Using Hand Gestures for Alternative User Verification

Slides:



Advertisements
Similar presentations
Bill Roettger Feature Updates for HCV-ID. Overview For Patients Collect: - Patient Information - Insurance Cards - Acceptance of Data Privacy Policy -
Advertisements

Data - Information - Knowledge
CSE3201/CSE4500 Information Retrieval Systems
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
PALM VEIN TECHNOLOGY.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
George Turner Effectiveness of Biometric Security CS591 Semester Project
Hand Movement Recognition By: Tokman Niv Levenbroun Guy Instructor: Todtfeld Ari.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
By: Gerry P. Madrid Education Program specialist II – School Monitoring and Evaluation.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Biometrics: Voice Recognition
 A data processing system is a combination of machines and people that for a set of inputs produces a defined set of outputs. The inputs and outputs.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Software Engineering Aspects of Web Based Development Cathy Huttenhoff Software Engineer Senior Seminar Fall 2009.
Introduction to Functions Intro to Computer Science CS1510 Dr. Sarah Diesburg.
STAY CONNECTED TOLLFREEEXPRESS CONTROL PANEL GUIDE.
AS Module 2 Information; Management and Management and Manipulation or what to do with data, how to do it, and……... ensure it provides useful information.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Input Devices. What is Input?  Everything we tell the computer is Input.
Calculating Fractal Dimension from Vector Images Kelly Ran FIGURE 1. Examples of fractals (a) Vector graphics image (b) Sierpinski Carpet D ≈ 1.89 FIGURE.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
FLOOR CANDY.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
TOUCH ME NOT Presented by: Anjali.G.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
SCSC 455 Computer Security Chapter 3 User Security.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Project management Topic 8 Configuration Management.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Submitted by, Parvathy.B.S Roll No.48. INTRODUCTION  Virtual keyboard is a small java application that lets you easily create multilingual text content.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Nickolas McCarley University of Alabama Abstract Robotic Navigation through Gesture Based Control (RNGBC) assists people who may not be able to operate.
Towards Another Step from 3D Password to 4D Password:
Office 2016 and Windows 10: Essential Concepts and Skills
KINECT AMERICAN SIGN TRANSLATOR (KAST)
Chapter Objectives In this chapter, you will learn:
Introduction To DBMS.
Hardware-rooted Trust for Secure Key Management & Transient Trust
Online Training Course
Keystroke Biometric Studies
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Why did you choose us? To address and provide a solution to the many problems associated with your current manual filing system -Problems include: -Lack.
Introduction To Computers
ICT meeting Business needs
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
CAPTURING OF MOVEMENT DURING MUSIC PERFORMANCE
Call to Fix QuickBooks Error
ModWorX Pro – Calibration, Verification Upgrade
Topics Introduction Hardware and Software How Computers Store Data
Attributes of Information
A SEMINAR REPORT ON BIOMETRICS
DISSERTATION ON CRYPTOGRAPHY.
PLANNING A SECURE BASELINE INSTALLATION
Commercial Data Processing
Changes in the Canadian Census of Population Program
Software Re-engineering and Reverse Engineering
Overview of Computer system
Presentation transcript:

Using Hand Gestures for Alternative User Verification People with a disability that reduces their ability to use a standard keyboard can be at a severe disadvantage when required to input numeric passwords in order to gain access to their accounts. A password that just requires a few movements of the hand in front of the user is more accessible to disabled users, more convenient to almost all users, and can still be very secure. A system was developed in Java that is able to read in the coordinates of the palm of a hand above the Leap Motion Device, save them in a comparable format, then compare the input gesture to a stored one in order to verify a user. Once the program had been calibrated, it was tested with a test case of a gesture containing 3 lines in different directions. The gesture input was registered as acceptably close to the original in 82.5% of trials at an margin of error of 40 millimeters, leading to the conclusion that the program could accurately register and compare input hand gestures. The successful development of this system can be incredibly useful to users with disabilities such as arthritis that makes it difficult to press individual keys on a keyboard. The system also reduces stress put on the wrist from excessive keyboard use that can result in carpal tunnel syndrome. In addition to being faster and easier to input, the endless possibilities of gestures cause the hand gesture passwords to be very secure. Abstract Basic Overview Methods Three Java Classes were created for data storage: - A Point Class to store the position of the hand in a single frame - A Line Class to store a collection of points that represent a line made by the hand - A Gesture Class to store an ordered collection of lines. One Class was developed to accept and transform hand position data from the Leap Motion Device into Point Objects. The Gesture Creator Class formatted these Points into a Gesture object and saved the Gesture to a file. The Gesture Comparison Class read in two Gestures and compared them at a given margin of error. Read Gestures from Files and Compare them Save Current Gesture to a File Retrieve Baseline Gesture Receive data from Leap Motion Device Capture Gesture Procedure Install and configure jGrasp and Leap Motion Device Write a Java Program to: i. Record raw data on position of the hand. ii. Convert the raw data in to a comparable format. iii. Compare the most recent gesture to the original and return and indication of success Sample Code Comparing Gestures Creating a Gesture Introduction Using character string passwords can be a tedious and difficult throughout the day. The security of these passwords is becoming of more concern due to their reliance on just length and complexity and advances in technology. A hand motion password could potentially reduce the time, effort, and threat to security that the string password poses. This password system also includes a configurable level of error and contributes to the hands-free computing movement. Example of Saved Gesture: (-00.61169, 06.33869, 116.51540) (-83.22334, 03.01472, -110.06181) (166.68714, -02.05694, 08.26354) Conclusion With a successful reading rate of 96.25% and an 82.5% rate of positive comparison between the input gesture and original gesture, it can be concluded that a program was successfully developed that can be used as an alternative password system to numeric passwords. This hand gesture system is more easily accessible to users with arthritis and reduces the risk of users developing Carpel Tunnel Syndrome, as well as increasing the use of hands-free computing. Purpose The development of a hand gesture password system will not only allow users with disabilities to perform the frequent task of accessing password protected accounts more easily, but increase password security for all users. Data & Analysis Future Work Future work with a hand gesture password system could include more complex and fluid gestures involving finger movement and multiple hands. This system can replace any existing password system. As well as being a replacement for password systems, this work can be enhanced to be used as an alternative form of CAPTCHA, making it easier for users to verify that they are human. Lines Registered Success 3 1 2 Gesture Authentication 13.75% Materials jGRASP IDE Version 2.0.0_16 Java SDK 7u79 Leap Motion Device and SDK Laptop Macintosh OS X Version 10.9.5 References 82.5% [1] Weichert, F., Bachmann, D., Rudak, B., & Fisseler, D. (n.d.). Analysis of the Accuracy and Robustness of the Leap Motion Controller. Sensors,6380-6393. [2] Wang, L. (2014). Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography. Journal of Applied Mathematics, 2014, 1-11. [3] Morris, R., Thompson, K., & Laboratories, I. (1978). Password security: A case history. Murray Hill, N.J.: Bell Telephone Laboratories.