Fig. 2From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoFlowchart of the proposed methodBack to article page