Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
June 19, Proposal: An overall Plan Design to obtain answer to the research questions or problems Outline the various tasks you plan to undertake.
Educational Research: Competencies for Analysis and Application, 9 th edition. Gay, Mills, & Airasian © 2009 Pearson Education, Inc. All rights reserved.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Teaching Keyboarding. Learning Principles - General Relevant Interaction Active participant Knows goal Progress Expanding behaviors High level.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Left click or use the forward arrows to advance through the PowerPoint Upon clicking, each section of the article will be highlighted one by one Read.
The Proposal. The Final Product Introduction –Including your Management Question Literature Review Your Model –Research Questions –Hypotheses you plan.
Topics Covered Abstract Headings/Subheadings Introduction/Literature Review Methods Goal Discussion Hypothesis References.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Biometrics: Ear Recognition
Left click or use the forward arrows to advance through the PowerPoint Upon clicking, each section of the article will be highlighted one by one Read.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authentication Approaches over Internet Jia Li
The Chicago Guide to Writing about Multivariate Analysis, 2 nd edition. Paper versus speech versus poster: Different formats for communicating research.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
Literature Review and Parts of Proposal
Speaker Recognition By Afshan Hina.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Evaluating a Research Report
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Left click or use the forward arrows to advance through the PowerPoint Upon advancing, each section of the article will be highlighted one by one Read.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Reading and Evaluating Research KINE 5300 Research Methods Dr. Joel T. Cramer CSCS,*D; NSCA-CPT,*D; ACSM H/FI Assistant Professor Department of Kinesiology.
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
The Research Paper Due: November 1 st. This information can be obtained online at
Key Stage 3 National Strategy Handling Data. Key Stage 3 National Strategy © Crown copyright Slide 1.1 The key messages These units of teaching are primarily.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
1 Review of Research Seminar 1 Assignments Charles C. Tappert Seidenberg School of CSIS, Pace University.
The Final Report.  Once scientists arrive at conclusions, they need to communicate their findings to others.  In most cases, scientists report the results.
Manuscript Review: A Checklist From: Seals, D.R and H Tanaka Advances in Physiology Education 23:52-58.
1 Research Seminar 1 & 2 Overview Research Seminar 1 Assignments Charles C. Tappert Seidenberg School of CSIS, Pace University.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Using Hand Gestures for Alternative User Verification
Introduction to Marketing Research
Computer-User-Input Behavioral Biometrics Dr. Charles C
Title of Research Poster
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Title of Research Poster
The Steps into creation of research
Title Methodology and Analysis Discussion Introduction Background
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
Types of CAATs Session 3.
A SEMINAR REPORT ON BIOMETRICS
Chapter Two: Review of the Literature
REFERENCES AND ACKNOWLEDGEMENTS
Title Introduction Methodology and Analysis Discussion Background
Chapter Two: Review of the Literature
Computer-User-Input Behavioral Biometrics Dr. Charles C
Presentation transcript:

Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case for the usefulness of the study How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature

Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification (2009), edited by Liang Wang and Xin Geng Authors Charles C. Tappert, Mary Villani, and Sung-Hyuk Cha Summarizes keystroke biometric work DPS dissertations 2 on identification, 1 on missing/incomplete data About 6 masters-level projects New material – authentication, longitudinal, touch-type model

Keystroke Biometric Studies Build a Case for Usefulness of Study Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of scope and methodology Summary of paper organization

Keystroke Biometric Studies Validate importance of study – describe important applications Internet authentication application Authenticate (verify) student test-takers Internet identification application Identify perpetrators of inappropriate Internet security for other applications Important as more businesses move toward e-commerce

Keystroke Biometric Studies Define Keystroke Biometric The keystroke biometric is one of the less-studied behavioral biometrics Based on the idea that typing patterns are unique to individuals and difficult to duplicate

Keystroke Biometric Studies Appeal of Keystroke over other Biometrics Not intrusive – data captured as users type Users type frequently for business/pleasure Inexpensive – keyboards are common No special equipment necessary Can continue to check ID with keystrokes after initial authentication As users continue to type

Keystroke Biometric Studies Previous Work on the Keystroke Biometric One early study goes back to typewriter input Identification versus authentication Most studies were on authentication Two commercial products on hardening passwords Few on identification (more difficult problem) Short versus long text input Most studies used short input – passwords, names Few used long text input – copy or free text Other keystroke problems studied One study detected fatigue, stress, etc. Another detected ID change via monitoring

Keystroke Biometric Studies No Direct Study Comparisons on Same Data No comparisons on a standard data set (desirable, available for many biometric and pattern recognition problems) Rather, researchers collect their own data Nevertheless, literature optimistic of keystroke biometric potential for security

Keystroke Biometric Studies Feature Measurements Features derived from raw data Key press times and key release times Each keystroke provides small amount of data Data varies from different keyboards, different conditions, and different entered texts Using long text input allows Use of good (statistical) feature measurements Generalization over keyboards, conditions, etc.

Keystroke Biometric Studies Make Case for Using Data over the internet Required by applications Long text input More and better features Higher accuracy Free text input Required by applications Predefined copy texts unacceptable

Keystroke Biometric Studies Extends Previous Work by Authors Previous work on keystroke identification Feasibility: fixed text & same keyboard for train/test Improved system – two independent variables Ideal: same input mode & keyboard type for train/test Non-ideal: different input mode and/or different keyboard type for train/test New work Clearer presentation of improved system results Keystroke authentication system and associated studies Ideal and non-ideal conditions as above Longitudinal (over time) identification & authentication studies Hierarchical feature/fallback model and parameter studies

Keystroke Biometric Studies Summary of Scope and Methodology Determine distinctiveness of keystroke patterns Two application types Identification (1-of-n problem) Authentication (yes/no problem) Two indep. variables (4 data quadrants) Keyboard type – desktop versus laptop Entry mode – copy versus free text

Keystroke Biometric Studies Summary of Paper Organization Section 1 – introduction (described above) Section 2 – system components Data capture over internet Feature extraction Classification Section 3 – experimental design and data collection Section 4 – experimental results Identification Authentication Longitudinal studies System model and parameters Section 5 – conclusions

Keystroke Biometric Studies Build a Case for Usefulness of Study Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of scope and methodology Summary of paper organization

Keystroke Biometric Studies No Explicit Research Question or Hypotheses Implicit research question What identification and authentication performance (accuracy) can be attained by a long-text-input keystroke biometric system and how does performance vary over various controlled changes Implicit research hypotheses Performance decreases In going from ideal to non-ideal conditions As time between enrollment and testing increases As the input text length decreases

Keystroke Biometric Studies Summary Describe the problem being investigated Build a case for the usefulness of the study How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature