clubbed with non-behavioural modalities like eye movement (Kasprowski and Harezlak 2018) . Mouse dynamics have the potential to frame user authentication and to create adversarial mouse trajectories as same as characteristic features leveraged in authentication systems . Capturing the Temporal mouse information is captured for the authentication purpose, the commonly used mouse events are detailed in Table 3 . One of the initial works in mouse dynamics was done by Ahmed and Traore (2007) , where Artificial Neural Networks (ANN) was designed to implement the authentication system. The experimental environment implements the passive authentication but allows users to select the desired operating environment and application. Moreover, the ANN was utilized to train the data and to build the signature of each user. It reported the FAR as 2.4649% and FRR as 2.4614%. Kenneth Revett et al. (2008) have been presented a graphical authentication system called mouse lock. It requires a user to select a group of images and move them along a particular direction in a particular sequence. The right combination is used as a password to authenticate the original user. The timing information of consecutive image movements are used to estimate if the operator or customer is authentic or not. The proposed strategy has achieved FAR and FRR rates between 0.02 and 0.05%. It would be much easier to identify a set of movements than the letters typed on a traditional password login. If the number of movements is increased drastically to avoid this then the actual login becomes a tedious process. Besides, this method is intrusive and unsuitable for continuous authentication. The first two columns indicate the type of mouse information captured; the next two are the mouse coordinates and the timing information in milliseconds. The neural network with dimensionality reduction algorithms like PCA and ISOMAP plays a key role in the biometric system. So, Shen et al. (2009) made a study on behavioural variability of 10 long-term computer users with neural schemes. Finally, the designed model has reported an improved accuracy with dimensionality reduction by attaining the FAR as 0.055 and FRR as 0.03. The number of mouse clicks within the authentication frame is stated to be 20. The next logical question is whether it would be possible to identify an intruder effectively before a security breach is possible. For that, Feher et al. (2012) have been developed a new continuous authentication system that prioritized the mouse actions to reduce the execution time. A random forest classifier is built for each action type and a decision is made by combining the probabilities of each classifier. Hence, this work reports an EER rate as 0.1%. The time required for authentication is approximately 2 min. This method has the disadvantage of device dependant and non-inclusion of change in user behaviour with changing physical and mental surroundings that might affect the system performance. Ling et al. (2017) have been used mouse Kasprowski and Harezlak (2018) Eye moving and mouse dynamics frame The projected scheme has gained better exactness measure and less error rate Here, the eye statics are recorded in the less frequency; in that case, the designed scheme has obtained high flaw measure Tan et al. (2019) Balabit attack mitigation frame using neural network in mouse dynamics By developing this scheme in mouse dynamics frame, the risk occurrence has reduced It takes more time to execute the process. Also if the data is complex then wide range of flaw is recorded Ahmed and Traore (2007) Neural scheme configuration Here, the designed neural network automatically predicts and records the mouse action events by its classification process. Thus it has gained good exactness measure The drawback behind in this model is screen resolution because the signature is recorded in one range of resolution and the user detection is happened in other resolution. Thus it minimizes the accuracy measure. The next one is accelerator setting; the adjustment in rapidity settings can affect the system operation Revett et al. (2008) Graphical authentication procedure Based on the key parameters the original users were detected. Hence the parameters are distance angle and speed This system model detects the user by analysing the time of each user action. So only few attributes are applicable to carry this process. If the large size of dataset is trained then wide range of flaw measure is recorded Shen et al. (2009) Dimensional reduction It was executed in short duration with high accuracy Here, the investigation is made on 10 computer users' actions. So if the diverse dataset is trained then the detection performance might be diminished Feher et al. (2012) Random forest scheme Simple to design the model, also wide range of accuracy improvement for verification is recorded Diverse kind of mouse and mouse pads were diminished the system functions. Also, maximum time is needed to attain the finest point. On the other hand, the system contains maximum number of instances thus it has needed more memory space to run the execution Lin et al. (2012) Double frame classifier with regression model In this scheme, the unwanted characters are removed in the initial layer of regression function. Hereafter, error mined data is entered into the classification layer to verify the original users By the experimental evaluation, the projected scheme has obtained high false measure rate Sayed et al. (2013) Static authentication by neural scheme The amount of data utilized for verification is 39 Testing samples 4, merits of this system is it has improved the identification measure. Here, the own users are recognized by their gestures It has gained high flaw rate and less exactness measure. Moreover, the security aspects also questionable in this scheme Ernsberger et al. (2017) Mouse dynamics visualization system This process is executed in short duration, verification process relatively very fast Lacks in security against reply attack. Moreover, the system is operated in complex platform. Also, the developed framework is vulnerability for automated attacks Cai et al. (2014) Dimension reduction schemes The matching variability has diminished by 76%. In all test cases, the process of feature space has gained better results But identifying an appropriate feature space for real time application is a big threat in the mouse dynamics dynamics to authenticate a user via file-related operations. Features extracted are velocity, acceleration, and each mouse action curvature. A comparative study of mouse authentication based on features includes mouse action, direction, speed, acceleration, and distance that are detailed by Mondal and Bours (2013) . Therefore, the planned model is used to investigate the Average Numeral of Impostor Activities (ANIA) and Average Numeral of Genuine Authenticatedusers (ANGA). In this work average ANIA value is 96. Hence, the attained outcome indicates that mouse dynamics with the traditional machine learning approaches are not sufficient for continuous authentication. Moreover, the possibility of user behaviours may change from session to session also poses a problem. This also points to a hybrid system for the best option to solve this problem for non-intrusive continuous authentication. The mouse gesture analysis for static authentication at login time is an effective approach in the biometric system. To extend this work Sayed et al. (2013) has collected data from 39 users and processed the mouse gesture method. For the gesture analysis scheme, the gesture needs to draw gestures for 8 times. Here, 14 data points samples were trained to the system then at test time the deviation from data points are calculated to authenticate the user. Finally, the mouse gesture approach has gained 0.0526% FAR and 0.0459 FRR. This method needs to be modified to make it suitable for non-intrusive continuous authentication. Ernsberger et al. (2017) proposed mouse dynamics based on user identification from the angle of digital forensics. It has studied those user behavioural variances from interactions on different news websites. The study is different from two fundamental aspects. Firstly, the forensic evidence of a digital crime on news websites is collected and allows for timely intervention in the case of breach in security. Consequently, experiments are conducted with a small dataset that showed FAR of 0.361 and true acceptance measure as 0.439. Another work on behaviour variability is done by Cai et al. (2014) , who proposed an approach using dimensionality reduction algorithms to improve authentication based on mouse dynamics. Dimensionality reduction with algorithms like multi-length scaling and Eigen maps are processed with machine learning algorithms to attain an average FAR as 0.896% and FRR as 0.774%. Finally, the planned model proved that the EER decreases with an increasing detection time. The verification system based on mouse movement curves are proposed by Hinbarji et al. (2015) . It collects the data from 10 user's mouse movements and is disintegrated into a collection of curves. The outcome of this model increases the length of movement, also gained EER 0.053-0.098. In recent decades, many researchers have been utilized mouse action for user identification. Thus Shen et al. (2016) used a permutation of conventional mouse authentication using both schematic information based on mouse Hinbarji et al. (2015) Back propagation based neural scheme The proposed frame is tested with real time datasets Here, the features of mouse action events were extracted It takes more time to run the process. Also, only features of actions are extracted, verification frame is not implemented Shen et al. (2016) Permutation of conventional mouse The trust model is built for all users, Attained high secure range. There is no specific gadget to capture or record the mouse action data But this model is lacked standard validation and common dataset. However, it is not applicable for real time environment a Few procedures of mouse dynamics trajectory and procedural information to build a trust model for every user. Subsequently, it has attained the FAR rate as 0.011 and FRR as 0.0196 with an authentication time of 6.1 s. Since the experiments were conducted in a static environment it needs to be tested on a dynamic environment to study its suitability for continuous authentication. Mouse dynamics frame is applicable in many applications, where the action of keyboard is restricted. But the downside of the mouse-based authentication frame has a very limited number of actions to identify the own users. In spite of this drawback, the mouse authentication system is a very effective topic in continuous authentication systems (Hu et al. 2019 ) because of its simplicity. From this surveyed literature, it is clear that the performance indicators reported are not enough to determine which methods are the best suited for authentication purposes. Results indicate that the RF method is best suited for continuous authentication probably due to the fact that mouse sequences are a combination of limited repeated mouse actions like click and move. In this section, the simple user authentication architecture is experimentally discussed after doing a performance analysis of the reviewed literature. The validation of the comparison result is processed with some important key metrics of the authentication process. Some of the main metrics in the user authentication system are FAR, FRR and EER. By comparing these metrics with all literature the best strategies were finalized. Hence, the non-intrusive active user authentication architecture is defined in Fig. 3 . The user login is modified to use mouse data to grant access to the resources of the system as explained by Bours and Fullu (2009) . The user needs to follow the maze task, the path of user is considered as a password. The velocity of different mouse actions is calculated to build the user's signature. The experiments from this particular work could benefit by increasing the size of the dataset and the method should be modified to translate it to a real-time environment for non-intrusive continuous authentication. Henceforth, the attained EER measure is 0.2-0.4%. In another work, Ghosh et al. (2020) have been presented the authentication framework to find the own user by their handwriting styles. Moreover, the changes in character shapes might cause overlap during feature extraction. Also to estimate the performance of the proposed scheme, several user handwritings were trained and tested. Finally, it has attained the best accuracy measure for authentication. But it takes more time to execute. In addition, the key drawback behind in this authentication frame is security issues, so Ndichu et al. (2020) have been projected a fast test scheme to recognize the malicious event in the authentication framework. Henceforth, the malicious codes are detected and its process was stopped by a fast test security model. At last, it has gained high confidential measure. However, this model is complex to design. Nowadays, user authentication in smartphones became a trending topic in digital field. For that, Sun et al. (2019) have been designed an authentication frame in smartphones to protect the user secrets from un-trusted parties. Here, the sensed data of own users from different mobile gadgets were trained to the system then the features of sensed data of own users were extracted using recurrent model. Hereafter, if the third party uses the smartphone then that user's actions were authenticated by matching the trained action features. In recent, to authenticate the own user Choi et al. (2019) have been introduced the signaling strategy with the support of wearable sensors. Moreover, the designed gadgets were authenticated by the users at all times. Hence, the regression analysis is utilized to extract the recorded user actions. Moreover, the signal of user's action was stored in mobile, laptop, etc. Hereafter, if any unauthenticated has tried to utilize the gadget then the specific system was locked. However, it is a long time process. The keystroke information captured consists of event id, event name, and key location on the keyboard, ASCII code, and corresponding IBM AT code of the key pressed or released. The keystroke events are key press and release. The time of event is captured in milliseconds. The features extracted from this keystroke are press-press or P-P (time in milliseconds of first press to next press), press-release, or P-R (time in milliseconds of first press to next release), release-release, or R-R (time in milliseconds from one release to another). These feature values were calculated for monographs, digraphs, and tri-graphs. Moreover, the experimental work is done for only P-R process. The results of this study have shown in Table 3 and graphically represented in Fig. 4 . The implementation simulation was done using the weka toolkit. On implementation with 5 user data, it was seen that the decision tree model, support vector scheme, and random forest algorithms gave comparable results. In that, keystroke dynamics with random forests algorithm has obtained the highest accuracy as 99.8% with monographs and tri-graphs for the press-release information. Mouse gestures were categorized into two classes namely movement without click and movement with clicks but the features were combined when implementing the authentication algorithm. Furthermore, the gained results have shown an accuracy of 97.8% using random forest method. But on increasing the size of the data it is observed that the results using the same algorithms tend to decrease up to 90.7% accuracy for keystroke dynamics tri-graph information and 91.7% for mouse dynamics for 30 users. In keystroke dynamics, although the decision tree, random forest, and k nearest neighbour algorithms show comparable results, the neural network implementation gave a low performance. Results clearly indicate that accuracy increases in most cases while the number of features used for authentication is increased, which is shown in Table 4 and graphically represented in Figs. 4 and 5. The results point towards the slope features of the mouse movement for better user authentication. Moreover, the mouse authentication of a different number of users is detailed in Fig. 5 . The keystroke features were calculated for monographs, digraphs, and tri-graphs. Also, authentication was implemented using decision trees, random forest, k nearest neighbour, and neural networks. Although, decision tree, random Fig. 3 Non-intrusive user authentication system architecture forest, and k nearest neighbour algorithms have been shown the comparable results in that neural network implementation gave low performance even for the small size of the dataset. From the results validation, it is proved that the neural network implementation gave a low performance. The authentication system has used local Fisher discriminated analysis and ISOMAP as dimensionality reduction algorithms along with classification algorithms namely KNN, Decision trees, and SVM. The investigation reports that a FAR and FRR of 0.0, when ISOMAP is used with SVM. It might be beneficial to study the method in an uncontrolled environment to identify factors that adversely affect the continuous authentication of a user. Furthermore, the verification system is vulnerable to several kinds of attacks like voice recording, keystroke and mouse action hacking, etc. Thus the common security issues in authentication systems are detailed in Fig. 6 . From the analysis, it is verified that the authentication process depends upon the trained features. If the number of users is increased then the system performance is decreased. Hence, in future incorporating maximum features in training set will improve the authentication results. To evaluate the efficiency of the keystroke dynamic system (Morales et al. 2016) analyses the results of the first Keystroke Biometrics On-going Competition (KBOC). Thus, the developed model has gained less EER as 6%. By analysis one system has got a better performance based on free environment simulation for diverse users with different passwords. The reviewed literature has proved that the keystroke analysis have the highest rank in user preference for alternative authentication with 25.5% of users (Furnell et al. 2000; Alsultan et al. 2018 ). The monograph in keystroke dynamics is defined as key hold time and the digraph is utilized to record the key pressed time. Moreover, the tri-graphs are designed to estimate the common features of keystrokes. Hence, in key-based authentication system, the digraphs and monographs are key parametric functions to estimate the keyboard features of each user. Furthermore, the performance of Monograph, digraph, and trigraph function using different techniques such as decision frame, RF, kernel model, and neural frame is detailed in Fig. 7 . Moreover, the performance assessment of different methods using key metrics is elaborated in Table 5 . From the preliminary results, it is obvious that keystroke and mouse dynamics are good candidates for active authentication systems using a random forest algorithm. The challenge in scaling the system is to handle large amounts of data, choosing appropriate features for each biometric used, and building a system that can accommodate the user behaviour. As the continuous work, the parameter of each system should be optimized to gain the finest result. Moreover, the Table 6 . As mentioned earlier, the statistical approaches are not enough to represent changes in user behaviour over time because of changes in the user emotional status. An operator-dependent feature extraction technique with an existing detection algorithm (Kim et al. 2018 ) is also attaining a better outcome. It has reported a least mean EER of 2.95% on a keystroke length of 1000 with KNN adaptive algorithm. For a non-intrusive continuous authentication system to work effectively, the verification system should be able to implement it in real-time and any intruder must be tracked and stopped before any real damage can be done. To the best of our knowledge, none of the work so far addresses all of these requirements adequately. The model, which has attained less error rate, can achieve better authentication performance. Moreover, that diverse model has achieved very encouraging results, acquired via a tightly controlled environment. Moreover, it has translated to a real-time uncontrolled environment to check whether it has attained similar result in real time environment. Hence, the few analysis of key and mouse dynamics system is described in Fig. 8 . For the classification model, the chief metrics are exactness measure, F-value, recall, AUC, and precision. In addition, those metrics are calculated to verify the successive rate of each authentication model that is shown in Fig. 9 . Furthermore, the error in dataset training made the classification process difficult; hence the validated training and testing scores of different models are elaborated in Fig. 10 . EER is the metric that is traditionally used and calculated from FAR and FRR measures. Here first FAR and FRR were calculated for different threshold values. Hence, the FAR and FRR of different techniques are elaborated in Fig. 12 . The FAR measure is calculated using Eq. (1), which is elaborated as false acceptances divided by imposter matches. The false rejection rate is calculated using Eq. (2), which is elaborated as false rejection divided by a total number of authenticated matches. The relationship between observed values of FAR, FRR, and EER of different datasets are detailed in Fig. 11 . Authentication in biometrics is used to secure the password and other confidential data. In today's life, the biometric system plays a vital role in several applications like attendance system, e-learning, online learning assessment, remote authentication, and authorization, etc. Thus user authentication without any interruption has become more important. One of the advantages of keystroke and mouse dynamics is the process of non-intrusive does not require any special hardware. Since voice authentication is only used to break a tie in the decision, it is a good method to support the decision system. (1) FAR = False Accep tan ces Total imposter matches (2) FRR = False rejection Total authenticated matches One of the limitations of authentication system is that the behavioural dynamics of multiple users may be the same in some cases. The users may have similar motions while handling the keyboard or mouse. In that case, identifying the own user is a difficult task. So that an effective optimized ML model should be designed to tackle this drawback and to improve the system performance. By this review article, the advantage and disadvantages of each authentication system was analysed. Moreover, to develop the new method based on this review, the common demerits of each authentication model is detailed. Voice biometrics The common demerit behind in this voice authentication framework is the most of systems were not automated to predict the genuine users. So, each testing the system wants to train the own user behaviour. Thus, it takes more time and needs more resources to execute the authentication process. In addition, the second drawback in this authentication system was not worked for different languages and diverse pronunciations. Moreover, if the training and testing environments are different based on the device, then the utilized algorithm has revealed very less accuracy. Keystroke dynamics Authenticating the genuine user through the keystroke authentication frame is challengeable task in biometrics fields. Because, the typing style of the user is not same at all times it may differ based on their mental activities. Also, it lacks in security. Here, the proficient score of the developed algorithm is determined by the trained features. The key drawback behind in mouse base authentication system is the mouse actions are differed from time to time. So authenticating the user based on their mouse actions or movement is difficult, also in some cases, there is possible to predict the wrong user as genuine user. Hence, the common defeats of the reviewed authentication model are detailed in Table 7 . So in future, all drawbacks of mouse-based authentication systems will be addressed by developing an optimized deep learning framework in the authentication system. Also in future, designing hybrid optimized deep learning framework based broad voice biometrics system with maximum possible pronunciation may end the issues in voice biometrics system. Furthermore, designing an optimized deep learning paradigm with security mechanism will improve the system performance of keystroke dynamics. The trend of non-user continuous authentication based certain period is detailed in Fig. 12 . Thus year to year, research works in this field are increasing in a wide range. It shows the need for user authentication in digital applications. (2018) Primary data 20 users mouse acceleration Dimensionality reduction 0.0 0.0 0.12 Mondal and Bours (2013) Primary data 49 users Mouse action Classifier 0.08 9.6 0.8 This paper has presented a comprehensive review in the area of user authentication using voice verification, keystroke, and mouse dynamics. Several models are reviewed under the user authentication section; in that, RF strategy has attained the finest outcome for all metrics. Moreover, several limitations are discussed on the impact of different types of attacks on these biometric systems and how it could be countered. These biometric methods are utilized to enable continuous or active authentication for a system to verify and identify the authenticated users. Ideally, the Fig. 8 Analysis of key and mouse dynamics authentication system system should choose the authentication method based on the active action of the user at a particular time. If the user is speaking then the system should be able to decide by speech analysis and synthesis whether the user is authentic. If the device is being used then the data captured from peripheral devices like mouse or keyboard should match to authenticate the user. In future, the design suitable deep learning model for each authentication will improve the system performance. Also tuning the key parameters of voice recognition system, mouse, and keystroke dynamics with the use of optimization framework will help to attain the best accuracy. A proposed authentication approach based on voice and fuzzy logic. Recent trends in intelligent computing, communication and devices Presentation attack detection system for fake Iris: a review A new biometric technology based on mouse dynamics Keystroke biometric systems for user authentication User behaviour-based mobile authentication system Audio-visual feature fusion for speaker identification Continuous authentication using mouse clickstream data analysis. In: International conference on security, privacy and anonymity in computation, communication and storage Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming Improving the performance of free-text keystroke dynamics authentication by fusion Intrusion detection using mouse dynamics User identification and authentication using multi-modal behavioral biometrics Authentication systems: a literature review and classification Biometric tools for learner identity in e-assessment. In: Engineering data-driven adaptive trust-based e-assessment systems Classification of threat level in typing activity through keystroke dynamics Aries: evaluation of a reliable and privacy-preserving European identity management framework A survey on methods and challenges in EEG based authentication A login system using mouse dynamics Mitigating behavioral variability for mouse dynamics: a dimensionality-reduction-based approach PPGPass: nonintrusive and secure mobile two-factor authentication via wearables Capturing cognitive fingerprints from keystroke dynamics User authentication system based on baseline-corrected ECG for biometrics User authentication based on mouse dynamics using deep neural networks: a comprehensive study Advanced user authentication for mobile devices Acceptance of subscriber authentication methods for mobile telephony devices Flexible and transparent user authentication for mobile devices Challenge of biometric security for banks Keystroke analysis as a method of advanced user authentication and response A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness User identity verification via mouse dynamics Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment Authentication and supervision: a survey of user attitudes Beyond the pin: enhancing user authentication for mobile devices Voice authentication embedded solution for secured access control Continuous authentication of mouse dynamics based on decision level fusion Graphology based handwritten character analysis for human behaviour identification Keystroke dynamics with low constraints svm based passphrase enrolment Keystroke analysis of free text A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems. Data Brief 28:104924 Dynamic user authentication based on mouse movements curves An insider threat detection approach based on mouse dynamics and deep learning A novel approach to design of user reauthentication systems On mouse dynamics as a behavioral biometric for authentication Introducing touchstroke: keystroke-based authentication system for smartphones Keystroke dynamics-based user authentication using long and free text strings from various input devices Keystroke analysis for thumb-based keyboards on mobile devices Fusion of eye movement and mouse dynamics for reliable behavioral biometrics Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing Intelligent voice bots for digital banking A non-cooperative user authentication system in robot environments Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection International conference on platform technology and service (PlatCon) Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences Two-factor user authentication with the CogRAM weightless neural net Con (dif) fused voice to convey secret: a dual-domain approach Recommendations for biometric access control system deployment in a vehicle context in South Africa Cybersecurity threats based on machine learningbased offensive technique for password authentication A secure threefactor user authentication protocol with forward secrecy for wireless medical sensor network systems Matching contactless and contact-based conventional fingerprint images for biometrics identification A new non-intrusive authentication approach for data protection based on mouse dynamics A novel non-intrusive user authentication method based on touchscreen of smartphones Developing cloud-based intelligent touch behavioral authentication on mobile phones A secure and efficient one-time password authentication scheme for WSN The piano keyboard as task constraint: timing patterns of pianists' scales persist across instruments Multi-source interactive behavior analysis for continuous user authentication on smartphones An information set-based robust text-independent speaker authentication Continuous and nonintrusive identity verification in real-time environments based on free-text keystroke dynamics User authentication using keystroke dynamics Continuous authentication using mouse dynamics Keystroke biometrics ongoing competition Bimodal biometrics using EEG-voice fusion at score level based on hidden Markov models. In: Intuitionistic and type-2 fuzzy logic enhancements in neural and optimization algorithms: theory and applications Flexible biometric online speaker-verification system implemented on FPGA using vector floating-point units Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement Deep learning serves voice cloning: how vulnerable are automatic speaker verification systems to spoofing trials? ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm Ensemble of adaptive algorithms for keystroke dynamics User identification and authentication through voice samples. In: Computational intelligence in pattern recognition A survey of user authentication based on mouse dynamics A recognition approach using multilayer perceptron and keyboard dynamics patterns A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head Biometric authentication via keystroke sound Using the QWERTY keyboard as a chord keyboard: syllabic typing by multi-key strokes for language learning & more. In: AI and machine learning in language education User authentication with keystroke dynamics using fixed text Continuous user authentication using multi-modal biometrics Using mouse dynamics for continuous user authentication Biometric authentication using mouse gesture dynamics Feature analysis of mouse dynamics in identity authentication and monitoring User authentication through mouse dynamics MouseIdentity: modeling mouse-interaction behavior for a user verification system Pattern-growth based mining mouseinteraction behavior for an active user authentication system A parallel decision tree-based method for user authentication based on keystroke patterns Continuous verification using keystroke dynamics Quantifying the breakability of voice assistants Voice biometrics security: extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores A survey on multifactor authentication for online banking in the wild Joint speaker verification and anti-spoofing in the i-vector space Continuous user verification based on behavioral biometrics using mouse dynamics Smartphone user authentication based on holding position and touch-typing biometrics Adversarial attacks on remote user authentication using behavioural mouse dynamics Strengthen user authentication on mobile devices by using user's touch dynamics pattern Isoluminant stimuli in a familiar discrete keying sequence task can be ignored Voice mimicry attacks assisted by automatic speaker verification Ultimate password: is voice the best biometric to beat hackers? User authentication via keystroke dynamics based on difference subspace and slope correlation degree Cost-effective kernel ridge regression implementation for keystroke-based active authentication system Continuous authentication by free-text keystroke based on CNN plus RNN Session-based user authentication via mouse dynamics An efficient user verification system via mouse movements You are how you touch: user verification on smartphones via tapping behaviors Keystroke dynamics for user authentication Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations