Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

JStylo: An Authorship-Attribution Platform and its Applications
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Chapter One Data Collection 1.1 Introduction to the Practice of Statistics.
How Testing is Changing in the 21 st Century Presented by Don Kassner – President, ProctorU.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Stock Movement Prediction Deepathi Lingala Sathindra K. Kamepalli Sudhir K. V. Potturi.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Predicting Unix Commands With Decision Tables and Decision Trees Kathleen Durant Third International Conference on Data Mining Methods and Databases September.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Descriptive Cataloging of Monographs 1. Introduction DRAFT.
David Budet Mariel Castro Jason Jaworski Yevgeny Khait Florangel Marte Client: Richard Washington, NYC Transit Authority Data Mining Customer & Employee-Related.
1 Residual Vectors & Error Estimation in Substructure based Model Reduction - A PPLICATION TO WIND TURBINE ENGINEERING - MSc. Presentation Bas Nortier.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Task 4 Describe the identification of the correct 3D drawing software package from the menu or windows environment; the various techniques that are available.
UNDERSTANDING DYNAMIC BEHAVIOR OF EMBRYONIC STEM CELL MITOSIS Shubham Debnath 1, Bir Bhanu 2 Embryonic stem cells are derived from the inner cell mass.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
How KeePass password safe can save you time and energy
Evaluation of software engineering. Software engineering research : Research in SE aims to achieve two main goals: 1) To increase the knowledge about.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Advanced Searches Using History Advanced Searches What? For a given session, a list of Standard Format Past Searches is automatically saved each time.
Weka Project assignment 3
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Confidentiality of Student Records & FERPA Student Policy #09.14.
The Role of Metadata in Machine Learning for TAR Amanda Jones Marzieh Bazrafshan Fernando Delgado Tania Lihatsh Tami Schuyler
Planning an Applied Research Project Chapter 3 – Conducting a Literature Review © 2014 by John Wiley & Sons, Inc. All rights reserved.
1 ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Research Seminars in IT in Education (MIT6003) The use of computers in educational research Dr Jacky Pow.
APPLICATION OF DATAMINING TOOL FOR CLASSIFICATION OF ORGANIZATIONAL CHANGE EXPECTATION Şule ÖZMEN Serra YURTKORU Beril SİPAHİ.
Arizona Early Intervention Program -Assessment Part II-
DIGITAL SIGNATURE.
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
Classifying Kung-Fu Side kicks With low cost hardware and open source software Victoria Værnø School of Computer Science & Engineering, Seoul National.
By Mickey Haalman Mickey. 2 Rate and Accuracy The graph will measure the improvement towards a oral reading fluency goal as compared.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
“D ATA M INING ON A M USHROOM D ATABASE ” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Data Structure Visualization Vikrant Colaso Kunal Garach Anuj Shah.
Research Methodology Proposal Prepared by: Norhasmizawati Ibrahim (813750)
Reference Documents4.6fi_12.1 Chapter 12 Reference Documents During the normal course of business, repetitive periodic accounting transactions must be.
Machine Learning Homework Gaining familiarity with Weka, ML tools and algorithms.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
A Behavioral Biometrics User Authentication Study Using Android Device Accelerometer and Gyroscope Data Jonathan Lee, Aliza Levinger, Beqir Simnica, Khushbu.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Heart Sound Biometrics for Continual User Authentication
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Enhancing User identification during Reading by Applying Content-Based Text Analysis to Eye- Movement Patterns Akram Bayat Amir Hossein Bayat Marc.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Keystroke Biometric System
Psychology Statistics
Evaluation of a Stylometry System on Various Length Portions of Books
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Biometrics and Standards ITU-T Technology Watch Report December 2009.
Assignment 1: Classification by K Nearest Neighbors (KNN) technique
Record your QUESTIONS as your read.
SHUFFLING-SLICING IN DATA MINING
Presentation transcript:

Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.

Presentation Summary Project Description Experiment Structure Algorithms and Techniques Results of Experiments Future Research Conclusions

Project Description The study extends previous studies at Pace University on Biometric data by running previously obtained data sets through a data mining tool called Weka, using various algorithms and techniques.

Study Experiments Authentication ◦ Dichotomy model Identification ◦ Normalized data Additional ◦ Normalized data

Algorithms and Techniques Authentication ◦ IBk with k = 1 on Dichotomy data Identification ◦ IBk with k = 1 on Normalized data Additional ◦ PredictiveApriori ◦ simpleKmeans ◦ IBk with k = 1 using leave-one-out and percentage splits

Results TrainTestTypeAccuracy 1 (5 samples from each of 4 subjects) 2 (5 samples from each of 4 subjects) Copy Desktop95.79% Free Desktop96.32% Copy Laptop91.58% Free Laptop92.11% 1 (5 samples from each of 4 subjects) 3 (5 samples from each of 4 subjects) Copy Desktop88.95% Free Desktop98.42% Copy Laptop100.00% Free Laptop93.68% Results of Longitudinal Authentication Experiments on new Keystroke Capture Data

Results TrainTestTypeAccuracy 1 (5 samples from each of 4 subjects) 2 (5 samples from each of 4 subjects) Copy Desktop95% Free Desktop100% Copy Laptop100% Free Laptop85% 1 (5 samples from each of 4 subjects) 3 (5 samples from each of 4 subjects) Copy Desktop80% Free Desktop100% Copy Laptop100% Free Laptop100% Results of Longitudinal Identification Experiments on the new Keystroke Capture Data.

Opportunities for Research Authentication based solely on subject in question.  Separate sets of data holding only within and between class records for each subject,  Rather than comparing a community of subjects to a community of records.  Higher accuracies could be legitimately obtained in this manner.

Conclusion The study has furthered previous studies at Pace University through running experiments on Mouse Movement, Stylometry, and Keystroke Biometric data, new and previously obtained, using the data mining tool Weka. The data mining algorithms with which the experiments were conducted are widely used and provide an entry point for future researchers into the use of data mining with biometric data sets.