Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.

Slides:



Advertisements
Similar presentations
SWaNI Project Update Report April Project Outcomes Under review, might not all be possible in conjunction with Skillnet or SITS Interoperability.
Advertisements

Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER.
SeethaRam Janapala, Shiladitya Roy, Jackson John, Luca Columbu, Joseph Carrozza, Robert Zack, and Charles Tappert REFACTORING A KEYSTROKE BIOMETRIC SYSTEM.
Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
DT211/3 Internet Application Development JSP: Processing User input.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Face Biometric Applications Team Members: Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield Clients: Fred Penna and Robert Zack.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
CADDLAB Medical Imaging on Remote Compute Servers.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Stylometry System CSIS Stylometry Projects, mostly Fall 2009 Project Seidenberg School of Computer Science and Information Systems.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
ERA Manager Training December 19, Propriety and Confidential. Do not distribute. 2 ERA Manager Overview In an effort to reduce the need for Providers,
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
ITS-VIP SPRING 2012 FINAL PRESENTATION DATA MINING GROUP PHP?HTML INTERFACE Mide Ajayi Nakul Dureja Data Miners Rakesh Kumar David Fleischhauer.
A Language Independent Method for Question Classification COLING 2004.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
10 August 2005Benchmark/Mentor Student Guide Page 1 CPS Benchmark/Mentor Student Guide Internet Edition.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Student Quick Start Guide Prepared by: Information Services Division Perpustakaan Sultan Abdul Samad Universiti Putra Malaysia
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Data analytics and mash-up Real time analytics of employment data Team Shadowfax 1/25/2016 CMPE Class Project 0.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
Vertical Search for Courses of UIUC Homepage Classification The aim of the Course Search project is to construct a database of UIUC courses across all.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Using Hand Gestures for Alternative User Verification
Keystroke Biometric Studies
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Smart IT Job Advisor and Analysis on web application
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Secure and Privacy-Preserving User Authentication Using Biometrics
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Dynamic Authentication of Typing Patterns
Keystroke Biometric System
Evaluation of a Stylometry System on Various Length Portions of Books
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Dynamic Authentication of Typing Patterns
PubMed Search Options (Basic Course: Module 6)
FAFSA on the Web Simplification
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji Mary Varghese ; Michael Tevnan

Contents 1. Introduction 2. New System 3. Experimental Results 4. Conclusion 5. Future Studies 6. Demo

 Previous Work  Pace University has 5+ years in keystroke biometrics research.  Built a complex system of interworking JAVA and PHP programs to support academic research in biometrics.  System can successfully identify and authenticate individuals with a relatively high degree of accuracy especially during same time periods. Introduction

 Objectives Modifies the existing systems toward practical usage. Attempts to verify users taking an online test based on the characteristics of their typing. Analyze results on new input data. Present possible methods for determining instant authentication. Current Study

Results New System Overview SubjectRegistrationSubjectRegistration Classifier (BAS) Test Taker Applet SubjectDemographic KeystrokeEntryKeystrokeEntry Raw File Actual Text File Client Reviews Test Feature Extractor (BioFeature)

New System New System consists of the following: 1. A PHP Website registers the user. 2. A modified Java applet captures 300 keystrokes and produces two files: a raw data file and a text file. 3. A Java program, BioFeature, extracts 239 feature measurements. 4. A Java program, Biometric Authentication System (BAS), performs authentication tests.

Test-Taker Authentication System  Feature Extraction – BioFeature Extracts 239 features from raw data collected from applets Ex. Features file  Authentication Classifier Uses 2 features files One is trained-on and the other is tested-on. Returns False Acceptance Rate (FAR), False Rejection Rate (FRR) & combined performance Ex. BAS results (html file)

Authentication Classifier  Authentication Transformation feature space (left) feature distance space (right)

Experimental Design: Data Sets 1. Team member Data: 5 samples of free text using enrollment applet (~650 keystrokes) 5 samples of free text data using test-taker applet (~300 keystrokes) 2. Outsider Sample: 5 samples of free text data using test-taker applet (~300 keystrokes) 3. Original 36 subjects from 2006 Study: 5 samples of laptop free text using enrollment applet (~650 keystrokes)

Test | Train 5 | 5 6 | 5 5 | 6 FRR 0.0%(0/50) 6.0%(3/50) 0.0%(0/60) 12.0%(6/50) FAR 4.8%(12/250) 1.2%(3/250) 11.2%(42/375) 0.4%(1/250) Performance 96.0%(288/300) 98.0%(294/300) 90.3%(393/435) 97.7%(293/300) Experimental Results Biometric Authentication System (BAS) results using test and enrollment samples (5 per subject) collected in the fall of 2008 Study 1: Fall 2008 Team with Outsider

Performance is high (at least 95%) with same subject testing No significant difference in results due to keystroke length (300 vs 650) Immediate drop in performance when an subject that is not enrolled is used. Increased number of subjects is recommended Study 1 Conclusions

Study 2 (partial) Test | TrainFRRFARPerformance 10 | 50.0% (0/225)27.7% (277/1000) 77.4% (948/1225) 10 | 108.4% (19/225)8.5% (85/1000)91.5% (1121/1225) 10 | 157.1% (16/225)5.9% (59/1000)93.9% (1150/1225) 10 | % (57/225)1.8% (18/1000)93.9% (1150/1225) 10 | % (66/225)1.4% (14/1000)93.5% (1145/1225) 10 | % (99/225)0.9% (9/1000)91.2% (1117/1225) 10 | % (89/225)0.6% (6/1000)92.2% (1130/1225) Study 2: Original-36 Training-on Tests Testing on combined fall 2008 enrollment and test-taker samples (10 per subject) and training on original-36 subject samples (5 per subject).

Study 2 Conclusions  Again, keystroke length has little effect on results.  When the number of subject is large (30+), it produces a very low FAR (should be as low as possible for maximum security).  Performance increases (above 90%), FAR decreases, and FRR increases as # of subject is 10 or more.

Study 3 (partial) Test | TrainFRRFARPerformance 5 | % (5/50)11.2% (28/250)89.0% (267/300) 10 | 103.0% (3/100)23.2% (232/1000)78.6% (865/1100) 15 | 102.7% (4/150)21.6% (216/1000)80.8% (930/1150) 20 | 105.0% (10/200)57.5% (575/1000)51.3% (615/1200) 25 | 102.0% (5/250)68.1% (681/1000)45.1% (564/1250) 30 | 101.3% (4/300)72.0% (720/1000)44.3% (576/1300) 36 | 100.3% (1/360)78.5% (785/1000)42.2% (574/1360) Study 3: Original-36 Testing-on Tests Testing on original 36 subject samples (5 per subject) and training on combined fall 2008 enrollment and test-taker samples (10 per subject).

Study 3 Conclusions  Yet again, keystroke length has little effect on results.  Overall poor performance indicates that system requires adequate training data.  FAR increases substantially, and FRR decreases as # of subject is 10 or more.  Study 2 and Study 3 hint that 30 or more subjects will yield a more reliable authentication.

Future Studies  Convert the current Java programs to web applications using J2EE or PHP.  Further testing should be done with at least 30 enrolled subjects.  Use the test taker applet as individual samples to test against a large enrollment database.  Continue to modify the Authentication Classifier (BAS) to implement the proposed k-nearest-neighbor procedure. (NEXT)

Simple k-nearest-neighbor procedure W >=Accept B Totals Proposed authentication using k-nearest-neighbor procedure. Matching sets: [W B B W B B W W B B] [W W B W W W W W B W] [W B W W B B W W W W] K = 10 (the 10 nearest neighbors) W = within (accept) class B = between (reject)

Demo: Test-Taker Authentication System How to access the system (Taking the Test ):  User must first enroll into the system.  Click on the Web Link ( 2009/team4/testtakersite).  The enter same name you enrolled with and take the test in the applet

Demo: Taking the Test  Presented with five questions and must provide five answers.  Answer should be more than 50 words, based on the assumption that words are approximately 6 keystrokes in length.  Once completed, click on “Submit”  If 50 words are not meet, user will be presented with an error.

Demo: New Online Test System Logging In

New Online Test System Test Applet

New Online Test System Test Applet (continued)

New Online Test System User reached at least 300 keystrokes

Demo: Test Applet User did reach or surpass the 300 keystrokes

Q&A Thank You! Pace University