Fig. 13From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoPoor KeyDelay comparison for greeting sentence sample groupBack to article page