Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.

Slides:



Advertisements
Similar presentations
Scientific writing (81-933) Lecture 5: Discussion Dr. Avraham Samson Faculty of Medicine in the Galilee 1.
Advertisements

Stereotype threat is defined as the experience of anxiety when faced with a confirmable stereotype (Steele & Aronson, 1995). Often anxiety obstructs cognitive.
Cory Koedel, Eric Parsons, Michael Podgursky and Mark Ehlert
Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Baseline for school surveys - Young Lives longitudinal survey of children, households & communities every 3 years since ,000 children Ethiopia,
Experimental evidence of the emergence of aesthetic rules in pure coordination games Federica Alberti University of East Anglia ESA World Meeting 2007.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Chapter 13 Experiments and Observational Studies.
© Grant Thornton UK LLP. All rights reserved. Review of Sickness Absence Vale of Glamorgan Council Final Report- November 2009.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Journal Club Alcohol and Health: Current Evidence July-August 2006.
Data Sources The most sophisticated forecasting model will fail if it is applied to unreliable data Data should be reliable and accurate Data should be.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
1 National Reading First Impact Study: Critique in the Context of Oregon Reading First Oregon Reading First Center May 13, 2008 Scott K. Baker, Ph.D. Hank.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Assigning individuals to ethnic groups based on 13 STR loci X. Fosella 1, F. Marroni 1, S. Manzoni 2, A. Verzeletti 2, F. De Ferrari 2, N. Cerri 2, S.
The Analysis of Variance
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Community Ordination and Gamma Diversity Techniques James A. Danoff-Burg Dept. Ecol., Evol., & Envir. Biol. Columbia University.
Psy B07 Chapter 1Slide 1 ANALYSIS OF VARIANCE. Psy B07 Chapter 1Slide 2 t-test refresher  In chapter 7 we talked about analyses that could be conducted.
Students’ Understanding of Human Nature: An Analogical Approach R. BROCK FROST AND ERIC AMSEL Weber State University Introduction University students enter.
Human Capital Policies in Education: Further Research on Teachers and Principals 5 rd Annual CALDER Conference January 27 th, 2012.
Copyright © 2010 Pearson Education, Inc. Chapter 13 Experiments and Observational Studies.
Lecture 3 THE KEY SKILLS TESTED IN A DISSERTATION.
METHODS Sample n=245 Women, 24% White, 72% Average age, 36.5 Never married, 51% Referral Sources (%) 12-Month DSM-IV Substance Dependence Prior to Entering.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Chapter 9 Power. Decisions A null hypothesis significance test tells us the probability of obtaining our results when the null hypothesis is true p(Results|H.
Copyright © Cengage Learning. All rights reserved. CHAPTER 5 Extending the Number System.
Biostatistics Case Studies 2008 Peter D. Christenson Biostatistician Session 5: Choices for Longitudinal Data Analysis.
Cognitive Development Across Adulthood Lecture 11/29/04.
Personality Trait Change in Adulthood Brent W. Roberts Daniel Mroczek.
Experimental evidence of the emergence of aesthetic rules in pure coordination games Federica Alberti (Uea) Creed/Cedex/Uea Meeting Experimental Economics.
Chapter 9 Three Tests of Significance Winston Jackson and Norine Verberg Methods: Doing Social Research, 4e.
Educational Research Chapter 13 Inferential Statistics Gay, Mills, and Airasian 10 th Edition.
BPS - 5th Ed. Chapter 221 Two Categorical Variables: The Chi-Square Test.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Mixed models. Concepts We are often interested in attributing the variability that is evident in data to the various categories, or classifications, of.
Manor School Progress Tracking Contents Introduction3 Summary of Findings Free School Meal Progression5 Gender Progression6 Special.
1 Comparing multiple tests for separating populations Juliet Popper Shaffer Paper presented at the Fifth International Conference on Multiple Comparisons,
Journal Report The Effect of Listening To Classical Music On Students’ Performance, Motivation and Focus In Math Summarized by : Valentin Quanti S. MPd.
Researching and Writing Dissertations Roy Horn Researching and Writing Dissertations.
The Self-Compassion Scale (SCS) is the primary measure of self- compassion in both social/personality psychology and clinical research (Neff, 2003). It.
1. Chapter 20 Managing Shared Documents 3 Working Together on Documents Word provides features to help workgroup members collaborate on documents. Insert.
Early Identification of Introductory Major's Biology Students for Inclusion in an Academic Support Program BETHANY V. BOWLING and E. DAVID THOMPSON Department.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
WOODHEYS PRIMARY SCHOOL Assessment without Levels.
Essay Questions. Two Main Purposes for essay questions 1. to assess students' understanding of and ability to think with subject matter content. 2. to.
Maclaurin and Taylor Polynomials Objective: Improve on the local linear approximation for higher order polynomials.
New Advanced Higher Subject Implementation Events Physics Advanced Higher Course Assessment.
HYPOTHESIS TESTING FOR DIFFERENCES BETWEEN MEANS AND BETWEEN PROPORTIONS.
Slide 7.1 Saunders, Lewis and Thornhill, Research Methods for Business Students, 5 th Edition, © Mark Saunders, Philip Lewis and Adrian Thornhill 2009.
Assessment Information Evening Over St. John’s CE Primary School.
New National Curriculum science: Beyond the classroom Nicola Beverley Independent Primary Science Consultant
TING-YI CHANG ( 張庭毅 ) Phone: EXT 7381 GRADUATE INSTITUTE OF E-LEARNING, NATIONAL CHANGHUA UNIVERSITY OF EDUCATION.
Using the Fisher kernel method to detect remote protein homologies Tommi Jaakkola, Mark Diekhams, David Haussler ISMB’ 99 Talk by O, Jangmin (2001/01/16)
Keystroke Biometric Studies
Assessing Students' Understanding of the Scientific Process Amy Marion, Department of Biology, New Mexico State University Abstract The primary goal of.
Effects of Rearing Condition on Parent Fitness and Offspring Development Alex I. Wiesman, Ashley Bowling, & Rosemary Strasser Introduction Parental care.
Enhancing User identification during Reading by Applying Content-Based Text Analysis to Eye- Movement Patterns Akram Bayat Amir Hossein Bayat Marc.
To obtain a copy of this poster, please visit
Single-Case Designs.
Keystroke Biometric System
Dr Claire Kotecki (STEM) & Dr Prithvi Shrestha (WELS)
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Volume 36, Issue 4, Pages (November 2002)
The Effect of Lineup Structure on Individual Identification
Presentation transcript:

Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary Villani

 The Pace system has shown high identification accuracy when data are collected at around the same point in time.  Preliminary studies also show high authentication accuracy using the dichotomy-model-based pattern classifier.  There is little data on how keystroke patterns (and thus accuracy) change over time.

 Extends preliminary studies to assess accuracies over two- and four-week periods  Provides new data to assess accuracies over a two-year interval  Assesses both identification and authentication accuracies over these intervals.

Each subject was asked to complete one or more “complete data sets” consisting of five samples in each of the following four “quadrants”:  Desktop free-text  Laptop free-text  Desktop copy operation  Laptop copy operation

 Subjects consisted of the four previously studied subjects (Buch et al.) plus nine new subjects.  Each subject completed three complete data sets, spaced at approximately two- week intervals.

 Subjects were 8 of the “original 36” subjects studied by Dr. Villani in 2006 for her doctoral dissertation.  Study compared one complete data set entered in 2006 to another entered in 2008.

Identification and authentication studies were performed across different quadrants at same and different time points: Desktop Laptop Copy Free Text

 For each pair of quadrants (arrows in prior slide), the classifier was trained on one quadrant and tested on the other.  Primary results are average accuracies across all quadrant-to-quadrant comparisons for same and different time points.

Measurement Two- and Four-Week Study (n=13) Two-Year Study (n=8) Weeks Years Identification Acc Authentication Acc FAR FRR Acc: accuracy; FAR: false acceptance rate; FRR: false rejection rate

 Identification accuracy appears to decline progressively over a 4-week period, and even more over a two-year period.  Authentication results are ambiguous, although accuracies appear to decline similarly to identification accuracies over a four-week period.  Time-related declines are attributable to an increase in false rejection rate, rather than an increase in false acceptance rate.

 Three of the subjects in the 2/4-week study were identical twins and their father.  Separate analyses were performed to assess: Ability to distinguish each twin from the other Ability to distinguish each twin from the father Ability to distinguish each twin from an unrelated subject

 Identical twins appear to have significant similarity in keystroke patterns, suggesting a biological basis for these patterns.  Twins’ keystroke patterns were closer to those of their father than to those of an unrelated subject. However, the degree of similarity between the twins is much higher than their similarity to their father.  Additional studies are needed to confirm biological influence on keystroke patterns.

 Longitudinal studies should be repeated in a larger group of subjects.  Better control of experimental conditions might yield more conclusive authentication results.  Future work could also focus on refining the feature extractor (perhaps adding more features) to improve both identification and authentication accuracies.  Recruitment of subjects is a challenge; a structured study offering clear incentives would be desirable.