Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,

Slides:



Advertisements
Similar presentations
1 Chapter 3 Input Devices. 2 Overview of the Input Process.
Advertisements

DESCRIBING INPUT DEVICES
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Biometrics: Voice Recognition
Input devices, processing and output devices Hardware Senior I.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Security-Authentication
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
 At the end of this class, students are able to  Describe definition of input devices clearly  List out the examples of input devices  Describe.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Welcome to Control ! Hi ! Styx Innov. What is Control ? Control is an android application which enables us to remotely control our PC via Wireless Fidelity.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
A Look To The Future Next-Generation User Interfaces By: John Garcia.
Biometrics Authentication Technology
PRESENTATION ON BIOMETRICS
IT Fundamentals1 Input and Output Describe input Input Devices Keyboard entry, pointing devices, scanning devices Image capture, digitizing, audio-input.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
What is Input?  Input  Processing  Output  Storage Everything we enter into the computer to do is Input.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Accelerometer based motion gestures for mobile devices Presented by – Neel Parikh Advisor Committee members Dr. Chris Pollett Dr. Robert Chun Dr. Mark.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
A device tat transfers data from the outside world into a computer
Computer-User-Input Behavioral Biometrics Dr. Charles C
Input Devices.
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
3.6 Fundamentals of cyber security
A Seminar Report On Face Recognition Technology
Authentication.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 5 - Input.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Advanced Chatting App Development Company
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Biometrics.
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
DEPLOYING SECURITY CONFIGURATION
Pace University IT691/Fall 2015
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes, S. Rodriguez, R. Valdez, D. Zuluaga

Research Purpose Assist in Data Collection Understand Biometric Security Improve Authentication System o What Features are best at Authentication? o 2008 US Higher Education Opportunity Act o Mobile Device Authentication

Biometric Technology Physical versus Behavioral characteristics Keystrokes biometrics Physiological biometrics o Use a persons physical attributes o Ex. fingerprint, face or iris recognition for identification of user identity. Behavioral biometrics o Use a persons speech, writing, or keystrokes for such verification.

Literature Review Long-text-input keystroke studies at Pace University. Touchscreen input for continuous authentication at University of Oxford. Passive user authentication at Carnegie Mellon University.

Project Details 10 college participants 3 days of data gathering Android phone, recorded features and gestures; o Text inputs o Number pad inputs o Other inputs (scrolling, pinching, etc.)

Keyboard Recorded Features: Duration Transitions Pressure Gesture Recorded Features Locations of touch Major/Minor Axis of touch Touch Timing Gyroscope Recording Project Details

Hardware A variety of Android devices were used to capture data, including: LG Nexus 5 LG Nexus 4 Sony Xperia Z1 Pros of Android: Ease of Data Capture (lots of sensors) Open Source (Java platform)

Android Development Environments: 1. Eclipse 2. NetBeans Both Java IDEs Data Collection Apps: Biometric Soft Keyboard Text Data Entry & Numeric Data Entry Biometric Gestures Capture Software

Experiments Scenario 1 - Numeric Input: The numeric data samples were collected using the "Numeric Data Entry" app which consisted in entering the numeric sequence ( ) followed by a enter key. Scenario 2 - Text Input: The character data samples were collected using the "Text Data Entry" app which involved entering 2 sets of characters similar to composing a large text message.

Experiments continued Scenario 3 - Gestures: The touch gestures data samples were collected using the biometric gesture app. The 1st phase was to zoom in and out to locate an object within a picture. The 2nd phase was to zoom in on a question click on the answer them zoom out and go to the next questions. One of our advantages was that we had no restrictions. Since this is a behavioral study each subject was unique to how they enter their keystroke.

Literature Construction Learned the proper means of writing about research. Developed real world experience. Learned the challenges of working in groups on a schedule

Conclusion We were able to take part in a graduate study. Deeper understanding of the experiment process. Chance to develop professional research publication. We have hopes of implementing a Biometric System in the future.

Special Thanks We would like to thank Gonzalo Perez,our project manager, Andreea Cotoranu and Charles Tappert, our research advisors, and all PACE Graduate Students involved!.

Thank You! Q&A