Fig. 16From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoEER comparison for password-mode, before attack (left) and after the attack (right)Back to article page