Fig. 9From: Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded videoKUnits on different frames with similar coordinates (same KeystrokePoint)Back to article page