Fig. 3From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoIBB and CBB Illustration on Microsoft WordBack to article page