Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.

Slides:



Advertisements
Similar presentations
Accurately Interpreting Clickthrough Data as Implicit Feedback Joachims, Granka, Pan, Hembrooke, Gay Paper Presentation: Vinay Goel 10/27/05.
Advertisements

Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
© National Bank of Belgium. Failure Prediction Models: Disagreements, Performance, and Credit Quality Janet MITCHELL and Patrick VAN ROY National Bank.
Combining Classification and Model Trees for Handling Ordinal Problems D. Anyfantis, M. Karagiannopoulos S. B. Kotsiantis, P. E. Pintelas Educational Software.
CWUIQ Presented by Justin Thomason March 3, 2005.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER.
The Research Project - Preliminary Proposal Presentation Contextual Suggestion Track: Travel Plan Recommendation System Based on Open-web Information Presenter:
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Final Project: Project 9 Part 1: Neural Networks Part 2: Overview of Classifiers Aparna S. Varde April 28, 2005 CS539: Machine Learning Course Instructor:
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
ICASSP'06 1 S. Y. Kung 1 and M. W. Mak 2 1 Dept. of Electrical Engineering, Princeton University 2 Dept. of Electronic and Information Engineering, The.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Distributed and Efficient Classifiers for Wireless Audio-Sensor Networks Baljeet Malhotra Ioanis Nikolaidis Mario A. Nascimento University of Alberta Canada.
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Yuan Li, Chang Huang and Ram Nevatia
Slide Image Retrieval: A Preliminary Study Guo Min Liew and Min-Yen Kan National University of Singapore Web IR / NLP Group (WING)
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Biometric System Design for Handheld Devices Team 4 Naif Alotaibi, Rich Barilla, Francisco Betances, Aditya Chohan, Alexandra Garcia, Alexander Gazarov,
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Learning to Associate: HybridBoosted Multi-Target Tracker for Crowded Scene Present by 陳群元.
Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
GA-Based Feature Selection and Parameter Optimization for Support Vector Machine Cheng-Lung Huang, Chieh-Jen Wang Expert Systems with Applications, Volume.
Human Activity Recognition Using Accelerometer on Smartphones
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Ensemble Learning Spring 2009 Ben-Gurion University of the Negev.
Stefan Mutter, Mark Hall, Eibe Frank University of Freiburg, Germany University of Waikato, New Zealand The 17th Australian Joint Conference on Artificial.
1 K-Means+ID3 A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods Author : Shekhar R.
Introduction Use machine learning and various classifying techniques to be able to create an algorithm that can decipher between spam and ham s. .
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
SAR-ATR-MSTAR TARGET RECOGNITION FOR MULTI-ASPECT SAR IMAGES WITH FUSION STRATEGIES ASWIN KUMAR GUTTA.
Biometric for Network Security. Finger Biometrics.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Chapter 3.3 – 3.4 Applications of the Standard Deviation and Measures of Relative Standing.
A Behavioral Biometrics User Authentication Study Using Android Device Accelerometer and Gyroscope Data Jonathan Lee, Aliza Levinger, Beqir Simnica, Khushbu.
Introduction to Machine Learning, its potential usage in network area,
MAIN PROJECT IMAGE FUSION USING MATLAB
Heart Sound Biometrics for Continual User Authentication
Keystroke Biometric Studies with Short Numeric Input on Smartphones
My Tiny Ping-Pong Helper
Object Detection with Bootstrapping Carlos Rubiano Mentor: Oliver Nina
Source: Procedia Computer Science(2015)70:
Secure and Privacy-Preserving User Authentication Using Biometrics
CS548 Fall 2017 Decision Trees / Random Forest Showcase by Yimin Lin, Youqiao Ma, Ran Lin, Shaoju Wu, Bhon Bunnag Showcasing work by Cano,
Mobile Sensor-Based Biometrics Using Common Daily Activities
Extra Tree Classifier-WS3 Bagging Classifier-WS3
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric System
Evaluating Classifiers (& other algorithms)
ROC Curves Receiver Operating Characteristic (ROC) curves are used to determine the appropriate operating point of a system, the tradeoff between False.
Assignment 1: Classification by K Nearest Neighbors (KNN) technique
Box and Whisker Plots Meow.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung Hai Le, Leigh Anne Clevenger and Vinnie Monaco Capstone Project - Team 6 Page 1

Introduction Fusing multiple biometrics using different fusion strategies and two features, mouse motion and keystroke, to improve the accuracy and the percentage of authenticating users. Biometric Trait EER Motion 1.14% Click 33.49% Scroll 36.27% Keystroke 24.35% Biometric Traits Fused EER Keystroke and Mouse Motion 3.9% Background on last semester’s paper Last semester’s results Page 2 Last semester’s results

Levels of Fusion Pre-Classification Level Sensor or Signal Level Feature Level Post-Classification Level Matching or Measurement or Confidence level Rank Level Decision Level Good night guys! Page 3

Methodology By using different python classification techniques and fusion methods that sklearn provides, the data can be manipulated, classified and combined to design a better multi-biometric system. All data collection process was done in a closed system. It is important to note that the same raw data from last semester’s research was used with our research, in order to compare the accuracy and EER% of the features more precisely Page 4

Methodology cont... Classifier matching score data from keystroke and mouse motion, and their fused output after the Mean (Average) method was applied. Page 5

Fusion Strategies Used Maximum P=Max(P1,P2,....Pj) Minimum P=Min(P1,P2,....Pj) Mean P=Mean(P1,P2,....Pj) Median P=Med(P1,P2,....Pj) Page 6

Research Tools We used python sklearn as our implementation method for the K-nearest neighbors. To run the python script we supply the two datasets, mouse motion and the keystroke features. This results in the highest possible percentage of authenticating the users. Page 7

Classification Accuracy Results Accuracy percentages were first obtained by fusing the keystroke and mouse motion data. Fusion Methods Classification Accuracy Maximum 73% Mean 86% Median Minimum 77% Page 8

Results cont... EER values were obtained from the ROC curves when the False Acceptance Rate and the False Rejection Rate are equal. FAR = FRR Fusion Methods EER Maximum 13.4% Mean 12.5% Median Minimum 18.8% Page 9

Results cont... ROC curve of all four fusion methods in study. Page 10

Conclusions As predicted, by fusing two of the top performers from Pre-Classification, the accuracy increases. Though we did not meet our EER target of less than 1.13 EER percentage. in this slide its post-classification not Pre-classification right? Page 11

Future Work The results presented in this study suggest that multi-biometric systems improve performance over that of individual biometric systems, however, more features should be tested applying different methods. Page12

Future Work cont... There are a total of four levels in biometric fusion. It would be good to use the data from our match score level and apply it to the decision level (3rd level) in order to find out if higher accuracy rates and lower ERR% can be obtained. Page 13

Future Work cont... It would be useful to experiment using the scroll and the click features along with the fusion methods presented above as well. Being able to determine which data works better with different fusion methods at different fusion levels would be crucial on the design of an effective multi-biometric system. Page 14

Thank you! Questions? Page 15