Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.

Slides:



Advertisements
Similar presentations
Making the System Operational
Advertisements

Information Systems in Business
Beyond “The System Shall...” A Journey from Good to Great Requirements.
AskMe A Web-Based FAQ Management Tool Alex Albu. Background Fast responses to customer inquiries – key factor in customer satisfaction Costs for customer.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Lecture 6 K-Nearest Neighbor Classifier
Insider Access Behavior Team May 06 Brandon Reher Jake Gionet Steven Bromley Jon McKee Advisor Client Dr. Tom DanielsThe Boeing Company Contact Dr. Nick.
Accelerometer-based Transportation Mode Detection on Smartphones
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
SE 450 Software Processes & Product Metrics Reliability: An Introduction.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Software Quality Metrics
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Requirements Analysis Concepts & Principles
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Stylometry Project IT691 & CS615 Computer Information Systems Projects December, 2007.
CASE Tools CIS 376 Bruce R. Maxim UM-Dearborn. Prerequisites to Software Tool Use Collection of useful tools that help in every step of building a product.
Time resource co-ordination and profit maximisation in real time Time Intelligence
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
OOSE 01/17 Institute of Computer Science and Information Engineering, National Cheng Kung University Member:Q 薛弘志 P 蔡文豪 F 周詩御.
1.3 System Design Parts of a System InputProcessOutput Input Devices Central Processing Unit Output Devices The main parts of any computer system.
Data Governance Data & Metadata Standards Antonio Amorin © 2011.
S/W Project Management
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
DOE BER Climate Modeling PI Meeting, Potomac, Maryland, May 12-14, 2014 Funding for this study was provided by the US Department of Energy, BER Program.
Introduction to Data Mining Group Members: Karim C. El-Khazen Pascal Suria Lin Gui Philsou Lee Xiaoting Niu.
Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)
The 2006 National Health Interview Survey (NHIS) Paradata File: Overview And Applications Beth L. Taylor 2008 NCHS Data User’s Conference August 13 th,
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
SacProNet An Overview of Project Management Techniques.
Copyright 2002 Prentice-Hall, Inc. 1.1 Modern Systems Analysis and Design Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 1 The Systems Development.
Technical Advisor - Mr. Roni Stern Academic Advisor - Dr. Meir Kelah Members: Shimrit Yacobi Yuval Binenboim Moran Lev Lehman Sharon Shabtai.
Example Template for Project Presentation
Introduction to Software Development. Systems Life Cycle Analysis  Collect and examine data  Analyze current system and data flow Design  Plan your.
ENTERFACE 08 Project 2 “multimodal high-level data integration” Mid-term presentation August 19th, 2008.
Pattern Recognition April 19, 2007 Suggested Reading: Horn Chapter 14.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Presented by Armando Garza. “A structure for supporting or enclosing something else, especially a skeletal support used as a bases for something being.
Requirements Engineering Lesson 2. Terminologies:  Software Acquisition is where requirement engineering significantly meets business strategy.  Software.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Computer Basics SystemsViruses Alternative Input Speech.
Lecture 13.  Failure mode: when team understands requirements but is unable to meet them.  To ensure that you are building the right system Continually.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
Virtual Private Network Pattern Classification Joe Madden Fall 2010 ECE/CS/ME 539.
© 2012 IBM Corporation 3 rd Party Registration & Account Management 1 1 SMT Maintenance and Support Suggested Enhancements for Potential AMWG CRs.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
Statistical process model Workshop in Ukraine October 2015 Karin Blix Quality coordinator
 System Requirement Specification and System Planning.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Big Data Processing of School Shooting Archives
Keystroke Biometric Studies
IMAGE PROCESSING RECOGNITION AND CLASSIFICATION
Introduction to System Analysis and Design
Chapter 12: Automated data collection methods
Keystroke Biometric System
Validation of Ebola LOD
Hybrid Finger print recognition
COIT 20253: Business Intelligence Using Big Data
Presentation transcript:

Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss

Agenda Brief description of project Project Requirements Meetings Design Decisions Components Testing Strategy Challenges Questions

Description of Project Creation of a pattern recognition system for Mouse Movement Biometrics Creation of a pattern recognition system for Mouse Movement Biometrics Identify computer users thru their individual mouse movements Identify computer users thru their individual mouse movements Provides a feasibility study on whether this is a relevant way to track computer users behavior and identify them. Provides a feasibility study on whether this is a relevant way to track computer users behavior and identify them.

Description of Project Enough individuality in a users mouse movements to identify them Enough individuality in a users mouse movements to identify them ArcArc SpeedSpeed Acceleration / DecelerationAcceleration / Deceleration ClickingClicking Collect Data  Identify Features  Classify User Collect Data  Identify Features  Classify User

Mouse Movement Biometric System- High-Level View Mouse Movement Biometric System Enrolment Data and User Mouse action data Data Storage csv files Feature Extraction and Profile creation Feature Vector creation Classifies the feature vector. Finds the nearest neighbors User Mode User Mouse action data Enrolment Mode Identification Result Success Statistics

Project Requirements Capture data of individual mouse user Mouse Movement Mouse Click Store data Perform calculations to quantify mouse movements Utilize data to identify user

Meetings Team met via phone conference every Monday Team met via phone conference every Monday Constant communication via Constant communication via Meeting with client via phone conference every Tuesday Meeting with client via phone conference every Tuesday Communication via Communication via Sharing documentationSharing documentation

Design Decisions Modular Format Modular Format Runs in Background Runs in Background Can be layered with any application Can be layered with any application Utilizes an enrollment program to get “fingerprint” of user Utilizes an enrollment program to get “fingerprint” of user Focused on a limited number of features due to time and resource constraints Focused on a limited number of features due to time and resource constraints Additional requirements can be built in as project continues Additional requirements can be built in as project continues

Components 3 modules of the program: 3 modules of the program: Data CaptureData Capture Feature ExtractionFeature Extraction ClassificationClassification

Design Decisions – 3 Programs Data Capture Module Feature Extractor Module Results Success Statistics Data Files Classifier Module Feature Vector Files

Data Capture – Architectural View User Task Area Mouse Monitoring Module Data Collection Module Standalone Application Data Files Tic-Tac-Toe GameBlank screenButton training

Data Capture - Enrollment

Data Capture - Data Mouse User Action Event Time in Milliseconds X Coordinate Y Coordinate

Feature Extraction Reads the raw data file Parses data into mouse curves and mouse clicks Compute individual curve and click measurements Creates a mouse profile of user Creates mouse profile measurements

Feature Extraction View MouseProfile Is a vector of curves and clicks? MouseCurves This is a vector of curves. A profile contains many curves MouseClicks This is a vector of clicks. A profile contains many clicks MousePoints Each curve is a vector of mouse points. CurveMeasure Each curve has one Measure object MouseData Each point is represented with MouseData:  Action  Time  x  y Each measure object can have many measures in it.  Speed  Length of the curve  Time of the curve  Curvature MousePoints Each click is having two mouse points. ClickMeasure Each click has one Measure object MouseData Each point is represented with MouseData:  Action  Time  x  y Each measure object can have many measures in it.  duration ProfileMeasure measure of many curves and clicks

Feature Extraction - Data

Classification Takes the feature vectors as the input Takes the feature vectors as the input Normalizes the data Normalizes the data Uses K-Nearest Neighbor algorithm for a test case Uses K-Nearest Neighbor algorithm for a test case Does a leave one out method for cross validation between many cases Does a leave one out method for cross validation between many cases Prints out the matching cases Prints out the matching cases Analyze the cross validation results and prints out the success statistics Analyze the cross validation results and prints out the success statistics

Testing Strategy Multiple releases Multiple releases Testing amongst team for bugs Testing amongst team for bugs Delivered to client after team testing Delivered to client after team testing Repeated for each release Repeated for each release For program data, all members input 5 samples of data For program data, all members input 5 samples of data

Challenges Establishment of clear goals Establishment of clear goals Change in scope of project Change in scope of project New project; many unknowns New project; many unknowns How to utilize enrollment program How to utilize enrollment program

Questions?