Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.

Slides:



Advertisements
Similar presentations
Allegory An allegory is a form of extended metaphor in which objects, persons, and actions are made to represent something outside the story itself. In.
Advertisements

Keyboard Training Instruction by: Connie Hutchison & Christopher McCoy.
Quick Tips What You Always Wanted to Know About Office But Were Afraid to Ask Deb Hanna West Shore Community College
Intro to Computers!.
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Word Moving the Insertion Point. Using the Arrows  Moves one character to the right  Moves one character to the left  Moves one line up  Moves one.
DEVELOPING ICT SKILLS PART -TWO
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Stylometry Project May 4, 2007 Pace’s Research Day.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Stylometry Project IT691 & CS615 Computer Information Systems Projects December, 2007.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Computers: Getting Started 6 May Today we will learn: 1. Overview: parts of a computer 2. How to use a computer mouse 3. Computer Basics: Terms.
Security-Authentication
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Lesson 3 Text Basics Adapted From Source:
Computer System Examples? Input Output Devices System Unit Devices
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
Working with Worksheet
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Get to Know Your Keyboard. Operational Keys Escape (Esc) – allows you to exit unwanted menus and dialog boxes Tab – used to indent; moves the cursor 5.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Jeopardy Keyboard Computer Parts NetworksInternet Spread- sheets
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
© 2010 South-Western / Cengage Learning Century 21 Keyboarding  Cycle 1  Office Features 1.
Word 1-1: Start Word, Enter and Edit Text, and Save Review Make a review sheet by numbering as shown below. The test is timed. You can practice again if.
Copyright 2002, Paradigm Publishing Inc. CHAPTER 17 BACKNEXTEND 17-1 LINKS TO OBJECTIVES Line Numbering Bookmarks AutoText Nonbreaking Space Nonbreaking.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Downloading and Installing Autodesk Revit 2016
Unit 1. Alternate Key Also called ALT key Executes commands with other key(s)
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Data Structures and Algorithms Lecture 1 Instructor: Quratulain Date: 1 st Sep, 2009.
Beginners: Microsoft Office Word 2007 Lesson 2: Entering Text Isaac Katete.
Word wrap: a feature in word processors which causes the insertion point to automatically jump down to the beginning of the next line when you reach the.
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
Validation final steps Stopping gaps being entered in an input.
Lesson 1 - Understanding the Word Window and Creating a New Document
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Excel Basics. Differentiating between worksheets and spreadsheets Differentiating between workbooks and worksheets.
CSCE 3110 Data Structures & Algorithm Analysis Rada Mihalcea Trees Applications.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Keystroke Dynamics By Hafez Barghouthi.
Editing Basics. Open Word and complete the following steps:  Key your first and last name  Enter twice  Key the following sentence as many times as.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
COMPUTER INPUT DEVICE Keyboard. Keyboard cont…… Print Screen Print contents of screen Pause/Break Terminate/Interrupt Scroll Lock Modify behavior of the.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Standard Input Devices
1.4 Keyboard Training.
CSCE 3110 Data Structures & Algorithm Analysis
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Week 2 Keyboard Orientation.
Keystroke Biometric System
Year 9 Entry Level Computing
Keyboarding Vocabulary
University of Warith AL-Anbiya’a
Keyboarding Vocabulary
Presentation transcript:

Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project Team + DPS Student)

2 Keystroke Biometric Biometrics important for security apps Advantage - inexpensive and easy to implement, the only hardware needed is a keyboard Disadvantage - behavioral rather than physiological biometric, easy to disguise One of the least studied biometrics, thus good for dissertation studies

3 Focus of Study Previous studies mostly concerned with short character string input Password hardening Short name strings We focus on large text input 200 or more characters per sample

4 Focus of Study (cont) Applications of interest Identification 1-of-n classification problem e.g., sender of inappropriate in a business environment with a limited number of employees Verification Binary classification problem, yes/no e.g., student taking online exam

5 Software Components Raw Keystroke Data Capture over the Internet (Java applet) Feature Extraction (SAS software) Classification (SAS software) Training Testing

6 Keystroke Data Capture (Java Applet) Raw data recorded for each entry Key’s character Key’s code text equivalent Key’s location on keyboard 1 = standard, 2 = left, 3 = right Time key was pressed (msec) Time key was released (msec) Number of left, right, double mouse clicks

7 Keystroke Data Capture (Java Applet)

8 Aligned Raw Data File (Hello World!)

9 Feature Extraction 10 Mean and 10 Std of key press durations 8 most frequent alphabet letters (e, a, r, i, o, t, n, s) Space & shift keys 10 Mean and 10 Std of key transitions 8 most common digrams (in, th, ti, on, an, he, al, er) Space-to-any-letter & any-letter-to-space 18 Total number of keypresses for Space, backspace, delete, insert, home, end, enter, ctrl, 4 arrow keys, shift (left), shift (right), total entry time, left, right, & double mouse clicks

10 Feature Extraction Preprocessing Outlier removal Remove samples > 2 std from mean Prevents skewing of feature measurements caused by pausing of the keystroker Standardization x’ = (x - xmin) / (xmax - xmin) Scales to range 0-1 to give roughly equal weight to each feature

11 Sample Datasets Prior to Standardization After Standardization

12 Classification Identification Nearest neighbor classifier using Euclidean distance Input sample compared to every training sample

13 Experimental Design: Identification Experiment 8 subjects that know the purpose of exp. Training – 10 reps of text a (approx. 600 char) Testing 10 reps of text a 10 reps of text b (same length as text a) 10 reps of text c (half length of text a)

14 Experimental Design: Instructions for Subjects Subjects were told to input the data using their normal keystroke dynamics Subjects were asked leave at least a day between entering samples

15 Experimental Design: Text a – about 600 characters This is an Aesop fable about the bat and the weasels. A bat who fell upon the ground and was caught by a weasel pleaded to be spared his life. The weasel refused, saying that he was by nature the enemy of all birds. The bat assured him that he was not a bird, but a mouse, and thus was set free. Shortly afterwards the bat again fell to the ground and was caught by another weasel, whom he likewise entreated not to eat him. The weasel said that he had a special hostility to mice. The bat assured him that he was not a mouse, but a bat, and thus a second time escaped. The moral of the story: it is wise to turn circumstances to good account.

16 Expected Outcomes: Recognition Accuracy Accuracy on text a > that on text b text a is the training text Accuracy on text b > that on text c text b is longer than text c Accuracy on texts a, b, c > arbitrary text texts a, b, & c are similar, all Aesop fables

17 Preliminary Results – Reduced Experiment Reduced identification experiment Smaller text input “The quick brown fox jumps over the lazy dog.” Fewer subjects Three project team members Fewer feature measurements Mean and std for “e” and “o” key press durations Accuracy of 80%, which is promising

18 Results – Comparison to Same Text Predicted Actual Prior to Standardization only yielded a 59% accuracy 100 % accuracy with standardization (76 out of 76) Confusion Matrix of Results after Standardization 

19 Results – Comparison to Different Text of ~Equal Length Predicted Actual Prior to Standardization only yielded a 38% accuracy 98.5 % accuracy with standardization (65 out of 66) Confusion Matrix of Results after Standardization 

20 Results – Comparison to Different Text of Shorter Length Predicted Actual Prior to Standardization only yielded a 14% accuracy 97% accuracy with standardization (74 out of 76) Confusion Matrix of Results after Standardization 

21 Conclusions System is a viable means of differentiating between individuals based on typing patterns Standardization is crucial to the accuracy of the system It is likely that the shorter the text used for verification, the lower the accuracy Decreasing # measurements used also decreases accuracy

22 Questions/Comments? Focus or applications? Software implementation? Experimental design? Expected experimental outcomes?