User Authentication Using a Haptic Stylus REU fellow(s): Janina Grayson 1 Adam Scrivener 2 Faculty mentor: Paolo Gasti, PhD 1, Kiran Balagani, PhD 1 Graduate.

Slides:



Advertisements
Similar presentations
A Comparison of Implicit and Explicit Links for Web Page Classification Dou Shen 1 Jian-Tao Sun 2 Qiang Yang 1 Zheng Chen 2 1 Department of Computer Science.
Advertisements

A New Generation of Surgical Technique: Telesurgery Using Haptic Interfaces By Sarah L. Choy ~ A haptic interface is a force reflecting device which allows.
Faculty of Sciences and Technology University of Algarve, Faro João M. P. Cardoso April 30, 2001 IEEE Symposium on Field-Programmable Custom Computing.
Presentation of Illusory Haptic Shape via Contact Location Trajectory on the Fingerpad Hanifa Dostmohamed and Vincent Hayward Haptics Laboratory, Center.
Introduction There are various theoretical concepts and skills that bioscience students need to develop in order to become effective at solving problems.
Automated Fitness Guided Fault Localization Josh Wilkerson, Ph.D. candidate Natural Computation Laboratory.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Biometrics: Identity Verification in a Networked World
Use of Multimedia in Engineering. Mechatronics engineering is based on the combination from three basic engineering field that is mechaninal, electronics.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
: Chapter 1: Introduction 1 Montri Karnjanadecha ac.th/~montri Principles of Pattern Recognition.
Workshop on Haptic Interaction Design M. Bordegoni, U. Cugini Department of Mechanical Engineering Haptics Symposium March 4-7,
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
Simulation of Fault Detection for Robot Applications Chase Baker, Taeghyun Kang, Michael Shin Ph.D. Interaction with robot applications are becoming increasingly.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
11.10 Human Computer Interface www. ICT-Teacher.com.
CP SC 881 Spoken Language Systems. 2 of 23 Auditory User Interfaces Welcome to SLS Syllabus Introduction.
Using Smartphones for Behavior Study of Individuals with Parkinson’s Disease REU fellows: Bruno Correa 1 and Yang Peng 2, Faculty mentor: Dr. Huanying.
Graduate Programs in Computer Science A Soft Hand Model for Physically-based Manipulation of Virtual Objects Jan Jacobs Group Research.
Introduction to WRESTT (WISTPC 2014:2) July 18th, FIU Main Campus A Cyber Enabled Learning Environment of Software Testing Education Supported by.
Permission-based Malware Detection in Android Devices REU fellow: Nadeen Saleh 1, Faculty mentor: Dr. Wenjia Li 2 Affiliation: 1. Florida Atlantic University,
Research Model Problem and Research Approach  In today’s climate of increasingly large computer science classes, educators face the challenge of delivering.
Comparing Eye Movements Sampled At Different Rates Abstract Eye movement data is often used as a means of corroborating performance metrics (e.g. time.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Behavioral Biometrics October 10, 2005.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Authentication Training Guide 1 The Red Flag Ruling requires automotive dealerships to detect red flags that are applicable to their operation. After.
1 Presented by Jari Korhonen Centre for Quantifiable Quality of Service in Communication Systems (Q2S) Norwegian University of Science and Technology (NTNU)
Characterization of Force Sensor for Haptic sensing in Robotic Surgery Submitted by: Harsimran Jit Singh Dinesh Pankaj Dr. Amod Kumar Prof. V.Rihani.
1 CP586 © Peter Lo 2003 Multimedia Communication Human Computer Interaction.
1 Haptic Systems Mohsen Mahvash Lecture 3 11/1/06.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Controlling the Behavior of Swarm Systems Zachary Kurtz CMSC 601, 5/4/
Matt Rearick, Ph.D. Research & Evaluation, The RLI Group Associate Professor, Human Performance Roanoke College Making Sense of the.
CONCLUSIONS & CONTRIBUTIONS Ground-truth dataset, simulated search tasks environment Multiple everyday applications (MS Word, MS PowerPoint, Mozilla Browser)
Signature Verification By Mayura Worlikar COSC 5010.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
1 1 Spatialized Haptic Rendering: Providing Impact Position Information in 6DOF Haptic Simulations Using Vibrations 9/12/2008 Jean Sreng, Anatole Lécuyer,
Gesture Modeling Improving Spatial Recognition in Architectural Design Process Chih-Pin Hsiao Georgia Institute of Technology.
Biometric for Network Security. Finger Biometrics.
International Conference on Fuzzy Systems and Knowledge Discovery, p.p ,July 2011.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Processing Hardware, Software. Hardware Hardware Processing is performed by a computer ’ s central processing unit and is measured by the clock speed.
M. Zareinejad.  What ’ s Virtual Proxy? ◦ A substitute for the probe in the VE ◦ An extension of the ‘ God-Object ’ ◦ A finite sized massless sphere.
Keystroke Dynamics By Hafez Barghouthi.
System Model: Physical Module Constraints: 1)A module must have a minimum of two adjacent free sides in order to move. 2) A module must have an adjacent.
When Mobile Multimedia Meet Cloud: Challenges and Future Directions Prof. Changwen Chen IEEE Fellow and SPIE Fellow State University of New York at Buffalo,
Application of Stereo Vision in Tracking *This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations.
Spin at the Nanoscale: Material Synthesis and Fundamental Physics Min Ouyang, University of Maryland – College Park, DMR In the FY08, we continued.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
A NEW ALGORITHM FOR THE VISUAL TRACKING OF SURGICAL INSTRUMENT IN ROBOT-ASSISTED LAPAROSCOPIC SURGERY 1 Interdisciplinary Program for Bioengineering, Graduate.
What is Multimedia Anyway? David Millard and Paul Lewis.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Examining the Conspicuity of Infra-Red Markers For Use With 2-D Eye Tracking Abstract Physical infra-red (IR) markers are sometimes used to help aggregate.
1 Visual Computing Institute | Prof. Dr. Torsten W. Kuhlen Virtual Reality & Immersive Visualization Till Petersen-Krauß | GUI Testing | GUI.
Gesture Input and Gesture Recognition Algorithms
Teacher Configurable Coding Challenges for Block Languages
Date of download: 10/20/2017 Copyright © ASME. All rights reserved.
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics.
Introduction to Computer Graphics
Automated Fitness Guided Fault Localization
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

User Authentication Using a Haptic Stylus REU fellow(s): Janina Grayson 1 Adam Scrivener 2 Faculty mentor: Paolo Gasti, PhD 1, Kiran Balagani, PhD 1 Graduate Student: Fatimah Elsayed 1 Affiliation: 1. School of Engineering and Computing Sciences, NYIT, 2. University of Rochester NYIT Research Experience for Undergraduates (REU) May 26 – July 30, 2015 Project Overview Haptic devices can provide tactile feedback to a user by recreating the sense of touch when interacting with objects in a virtual environment. These devices are able to record biometric information, which has proven useful in previous research in user authentication. Using behavioral characteristics can be an excellent form of security because individuals typically exhibit unique behaviors. This project attempts to determine which behavioral biometric features can achieve the best authentication results. Approach Our current experiment has the user interact with one of five virtual objects (Figure A). We continuously record information about the interaction, such as the instantaneous velocity of the pen and the pressure the pen exerts on the object. With this data, we create features for the user. For example, a feature could be the average pressure exerted on the object throughout the interaction. We can further classify features depending on different kinds of interactions, such as when the user pokes, or ‘probes’, the object and when the user ‘strokes’ the object. These features are then combined to create a template for a user, which are then compared with other users’ templates. The goal is to have different users’ templates be dissimilar, and to have same users’ templates be similar. EER (Equal Error Rate) is a good metric for determining how well an authentication protocol achieves these goals. Experimental results Discussion The experimental results above show that, for ‘probe’ events, velocity is a consistently better feature to use for authentication than pressure. Similar results hold for ‘stroke’ events. However, EERs are too high to use for a reliable authentication protocol; an EER of less than 10% is more desirable. Clearly more work is left ahead of us, but this is a step in the right direction. Related Work [1] R. Dhamija and A. Perrig. Deja Vu: A user study using images for authentication. In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9, SSYM’00, pages 4–4, Berkeley, CA, USA, USENIX Association. [2] M. O. Trujillo, I. Shakra, and A. El Saddik. Haptic: The new biometrics-embedded media to recognizing and quantifying human patterns. In Proceedings of the 13th Annual ACM International Conference on Multimedia, MULTIMEDIA ’05, pages 387–390, New York, NY, USA, ACM. [3] A. El Saddik, M. Orozco, Y. Asfaw, S. Shirmohammadi, and A. Adler. A novel biometric system for identification and verification of haptic users. Instrumentation and Measurement, IEEE Transactions on, 56(3):895–906, [4] K. E. MacLean. Designing with haptic feedback. In Robotics and Automation, Proceedings. ICRA’00. IEEE International Conference on, volume 1, pages 783–788. IEEE, [5] K. Salisbury, F. Conti, and F. Barbagli. Haptic rendering: introductory concepts. Computer Graphics and Applications, IEEE, 24(2):24– 32, Figure A. Five Virtual Objects: sphere, pyramid, donut, cube, teacup Figure B. Geomagic Touch haptic pen Acknowledgement This project is funded by a New York Institute of Technology Institutional Support for Research and Creativity (ISRC) Grant. Janina Grayson's and Adam Scrivener's research is supported by NSF REU grant CNS Future Work In the current experiment, we either compare ‘probe’ features or we compare ‘stroke’ features. However, if we use both features in the same experiment, we will be able to create templates which hold more information about the user, and will thus make it easier to distinguish two users. In addition, it would be interesting to see the effect of location by providing locational context to the features. For example, with the teacup, this means treating interactions on the handle separately from interaction inside of the cup, instead of mixing them together. Probe Velocity Scene typeEER Genuine Comparisons Impostor Comparisons Sphere Pyramid Donut Cube Teacup Probe Pressure (Proxy) Scene typeEER Genuine Comparisons Impostor Comparisons Sphere Pyramid Donut Cube Teacup Goals Determine which set of biometric features achieve the best EER for ‘stroke’ and ‘probe’ events. Create a reliable authentication system centered around using a haptic stylus.