Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Parametric measures to estimate and predict performance of identification techniques Amos Y. Johnson & Aaron Bobick STATISTICAL METHODS FOR COMPUTATIONAL.
Chapter 4 Pattern Recognition Concepts: Introduction & ROC Analysis.
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Other Classification Techniques 1.Nearest Neighbor Classifiers 2.Support Vector Machines.
1 Chapter 15 System Errors Revisited Ali Erol 10/19/2005.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
SeethaRam Janapala, Shiladitya Roy, Jackson John, Luca Columbu, Joseph Carrozza, Robert Zack, and Charles Tappert REFACTORING A KEYSTROKE BIOMETRIC SYSTEM.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Performance Evaluation in Computer Vision Kyungnam Kim Computer Vision Lab, University of Maryland, College Park.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Introduction to machine learning
Evaluating Classifiers
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
Inference for the mean vector. Univariate Inference Let x 1, x 2, …, x n denote a sample of n from the normal distribution with mean  and variance 
Introduction to Pattern Recognition Charles Tappert Seidenberg School of CSIS, Pace University.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
CS 782 – Machine Learning Lecture 4 Linear Models for Classification  Probabilistic generative models  Probabilistic discriminative models.
CpSc 810: Machine Learning Evaluation of Classifier.
Ch 4. Linear Models for Classification (1/2) Pattern Recognition and Machine Learning, C. M. Bishop, Summarized and revised by Hee-Woong Lim.
Economics 173 Business Statistics Lecture 4 Fall, 2001 Professor J. Petry
Experimental Design and Statistics. Scientific Method
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Biometric for Network Security. Finger Biometrics.
KNN & Naïve Bayes Hongning Wang Today’s lecture Instance-based classifiers – k nearest neighbors – Non-parametric learning algorithm Model-based.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition LECTURE 04: GAUSSIAN CLASSIFIERS Objectives: Whitening.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Notes on HW 1 grading I gave full credit as long as you gave a description, confusion matrix, and working code Many people’s descriptions were quite short.
KNN & Naïve Bayes Hongning Wang
Keystroke Biometric Studies
Hand Geometry Recognition
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
CSSE463: Image Recognition Day 11
FACE RECOGNITION TECHNOLOGY
3. Applications to Speaker Verification
LECTURE 05: THRESHOLD DECODING
Evaluation of a Stylometry System on Various Length Portions of Books
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
ROC Curves Receiver Operating Characteristic (ROC) curves are used to determine the appropriate operating point of a system, the tradeoff between False.
LECTURE 05: THRESHOLD DECODING
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
Presentation transcript:

Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER

Agenda  Introduction to ROC Curves  Classification  Multi-Class Issues and Solutions  New Derivation Methods  Weak and Strong System Training  Use Cases  Search for a Topic  Publications  Dissertation Status  Questions

Introduction to ROC Curves  Used for binary decisions  Signal detection – signal / no signal  Medical diagnosis – disease / no disease  Biometric authentication – you are the person you claim to be / you are not  In biometrics the ROC curve varies from FAR=1 & FRR=0 at one end to FAR=0 & FRR=1 at other  FAR = False Accept Rate – the rate an imposter is falsely accepted  FRR = False Reject Rate – the rate the correct person is falsely rejected  ROC Charts are expressed in terms of percentages (0-100%) or probabilities (0-1). These are used interchangeably.

Authentication Analogy  Supreme Court – nine judges  Usual procedure – majority required to make decision  Like 9NN needing majority to authenticate a user  ROC Curve – creates many potential procedures  Need 9 votes to make decision (very conservative)  Need 8, 7, 6 votes to make decision (conservative)  Need 5 votes to make decision (majority)  Need 4, 3, 2 votes to make decision (liberal)  Need 1 or even 0 votes to make decision (very liberal)

Anatomy of a Biometric ROC Curve  Conservative is too restrictive.  Positive classification requires strong evidence.  Liberal is too open.  Requires weak evidence.

Parametric Procedures  Parametric techniques are well studied.  Data follows a normal or Gaussian distribution.  Vary a threshold to obtain the tradeoff between FAR/FRR.  Probability density functions can be calculated without estimation.

Parametric ROC Derivation

Classification 1. The k-NN classifier is well studied. 2. Biometrics classification problems can have many classes. 3. It is easier to work with a large or unknown population if the data is converted from a multi-class to a two-class decision. 4. Cha Dichotomy Model.

K-NN Nonparametric Classifier  k-NN is nonparametric.  A vector- difference model is used to covert a many class problem into a two class, binary problem.  Uses Euclidean distance k-NN Classification Procedure for k=5, Adapted from Pattern Classification, Duda, et al.

Cha Dichotomy Model  Simplifies complexity  Transforms a feature space into a distance vector space.  Uses distance measures. Multi-class to two Class Transformation Process, Adapted from Yoon et al (2005)

m-kNN Method  Pure Rank Method.  Evaluate the top 7 NN.  Q is authenticated if # within-class matches is >= decision threshold of 4NN.  Unweighted. All W’s are equal in weight.

wm-kNN Method  Rank method weighted by rank order.  Authenticate if W choices are > weighted match (m)  Score varies from 0 to =k(k+1)/2 or  For every m, FAR/FRR pair or ROC point.  If m=0, FAR=1, FAR=0 …All users accepted.  If m=15, FAR=small, FRR=large, few Q’s accepted.

m-kNN and wm-kNN ROC’s LapFree – Weak Training

m-kNN and wm-kNN ROC’s DeskFree – Weak Training

t-kNN Method  A distance threshold method.  A positive vote is within a distance threshold from the user’s sample.  Uses feature vector space distances only.  At 0, no distance vectors are authenticated. FAR=0, FRR=100%. At t=100, all distance vectors are authenticated. FAR=100, FRR=0.

t-kNN Method DeskFree (left) and LapFree (right) Data

ht-kNN Method  Weighted vote based on distances to the kNN.  Hybrid of rank method and vector space distances.  For each test sample, the within- class weight (WCW) is calculated based on the distance vectors. DeskFree (left) and LapFree (right) Data

New Nonparametric ROC Methods 1. Need m votes out of k for decision Pure rank method 2. Need wm votes for decision, but some judges get more than one vote (weighted method) Rank method weighted by rank order 3. A positive vote is within a distance threshold from the user’s sample Uses feature vector space distances only 4. Weighted vote based on distances to the kNN Hybrid of rank method and vector space distances

Weak & Strong Training  Weak Training People used in testing not used in training Independent sets of users for testing and training  Strong Training People used in testing also used in training Usually to augment the different training people But new difference-vectors used to authenticate For example, users provide 8 samples – 5 for training and 3 to match against for authentication

Weak & Strong Training

Use Cases  On-line test taking – Authentication Application  Enroll students at the start of a class. Collect biometric samples.  Authenticate users are who they should be using off-line batch processing.  Corporate Compliance Training/Test Administration  Enroll employees at some point prior to the training or test administration. Collect biometric samples. Refresh them at designated intervals.  Authenticate users are who they should be.

Future Work  Real-time authentication.  Accuracy Improvements.  Error Cost Analysis.  Measurement Error.

Initial Search for a Topic  Started program in Fall  Entered DPS with an idea to research a topic in the area of mobile computing. Quickly discarded the idea.  Continued to search for ideas by participating as a Customer for IT691/CS691Projects. Became exposed to Facial and Keystroke Biometrics.  Continued working with Keystroke Biometrics and eventually found a topic with the help of Dr. Tappert.

Idea Vetting  The first few presentations of the topic met with a lot of resistance. It took some time to develop the “so what”.  Every Research Seminar was recorded so that I could go back and listen to criticisms.  Participated as co-author to several papers on the subject. Some papers were peer-reviewed and submitted for publication.

Publications  [1]J. Abbazio, S. Perez, D. Silva, R. Tesoriero, F. Penna, and R. S. Zack, "Face Biometric Systems," in Student-Faculty Research Day, CSIS, Pace University, White Plains, 2009, pp. C1.1-C1.8.  [2]A. Amatya, J. Aliperti, T. Mariutto, A. Shah, M. Warren, R. S. Zack, and C. C. Tappert, "Keystroke Biometric Authentication System Experimentation," in Student-Faculty Research Day, CSIS, Pace University, White Plains, 2009, pp. C4.1-C4.8.  [3]A. C. Caicedo, K. Chan, D. A. Germosen, S. Indukuri, M. N. Malik, D. Tulasi, M. C. Wagner, R. S. Zack, and C. C. Tappert, "Keystroke Biometric: Data/Feature Experiments," in Student-Faculty Research Day, CSIS, Pace University, White Plains,  [4]K. Doller, S. Chebiyam, S. Ranjan, E. Little-Tores, and R. S. Zack, "Keystroke Biometric System Test Taker Setup and Data Collection," in Student-Faculty Research Day, CSIS, Pace University, White Plains,  [5]S. Janapala, S. Roy, J. John, L. Columbu, J. Carrozza, R. S. Zack, and C. C. Tappert, "Refactoring a Keystroke Biometric System," in Student-Faculty Research Day, CSIS, Pace University, White Plains, 2010, pp. B1.1-B1.8.  [6]M. Lam, U. Patel, M. Schepp, T. Taylor, and R. S. Zack, "Keystroke Biometric: Data Capture Resolution Accuracy," in Student-Faculty Research Day, CSIS, Pace University, White Plains,  [7]C. C. Tappert, S.-H. Cha, M. Villani, and R. S. Zack, "A Keystroke Biometric System for Long- Text Input," International Journal of Information Security and Privacy, Pending Publication,  [8]R. S. Zack, C. C. Tappert, S.-H. Cha, J. Aliperti, A. Amatya, T. Mariutto, A. Shah, and M. Warren, "Obtaining Biometric ROC Curves from a Non-Parametric Classifier in a Long-Text-Input Keystroke Authentication Study," vol. 268, Pace University, 2009.

Questions