A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe.

Slides:



Advertisements
Similar presentations
Darrell W. Gunter EVP / CMO Collexis Holdings, Inc. March 23, 2010 Spring Conference CONTENT: Uncovering the Value and Benefits of Semantic Technology.
Advertisements

Scott Wiese ECE 539 Professor Hu
“Ensuring Employment Sector Service Excellence Across Communities” Carol Stewart Employment Sector Council London-Middlesex (ESCLM)
EHealth Workshop 2003Virginia Tech e-Textiles Group An E-Textile System for Motion Analysis Mark Jones, Thurmon Lockhart, and Thomas Martin Virginia Tech.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Introduction to Fingerprint Biometrics By Tamar Bar.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
KBA 1 Korea’s Advances in Biometrics Market & Technology Alex H. Choi Korea Biometric Association.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Oral Defense by Sunny Tang 15 Aug 2003
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
1/16 Final project: Web Page Classification By: Xiaodong Wang Yanhua Wang Haitang Wang University of Cincinnati.
Biometrics: Ear Recognition
Comparison of Classification Methods for Customer Attrition Analysis Xiaohua Hu, Ph.D. Drexel University Philadelphia, PA, 19104
Seminar Series Seminar Series MERCURY CONSULTING Seminar Topic: IBM WebSphere Business Integration Sreenivas Angara Solution Architect Mercury Consulting.
Profile and a quick introduction Software Engineering: ) هندسة البرمجيات (in Arabic: is the branch of computer science Designed to develop a set rules.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
Improving the Design of UK Business Surveys Gareth James Methodology Directorate UK Office for National Statistics.
EMIS 8381 – Spring Netflix and Your Next Movie Night Nonlinear Programming Ron Andrews EMIS 8381.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Sign Classification Boosted Cascade of Classifiers using University of Southern California Thang Dinh Eunyoung Kim
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Automated Solar Cavity Detection
Presented By Lingzhou Lu & Ziliang Jiao. Domain ● Optical Character Recogntion (OCR) ● Upper-case letters only.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
BOĞAZİÇİ UNIVERSITY DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS MATLAB AS A DATA MINING ENVIRONMENT.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
The Viola/Jones Face Detector A “paradigmatic” method for real-time object detection Training is slow, but detection is very fast Key ideas Integral images.
Biometric for Network Security. Finger Biometrics.
Background established on June 18, 1951 Universal Bank since 1994 publicly listed as “SECB” has one of the lowest non- performing loan ratios (NPL) capital.
1 Machine Vision. 2 VISION the most powerful sense.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Agency of the Republic of Kazakhstan on statistics Meshimbayeva Anar, Chairperson of Statistical Agency, Kazakhstan How data can be instrumental in democratic.
BIOMETRICS.
Completing the Loop: Linking Software Features to Failures 20 July 2004 Copyright © 2004, Mountain State Information Systems, Inc. All rights reserved.
SYSTEMS ENGINEERING PROCESSES IN NASA AND COMMERCIAL PROJECTS Paul Componation Kathryne Schomberg Susan Ferreira Jordan Hansen.
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss Pedro Domingos, Michael Pazzani Presented by Lu Ren Oct. 1, 2007.
An Introduction to Biometrics
An E-Textiles. Virginia Tech e-Textiles Group Design of an e-textile computer architecture – Networking – Fault tolerance – Power aware – Programming.
Multimodal Biometric Security 1.
An Artificial Intelligence Approach to Precision Oncology
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Image Recognition. Contents: Motivation Objective Definition Introduction Preprocessing / Edge Detection Neural Networks in Image Recognition Practical.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Enhancing User identification during Reading by Applying Content-Based Text Analysis to Eye- Movement Patterns Akram Bayat Amir Hossein Bayat Marc.
Predict House Sales Price
Biometric technology.
Neural Networks and Their Application in the Fields of Coporate Finance By Eric Séverin Hanna Viinikainen.
Introduction to Pattern Recognition
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Iris Authentication: System
Automatic Handwriting Generation
Presentation transcript:

A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Under the guidance of Professor Sung-Hyuk Cha, PhD

Introduction & Motivation Automated user verification allows us to verify quickly and accurately whether a person is who he/she claims to be. Within field of Biometrics  Capitalize on human variability to distinguish each other. Security relevance & economic potential: –Airports, banking industry, government agencies –Consider: biometric industry revenues jump 60% ($250 to $400 million year-over-year).

What makes our verification system unique? 1.) We believe we have a solution to the “many class” problem that large systems face: As user pool gets large, distinguishing power of biometric feature template begins to erode as it becomes more likely to have two users with same or nearly similar sets of features. Cha & Srihari at SUNY, Buffalo look at feature relationships stemming from: 1.) differences or numerical “distances” within samples of same user, versus 2.) differences between samples of different users AND that of the original user. Removes key hurdle to wider commercial adoption of biometrics We can now on application serving large user populations, such as a Federal agency or multinational corporation. 2.) We extract features across multiple modalities: Expand potential sources of human uniqueness to include face, fingerprint, voice, and handwriting modes of measurement.  Greater accuracy achieved.

We transform classification of many into dichotomy: “within” vs. “between-sample” feature distances. Accuracy robust, holds even with large user pool.

Verification results include false positive & false negative errors. How else can we minimize error?

Automated User Verification System: Stages of Implementation 1.Raw data collection 2.Pre-processing of data 3.Extract features, calculate distances 4.Train Artificial Neural Network 5.Test, adjust feature set  Aim to minimize error rates independent of data—i.e., the model holds. 6.User interface in Java; for calculation power we use MATLAB functions.

Automated User Verification System: Current Challenges, Future Directions Always in search of good data, lots of it. Testing system and refining feature selection to get best mix  esp. statistically independent features, stable over time. Working on integrating Java-based user interface with Matlab’s neural network pkg. Interested in possible collaboration with others over the summer.