Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.

Slides:



Advertisements
Similar presentations
Smartphone Apps Development Team Weiqing Li Lijun Zhu Man Li.
Advertisements

Overview I-LINE2 is a browser based, train weight management software package, designed to provide an information interface for Weighline and Streamline.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
The Sherlock Project Purdue University, Department of Computer Sciences Sponsored by Tellabs, Inc. Doug Clark - Group Leader Tobey Pasheilich Raj Talwar.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Basic concept Technologies we have used The Design Problems, challenges & solutions Educational Gain.
VCT May 20, 2009 Sapna Blesson Advisor: Dr.Christopher Pollett.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
New Student Orientation Registration System Stephen Nakamura EE496 Preliminary Design Review Fall 2008.
New Faculty Orientation Blackboard Academic Suite 7.1 University of the Pacific June 28, 2015.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Screen Snapshot Service Kurt Biery LAFS Meeting, 08-May-2007.
A detailed guide on how to set-up your printing storefront. Please Note: Storefronts are compatible with all browsers, however for optimal use of the admin.
© 2007 ReadyTalk www.readytalk.com1598 Wynkoop, Denver, CO 80202www.readytalk.com Conferencing Service You shouldn’t need a degree in computer.
1 Web Developer & Design Foundations with XHTML Chapter 6 Key Concepts.
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Product Perspective Intelligent Online Course Portal System is not depending on any other systems.
BIF713 Operating Systems & Project Management Instructor: Murray Saul
Training Course 2 User Module Training Course 3 Data Administration Module Session 1 Orientation Session 2 User Interface Session 3 Database Administration.
Trimble Connected Community
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Footer Text A Tool for Environmental Scheduling, Accountability and Performance Measurement TxECOS.
2. Introduction to the Visual Studio.NET IDE. Chapter Outline Overview of the Visual Studio.NET IDE Overview of the Visual Studio.NET IDE Menu Bar and.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Statistics Monitor of SPMSII Warrior Team Pu Su Heng Tan Kening Zhang.
1 INITIAL SETUP OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY AO DESIGNEES September, 2000.
James Williams e: eTutor Project SUMMARY OF KEY FINDINGS for 2 Pilot studies of the.
Week seven CIT 354 Internet II. 2 Objectives Database_Driven User Authentication Using Cookies Session Basics Summary Homework and Project 2.
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
Online Book store Course Name: Web Security Project 1 Presented by Amruta Raichurkar Videhi Patel.
Java Portals and Portlets Submitted By: Rashi Chopra CIS 764 Fall 2007 Rashi Chopra.
Floating Cloud Software Developing Team 8 th Presentation
IFS310: Module 12 User Interface Design - Navigation/Communication between the system and users.
Members: Adam Lee, Kartik Subbu, Nick Oakman, and Gabriel Semonis Advisor: Professor Daji Qiao.
1 ACTIVATION OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY INSTITUTIONAL AUTHORIZING OFFICIALS January, 2001.
Journals can be accessed by title from an alphabetical list. For this exercise, click on ‘L’ from the A-Z list. Note: there also is a View complete list.
Using REDCap (Research Electronic Data Capture) as a tool to perform research studies Abstract ID no. IRIA-1076.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
1 * * * Updated for NTS software version , * * *
FAA Access to CPS Online for EDExpress Users - Hands-on Ginger Klock Eric Smith Session 5.
D R A T D R A T ABSTRACT Every semester each department at Iowa State University has to assign its faculty members and teaching assistants (TAs) to the.
Form Processing Week Four. Form Processing Concepts The principal tool used to process Web forms stored on UNIX servers is a CGI (Common Gateway Interface)
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
BIF713 Operating System Concepts MS Windows. Agenda 1. What is an Operating System (definition)? 2. Types of Operating Systems 3. Basic Operations: –
“I’m hacking it!”.  Imagine that you’re hacking away on a web app that uses the Wicket web framework. You want to know how to create a form so that the.
Metis Matt Huschart June 6, 2002 Flashcard Learning Web Site.
PMIS Introduction to Request New Catalog Item Training Presentation US Department of Health and Human Services.
Designing Effective Input. Design input forms for users of business systems Design engaging input displays for users of information systems Design useful.
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
PROJECT SECME Carthik A. Sharma Juan Carlos Vivanco Majid Khan Santhosh Kumar Grandai. Software Engineering Fall 2002.
REDCap General Overview
CRR MUI Upgrade Requalification Demonstration WebEx
Retailer Enrollment Process
Transfer Students Between Districts
MBI 630: Week 11 Interface Design
Keystroke Biometric System
Health-e Claims July 2007.
Dynamic Authentication of Typing Patterns
MIS2502: Data Analytics MySQL and MySQL Workbench
Web-Based Information Management Program
Presentation transcript:

Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009

Team 4 Members Sarika Chebiyam Sarika Chebiyam Kurt Doller Kurt Doller Smita Ranjan Smita Ranjan Elyse Little-Torres Elyse Little-Torres

Keystroke Biometric System: Background Keystroke biometrics measure typing characteristics unique to an individual Keystroke biometrics measure typing characteristics unique to an individual One application is the use to identify an individual from keystroke pattern One application is the use to identify an individual from keystroke pattern A second application is to authenticate an individual shows you are who you say you are A second application is to authenticate an individual shows you are who you say you are Pace exploring subject for 7 years Pace exploring subject for 7 years

Test-Taker Setup and Data Collection Deliverables Obtain keystroke data samples over weekly interval using existing data collection method Obtain keystroke data samples over weekly interval using existing data collection method Develop data collection method in stealth mode Develop data collection method in stealth mode Develop interface for professor to select course information and questions Develop interface for professor to select course information and questions

Project Work Done Redesign data collection tool in stealth mode Redesign data collection tool in stealth mode Designed and Built new Interface for Professor Designed and Built new Interface for Professor Customized the existing test taker system Customized the existing test taker system Developed our team web page Developed our team web page Data Collection – Request sample keystrokes Data Collection – Request sample keystrokes Become familiar and utilize BAS system to process results Become familiar and utilize BAS system to process results Enhanced the existing Test Takers Interface Enhanced the existing Test Takers Interface /team4/team4/index.html /team4/team4/index.html /team4/team4/index.html /team4/team4/index.html

System Overview Diagram

Professor's Interface /team4/team4/2009/ProfessorInterface/courseInfo.php Database Tables Created Course Information Student Information Test Questions entry Question Order Selection Key Features

MySQL Tables Structure course_id students_info course_questions

Professor's Interface Course Information Screen

Professor Interface Student Information Form

Professor Interface Question Entry Form

Professor Interface Question Order Selection Form

Test Takers Interface Key Changes Compatible with Netscape and IE browsers Compatible with Netscape and IE browsers Checks for test-taker login authentication Checks for test-taker login authentication Error messages for Test-taker rejection Error messages for Test-taker rejection Test questions displayed one at a time in order Test questions displayed one at a time in order Data capture in Stealth operation Data capture in Stealth operation Ease of system portability for future work Ease of system portability for future work Consolidated all Keystroke data file storage Consolidated all Keystroke data file storage Overall look and feel of the interface Overall look and feel of the interface

Test Taker Interface Welcome Screen

Test Taker Interface Login Screen

Test Taker Interface Keyboard Selection

Test Taker Applet Key logging data visible

Test Taker Response Screen Applet in Stealth Mode

Test Taker Response Screen Minimum Keystrokes Check

Raw Keystroke Data Files Keystroke Logging Success

Authentication Test To authenticate the user in an online test two types of tests were performed. 1.Within-Class Test 2.Between-Class Test

Within-Class Test The test file consists of two different feature vectors from the same individual.The test file consists of two different feature vectors from the same individual. The training file contains many feature vectors from a variety of users but not the user being authenticated.The training file contains many feature vectors from a variety of users but not the user being authenticated. The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.

Within-Class Free Laptop Test

Within-Class Free Desktop Test

Between-Class Test A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be.A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be. The training set consists of difference vectors.The training set consists of difference vectors. The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.

Between-Class Free Laptop Test

Between-Class Free Desktop Test

Results For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%.For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%. For 10 separate between-class tests, we got an average FAR and performance of, 20% and 80%. For 10 separate between-class tests, we got an average FAR and performance of, 20% and 80%. We have now shown that the existing software will perform the one-student-at-a-time testing.We have now shown that the existing software will perform the one-student-at-a-time testing.

Future Work  Investigate system for possible misuse by attempting to mimic user keystrokes  Modify system to send keystroke data from java applet during test for real time results  Utilize a Linux server with SSH capability for a more developer friendly experience  Off/On stealth mode from professor's interface with java scripts

System Demonstration Project Webpage Professor's Interface Professor's Interface Test Takers Interface Test Takers Interface

Thank You ! Questions? Please to