Fig. 20From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoBig Data pipeline for keystroke extractionBack to article page