Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

BIOMETRIC VOTING SYSTEM
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Biometrics.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
1 Biometrics and the Department of Defense February 17, 2003.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Grant Pannell. Intrusion Detection Systems  Attempt to detect unauthorized activity  CIA – Confidentiality, Integrity, Availability  Commonly network-based.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
1 Webcam Mouse Using Face and Eye Tracking in Various Illumination Environments Yuan-Pin Lin et al. Proceedings of the 2005 IEEE Y.S. Lee.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Multimodal Biometric Security 1.
Biometrics Security in Banking Systems Image processing in ATM
Keystroke Biometric Studies
Keystroke Biometric Studies with Short Numeric Input on Smartphones
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
A SEMINAR REPORT ON BIOMETRICS
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola Garcia Cardenas, Onenetta Labeach, Vinny Monaco and James Ng Seidenberg School of Computer Science and Information Systems Pace University, White Plains, NY Student/Faculty Research Day, May 2, 2014

Abstract Some high-level biometric systems combine, or fuse, several biometrics to increase performance over that of an individual biometric system. This project investigates how to combine, at the classification output level, several Pace University biometric systems.

Overview Introduction Multi-Biometric Fusion Pace University Biometric Systems Methodology Proposed Fusion Approaches Summary of Results Conclusions Future Work

Introduction Enhancement of Security Systems 2008 Higher Education Opportunity Act In order to verify the identity of students taking online tests, the U.S Government enacted this act requiring colleges and universities to implement stricter control technologies for online systems There are different traits for biometric systems: Physical traits Face, fingerprint, iris, retina, hand geometry, hand vein, palm print, DNA, and teeth. Behavioral traits Voice, signature, gait, keyboard typing patterns, and mouse movements

Introduction Enhancement of Security Systems Biometric security requirements from Jain et al. include: Universality – each person has characteristic Distinctiveness – characteristic different between two persons Permanence – characteristic invariant over time Collectability – characteristic measurable Performance – analysis speed of biometric system Acceptability – people will tolerate use of system Circumvention – how easily can the system be fooled

Introduction Why a Multi-Biometric System is Needed To enhance overall performance of multiple biometric traits over the performance of an individual trait To identify online test takers authentication more efficiently Usage of behavioral traits: Continuous authentication Non-Intrusive Cost-Effective Process authentication over networks

Multi-Biometric Fusion Literature Review Researchers have applied: General vector fusing algorithms at the Feature level Score fusing algorithms at the Classification level Feature classification data are vectors of biometric input data. These vectors are combined by a classifier to produce score output used for authentication.

Multi-Biometric Fusion Block diagram for a generic multi-biometric system using classification output level fusion

Pace University Biometric Systems Pace University Biometric System (PBS) Pace University Keystroke Biometric System (PKBS) Pace University Systems used in Online Testing Pace Classifier and Simulated Authentication Process

Methodology We investigated many fusion approaches An accepted fusion approach would: Analyze our PBS score output data from online testing sessions Work with data from sources other than online testing sessions, for example Android data We narrowed the approaches down to just a few for our experimental purposes

Methodology Experimental Data Four different biometric traits were collected by Pace University’s existing frontend system and backend classifier: Mouse Motion Click Scroll Keystroke Outputs from online examinations 14 subjects taking 10 examinations each with 10 questions and 20 minutes duration. Sample (m) data of keystroke, click, motion and scroll were actively accumulated from each session.

Methodology Classification Results FAR of the click trait increases as the sample data (m) increases. FRR on the other hand, decreases as more samples are added

Methodology Classification Results The keystroke FRR and FAR results are similar to the click results; however the FRR seem to be higher when there are 100 samples and only starts decreasing significantly when it is close to the 200 samples.

Methodology Classification Results FRR line The motion error rate is one of the traits with the better results. When up to 50~60 samples are used, the FRR and FAR are very low. The FAR only starts increasing significantly after 200 samples.

Methodology Classification Results This graph shows how the scroll trait is very inconsistent. It is believed that this phenomenon happens due to the fact that users do not always interact with the scrolling functionality, forcing the inconsistency of the graph.

Methodology Classification Results Motion ROC In the ROC curve we can see the FAR and FRR percentages for all the four traits. Motion trait is the closest to zero.

Proposed Fusion Approaches Chair-Varshney Decision Fusion Rule The local decisions (n) are combined to obtain a global decision; this combination is done by a decision fusion center (DFC): When this rule was applied in “Decision Fusion for Multimodel Active Authentication,” using the parallel decision fusion architecture, the global decision returned better results (lower error rate) than that of an individual decision performing at its best on its own -which is exactly the type of results we are trying to obtain for this research.

Proposed Fusion Approaches Six Classifier Fusion Strategies These six classifier fusion strategies are theoretically studied by L. Kuncheva, and they are as follows: Minimum Maximum Average Median Majority Vote Oracle

Summary of Results Motion and keystroke biometric traits were the top two biometrics traits with the best performance in these studies Simply concatenating the feature vectors from each biometric yielded an EER of 3.9%. This is worse than the single best performer, mouse motion

Conclusions Motion data was the most accurate biometric trait / Scroll data was the most inaccurate due to different factors. Proposed methods of examination for classification output level fusion: The Chair-Varshney decision fusion rule approach The six classifier fusion strategies (minimum, maximum, average, median, majority vote and oracle)

Future Work Application of the proposed classification output fusion methods compared with the single measurement performances of the four individual biometric traits Comparison to previous EER results For any of these methods to be successful, we will need to yield an EER of no more than 1.139%, which is just 0.001% less than the EER of our most successful single biometric trait, motion

Thank you for your attention! Questions? Thank you for your attention!

Methodology Classification Results

Pace University Biometric Systems Pace University Biometric System (PBS) PBS has a generic, robust backend system designed to accommodate various biometric frontend feature inputs like keystroke, mouse, stylometry and voice PBS relies on databases of approved signature templates that were enrolled and stored earlier PBS analyses the signature inputs against the approved data stored on the template database to verify identify and authenticate users

Pace University Biometric Systems Pace University Keystroke Biometric System (PKBS) PKBS consists of two logging components and a single backend for extracting features and classification Web-based loggers are loaded into any webpage and captures all keystroke and mouse movements, while buffering and transmitting them to a server Cross-platform native logger is written in Java

Pace University Biometric Systems Pace University Systems used in Online Testing A no-hurry system is used to authenticate user All keystroke data from the online testing is used To detect unauthorized users the system has to act in a minute or less before any harm is done Keystroke data is captured using a Java applet that uses the PC Windows clock to record key press and release times in millisecond format

Pace University Biometric Systems Pace Classifier and Simulated Authentication Process Implements the kNN (k-Nearest Neighbor) classifier Used to transform a multi-class (polychotomy) problem into a dichotomy model, this is, a problem that only involves two classes. These classes are: within-person (authenticated) between-person (not authenticated) Simulated Authentication Process User’s keystroke sample requiring authentication is first converted into a feature vector. The difference between this feature vector and an earlier-obtained enrollment feature vector from this user is computed, and the resulting difference vector is classified as one of the two previous classes.