Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Parametric measures to estimate and predict performance of identification techniques Amos Y. Johnson & Aaron Bobick STATISTICAL METHODS FOR COMPUTATIONAL.
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Chapter 4 Pattern Recognition Concepts: Introduction & ROC Analysis.
Evaluation of Decision Forests on Text Categorization
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Other Classification Techniques 1.Nearest Neighbor Classifiers 2.Support Vector Machines.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
1 Chapter 15 System Errors Revisited Ali Erol 10/19/2005.
Correlation Aware Feature Selection Annalisa Barla Cesare Furlanello Giuseppe Jurman Stefano Merler Silvano Paoli Berlin – 8/10/2005.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER.
Assessing and Comparing Classification Algorithms Introduction Resampling and Cross Validation Measuring Error Interval Estimation and Hypothesis Testing.
Bayesian Decision Theory Chapter 2 (Duda et al.) – Sections
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
CS 8751 ML & KDDEvaluating Hypotheses1 Sample error, true error Confidence intervals for observed hypothesis error Estimators Binomial distribution, Normal.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Differentially expressed genes
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Object Class Recognition Using Discriminative Local Features Gyuri Dorko and Cordelia Schmid.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Performance Evaluation in Computer Vision Kyungnam Kim Computer Vision Lab, University of Maryland, College Park.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
1 Biometrics and the Department of Defense February 17, 2003.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Experimental Design and Statistics. Scientific Method
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Computational Intelligence: Methods and Applications Lecture 16 Model evaluation and ROC Włodzisław Duch Dept. of Informatics, UMK Google: W Duch.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Data Mining Practical Machine Learning Tools and Techniques By I. H. Witten, E. Frank and M. A. Hall Chapter 5: Credibility: Evaluating What’s Been Learned.
Biometric for Network Security. Finger Biometrics.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
KNN & Naïve Bayes Hongning Wang Today’s lecture Instance-based classifiers – k nearest neighbors – Non-parametric learning algorithm Model-based.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
ECE 8443 – Pattern Recognition LECTURE 04: PERFORMANCE BOUNDS Objectives: Typical Examples Performance Bounds ROC Curves Resources: D.H.S.: Chapter 2 (Part.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Six Sigma Project Coding Performance Improvement Project Global Communication, Inc.
Educational Research Inferential Statistics Chapter th Chapter 12- 8th Gay and Airasian.
KNN & Naïve Bayes Hongning Wang
Keystroke Biometric Studies
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
FACE RECOGNITION TECHNOLOGY
Origins of Signal Detection Theory
Data Analysis and Interpretation
Mobile Sensor-Based Biometrics Using Common Daily Activities
LECTURE 05: THRESHOLD DECODING
LECTURE 05: THRESHOLD DECODING
Evaluation of a Stylometry System on Various Length Portions of Books
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
ROC Curves Receiver Operating Characteristic (ROC) curves are used to determine the appropriate operating point of a system, the tradeoff between False.
LECTURE 05: THRESHOLD DECODING
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
Presentation transcript:

Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang

Keystroke Biometric : ROC Experiments WHAT IS KEYSTROKE BIOMETRIC ? The keystroke biometric is one of the less- studied behavioral biometrics. Keystroke biometric systems measure typing characteristics believed to be unique to an individual and difficult to duplicate. Used for Identification Used for Authentication Developed over the past 6+ years

Keystroke Biometric : ROC Experiments Introduction to ROC Curves  Used for binary decisions  Signal detection – signal / no signal  Medical diagnosis – disease / no disease  Biometric authentication – you are the person you claim to be / you are not

Keystroke Biometric : ROC Experiments Introduction to ROC Curves  In biometrics the ROC curve varies from FAR=1 & FRR=0 at one end to FAR=0 & FRR=1 at other  FAR = False Accept Rate – the rate an imposter is falsely accepted  FRR = False Reject Rate – the rate the correct person is falsely rejected  ROC Charts are expressed in terms of percentages (0- 100%) or probabilities (0-1). These are used interchangeably.

Keystroke Biometric : ROC Experiments ROC Authentication Analogy Supreme Court – nine judges – Usual procedure – majority required to make decision – Like 9NN needing majority to authenticate a user ROC Curve – effectively creates many potential procedures and provides FAR/FRR tradeoff for each (here is the m-kNN method) – Need 9 votes to make decision (very conservative) – Need 8, 7, 6 votes to make decision (conservative) – Need 5 votes to make decision (majority) – Need 4, 3, 2 votes to make decision (liberal) – Need 1 or even 0 votes to make decision (very liberal)

Keystroke Biometric : ROC Experiments ROC EXPERIMENTS Derived from four nonparametric techniques. ‘Weak' and ‘Strong' training experiments. – Weak Enrollment data, only non-test- subject data is used to train the system. – Strong enrollment uses test-subject data to train the system, and then uses independent (different) test-subject data to test the system. Large Data Experiments

Keystroke Biometric : ROC Experiments SYSTEM OVERVIEW

Keystroke Biometric : ROC Experiments Parametric Procedures  Parametric techniques are well studied.  Data follows a normal or Gaussian distribution.  Vary a threshold to obtain the tradeoff between FAR/FRR.  Probability density functions can be calculated without estimation. Parametric ROC - Probability Density Function - Adapted from Cha, et al (2009)

Keystroke Biometric : ROC Experiments Cha Dichotomy Model  Simplifies complexity  Transforms a feature space into a distance vector space.  Uses distance measures. Multi-class to two Class Transformation Process, Adapted from Yoon et al (2005)

Keystroke Biometric : ROC Experiments Pure Rank Method – m-kNN  Pure Rank Method.  Evaluate the top 7 NN.  Q is authenticated if # within-class matches is >= decision threshold of 4NN.  Unweighted. All W’s are equal in weight.

Keystroke Biometric : ROC Experiments Rank Method Weighted by Rank Order wm-kNN  Authenticate if W choices are > weighted match (m)  Score varies from 0 to =k(k+1)/2  For every m, FAR/FRR pair or ROC point.  If m=0, FAR=1, FAR=0 …All users accepted.  If m=15, FAR=small, FRR=large, few Q’s accepted.

Keystroke Biometric : ROC Experiments m-kNN and wm-kNN ROC’s LapFree – Weak Training

Keystroke Biometric : ROC Experiments Distance Threshold Method t-kNN  A positive vote is within a distance threshold from the user’s sample.  Uses feature vector space distances only.  At 0, no distance vectors are authenticated. FAR=0, FRR=100%. At t=100, all distance vectors are authenticated. FAR=100, FRR=0.

Keystroke Biometric : ROC Experiments Threshold (t-kNN) Method DeskFree (left) and LapFree (right) Data

Keystroke Biometric : ROC Experiments Threshold (ht-kNN) Method  Weighted vote based on distances to the kNN.  Hybrid of rank method and vector space distances.  For each test sample, the within- class weight (WCW) is calculated based on the distance vectors. DeskFree (left) and LapFree (right) Data

Keystroke Biometric : ROC Experiments Weak & Strong Training

Keystroke Biometric : ROC Experiments DELIVERABLE Deliverable 5 – Authentication Experiments – Ideal Conditions/ Weak Enrollment Part I Status – Completed Deliverable 6 - Authentication Experiments – Ideal Conditions/ Weak Enrollment Part II Status – Completed Deliverable 7 – Enhance and Correct Refactor-BAS.jar ROC interface Status - Completed

Keystroke Biometric : ROC Experiments DELIVERABLE 7 Implement Perl ROC with threshold logic in JAVA. Unify the code in Java which was supported by a Perl program earlier for calculating ROC threshold Values. Maintain the performance of Perl code in Java. Some changes in User Interface of ROC program.

Keystroke Biometric : ROC Experiments UI CHANGES

Keystroke Biometric : ROC Experiments

TEAM COMMUNICATION Google Group for information sharing and discussion Skype Meetings s Personal Meetings Documented Minutes of Meeting Team Website status updates Assigned Task progress check by team leader

Keystroke Biometric : ROC Experiments Questions?