Physical vs. Behavioral Biometrics Focus of the Study Keystroke Biometrics Impaired/ Distracted Research Experiments Conclusion and Contribution to Biometrics.

Slides:



Advertisements
Similar presentations
Rapid Object Detection using a Boosted Cascade of Simple Features Paul Viola, Michael Jones Conference on Computer Vision and Pattern Recognition 2001.
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
SE571 Security in Computing
The Practice of Statistics
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Chapter 10: Authentication Guide to Computer Network Security.
A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,
1 Biometrics and the Department of Defense February 17, 2003.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Entity Authentication
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric Technologies
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Biometric for Network Security. Finger Biometrics.
Proctortrack Results for Faculty Viewing Student Proctoring Results.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Academic Computing Services 2007 Microsoft Word 2010 Publishing Long Documents This Guide will teach you how to work with long documents such as dissertations.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
3D Password.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Keystroke Biometric Studies
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Seminar Presentation on Biometrics
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Presentation transcript:

Physical vs. Behavioral Biometrics Focus of the Study Keystroke Biometrics Impaired/ Distracted Research Experiments Conclusion and Contribution to Biometrics ICB 2015 Dissertation Process

METHODEXAMPLESPROPERTIES What you have (P) User IDs, accounts Cards, badges Keys Can be shared Can be duplicated May be Lost or stolen What you know (K) Password, PIN Mother’s maiden name Personal knowledge Many passwords are east to guess Can be shared May be forgotten What you have and what you know (P, K) User ID + Password ATM card + PIN Can be shared PIN is a weak link (Writing the PIN on the card) Something unique about the user (B) Fingerprints Face Iris Voice print Not possible to share Repudiation unlikely Forging is difficult Cannot be lost or stolen TABLE 2.1: EXISTING USER AUTHENTICATION METHODS WITH SOME EXAMPLES OF POSITIVE AND NEGATIVE PROPERTIES

TABLE 1.1: THE SIX MOST COMMONLY USED BIOMETRICS (LEFT). SOME OTHER BIOMETRIC IDENTITIES THAT ARE EITHER USED LESS FREQUENTLY OR THAT ARE STILL IN THE EARLY STAGES OF RESEARCH (RIGHT) PHYSIOLOGICALBEHAVIORAL FaceSignature FingerprintVoice Hand geometry Iris PHYSIOLOGICALBEHAVIORAL DNAGait Ear shapeKeystroke OdorLip motion Retina Skin reflectance Thermogram

One-handed, typing behavior may not be performed numerous times and may not necessarily be governed by motor control. One handed typing behavior has been found to be erratic when compared to standard two- handed typing behavior, and this study attempts to shed light as to how to better authenticate distracted or impaired typing scenarios.

OTHER STUDIES TO FURTHER STRENGTHEN KEYSTROKE BIOMETRICS INCLUDE: (Literature Review)

May suffer from Aniridia, absence of an iris Person may be blind Person may have eye tremors Subject may not be able to hear instructions that are needed for a biometric system Speech may be affected due to hearing loss

A traditional keystroke biometric system would require the user to always input keystrokes in a normal state. (using both hands) In a normal setting, users may type using one hand only if they are on the phone or drinking a cup of coffee or perhaps one hand or arm is injured.

Entered data as part of a simulated quiz The quiz format encouraged users to enter arbitrary long-text input responses Various scenarios were introduced

Some of the users could not complete the exam in class and had to use their laptop or desktop at home. The system prompts the users to identify which system they were using to enter their keystrokes.

Keystrokes were logged by a JavaScript event logging framework which was embedded into a Moodle learning platform

AFTER CAPTURING THE KEYSTROKES FROM USERS THROUGH VARIOUS NORMAL AND IMPAIRED SCENARIOS, WE BEGAN TO RUN SIMULATIONS:

RECEIVER OPERATING CHARACTERISTIC CURVES (ROC) ROC CURVE Historically used in signal detection such as RADAR in distinguishing an actual signal from nose Used in Biometrics to plot the FAR and FRR at various operating points (thresholds) EQUAL ERROR RATE (EER) FAR / FRR INTERSECTION The point on the ROC curve where the FAR and FRR are equal The operating point on the ROC curve where the FAR and FRR intersect

TABLE 1- FIRST ITERATION RESULTS TRAIN DATATEST DATAFEATURESEER (%) BOTHBothAll3.3 BOTHLeftAll38.04 BOTHRightAll38 Our results were not encouraging with this method as B Train, L and R Test gave us EER’s in the upper 38% range. Typing one handed proved significantly alter a user’s typing behavior and as a result gave us very poor EER rates

SECOND EXPERIMENT Next we decided to experiment to determine if one handed typing behavior was so erratic, that it would be difficult to authenticate with the same one handed test sample

TABLE 2- SECOND ITERATION RESULTS TRAIN DATATEST DATAFEATURESEER% LEFT LeftAll13.96 RIGHT RightAll15.61 We were pleased to see the results of the single handed train and test data. The EER rates were relatively low, in the mid-teens which concludes that user one handed samples do have a conclusive pattern that can be analyzed and authenticated with a keystroke biometric system with relative efficacy. However, we wanted to try another experiment to determine if we could improve the error rate to a lower number if possible.

AFTER CAPTURING THE KEYSTROKES FROM USERS THROUGH VARIOUS NORMAL AND IMPAIRED SCENARIOS, WE BEGAN TO RUN SIMULATIONS: With the intent of lowering EER rates further, we wanted to experiment by filtering features which would better authenticate impaired users. We created the feature sets for left/right sides by filtering the linguistics features to those that contain keys on each side of the keyboard

TABLE 3- THIRD ITERATION RESULTS TRAIN DATATEST DATAFEATURESEER% BOTHLeft BOTHRight LEFTLeft RIGHTRight Much to our dismay, the left/right feature filter actually worsened the results of our testing. The initial hypothesis was that if a user is typing with one hand, they would perform more natural typing behavior on the segment of the keyboard with the one hand that they were typing with. Our results did not align with this hypothesis and the reason could be related to omission of the segments. OMITTING A SEGMENT of the keyboard excludes many features of the keylogger system which DEGRADED, not improved the results of the experiment.

THE GOAL OF A FOURTH ITERATION WAS TO Combine some of the datasets in order to exclude the need for a system to initiate a detector function and then engage various fallback procedures in order to authenticate a user. Therefore, we combined all of the samples into one experiment which included approximately 1200 DATA POINTS PER USER which needed to be split into 5 SAMPLES. The experiment was so large that it required two days to complete.

TABLE 4- FOURTH ITERATION RESULTS TRAIN DATATEST DATAFEATURESEER% BOTH-LEFT-RIGHTBoth-left-rightAll12.41 BOTH-LEFT-RIGHTBothAll4.86 BOTH-LEFT-RIGHTLeftAll15.82 BOTH-LEFT-RIGHTRightAll15.74 The results were very encouraging as the EER’s were with the standard margin of error when comparing the training and testing conditions separately. Fewer assumptions are made with this method The method does require that B, L, R samples be collected during the enrollment phase. System doesn’t need to know whether a sample is one-handed when testing. Avoids requiring a detector and fallback procedure for one-handed samples.

Each iteration provided valuable information which assisted us in expanding and developing the research Initially, we expected to find patterns between the both hand sample and the one handed sample which could have been identified, isolated and matched accordingly One handed samples were too erratic and could not be matched with decent rates using our tools Keyboard segmentation actually worsened results Combining B+L+R, and testing across all scenarios proved to be the best approach that would authenticate users and provide a seamless test implementation process

Strengthening current keystroke biometric systems by including impaired or distracted scenarios Collecting and combining multiple scenarios and testing any scenario against the combined dataset eliminates the need for a fallback procedure and adequately authenticates the user. Gait Facial Recognition (Don’t Smile) Before the contribution, systems did not reasonably account for user variability causing high false reject rates

A paper on one-handed keystroke biometrics which was based from our research was submitted and accepted to the International Conference on Biometrics (ICB 2015) in Phuket, Thailandpaper on one-handed keystroke We provided our unlabeled dataset and 9 teams from all over the world competed for the top spots Participants competed against each other to obtain the highest classification accuracies and submitted classification results through an online system Competition participants designed classification models trained on the normally-typed samples in an attempt to classify an unlabeled dataset that consists of normally- typed and one-handed samples

Dissertation Process Experiences and Best Practices

START TO DEFINE THE CHAPTERS FOR THE MANUSCRIPT Intro Problem Statement General Literature Review More focused literature review Experimental Design and Implementation Results Contribution Discussion Future work GENERAL FRAMEWORK) (150+ PAGES, 100+ REFERENCES)

YOUR MANUSCRIPT WILL BE VERY LARGE IN SCALE AND CHANGES COULD BE VERY TIME CONSUMING IF YOU DO NOT LEVERAGE THE BUILT IN FEATURES OF WORD Table of Contents Page Numbering Citations References Captions Figures TAKE THE TIME TO SET UP ALL OF THESE FEATURES EARLY IN YOUR MANUSCRIPT

WORD 2010 \BIBLIOGRAPHY\STYLE WORD 2013 On most 32-bits machines with Microsoft Word 2010 this will be:  %programfiles%\Microsoft Office\Office14\Bibliography\Style Once the styles are copied to the directory, they will show up every time Microsoft Word is opened. \APPDATA\ROAMING\MICROSOFT\ BIBLIOGRAPHY\STYLE On most machines with Micrososft Word 2013 this will be:  %userprofile%\AppData\Roaming\Microsoft\Bibliography\Style Once the styles are copied to the directory, they will show up every time Microsoft Word is opened.

Once the styles are extracted they will populate into the word references tab. Next step would be to open word, select, IEEE- Alphabetical style under references; Install BibWord Extender Populate the manage sources function within the references tab and enter all of the sources for the manuscript; Enter citations, throughout the document, using the insert citation function within references; At the very end, select build references, and they will all appear in alphabetical order. Any changes that occur when revising the documents can be updated with a simple update references click in the references heading.

GUIDE FOR FORMATTING THE DISSERTATION DOC BIBWORD STYLES– INCLUDES– IEEE ALPHABETICAL EXTENDER HANDLES NON- BIBWORD STYLES AND ALSO RESOLVES SEVERAL LIMITATIONS OF THE BASIC IMPLEMENTATION BY MICROSOFT.

NIELSEN MEDIA RESEARCH ENROLLED INTO THE DPS 2011 QA Coordinator Specialist FAIRLEIGH DICKINSON UNIVERSITY Coordinator PASSAIC COUNTY COMMUNITY COLLEGE 2012-PRESENT Adjunct Professor STEM Director Executive Assistant to the President Assistant Dean for Academic Affairs Interim Executive Director of Human Resources

ABRAHAM LINCOLN