Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.

Slides:



Advertisements
Similar presentations
MP Office Activity Awareness Ian Li Machine Perception Spring 2005.
Advertisements

Brain Wave Based Authentication
Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
A Metric for Evaluating Static Analysis Tools Katrina Tsipenyuk, Fortify Software Brian Chess, Fortify Software.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Behavior-based Authentication Systems
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
SurroundSense: Mobile Phone Localization via Ambience Fingerprinting Written by Martin Azizyan, Ionut Constandache, & Romit Choudhury Presented by Craig.
Accelerometer-based Transportation Mode Detection on Smartphones
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
1 Location-Based Services Using GSM Cell Information over Symbian OS Final Year Project LYU0301 Mok Ming Fai (mfmok1) Lee Kwok Chau (leekc1)
A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe.
Gait recognition under non- standard circumstances Kjetil Holien.
6 th Annual Focus Users’ Conference Application Editor and Form Builder Presented by: Mike Morris.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Domain Modeling (with Objects). Motivation Programming classes teach – What an object is – How to create objects What is missing – Finding/determining.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.
Jeopardy Hypothesis Testing T-test Basics T for Indep. Samples Z-scores Probability $100 $200$200 $300 $500 $400 $300 $400 $300 $400 $500 $400.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Session #65 Draft Results of Quality Assurance Program Data from Award Year David Rhodes and Anne Tuccillo.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
A Viable Implementation of a Comparison Algorithm for Regions of Interest John P. Heminghous Computer Science Clemson University
Digital Image Processing CCS331 Relationships of Pixel 1.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
G53SEC 1 Authentication and Identification Who? What? Where?
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Michael Isard and Andrew Blake, IJCV 1998 Presented by Wen Li Department of Computer Science & Engineering Texas A&M University.
Handwritten Signature Verification
PRESENTATION ON BIOMETRICS
Counting How Many Words You Read
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
By: David Gelbendorf, Hila Ben-Moshe Supervisor : Alon Zvirin
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Speed Sensor Calibration
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
TRANS: T ransportation R esearch A nalysis using N LP Technique S Hyoungtae Cho, Melissa Egan, Ferhan Ture Final Presentation December 9, 2009.
Keystroke Dynamics By Hafez Barghouthi.
ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu, Sen Wang, Xu Yang, Van Jacobson, Lixia Zhang ICN ‘11 August 19 Presenter: Junghwan Song.
F-Tables & Basic Ratios. Outline of Today’s Discussion 1.Some F-Table Exercises 2.Introduction to Basic Ratios [Between-Subject ANOVA] 3.Independent Samples.
Instance-Based Learning Evgueni Smirnov. Overview Instance-Based Learning Comparison of Eager and Instance-Based Learning Instance Distances for Instance-Based.
Methodology Part 1 Research Design and Analysis
FACE RECOGNITION TECHNOLOGY
Visual Signature Verification using Affine Arc-length
NBKeyboard: An Arm-based Word-gesture keyboard
Seminar Presentation on Biometrics
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Visual-based ID Verification by Signature Tracking
Student name Student ID Degree program Area of specialization
End of day Calculator and special order parts tracking
Presentation transcript:

Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008

Presentation outline Biometrics? Problem description Experiment setup Data analysis and distance measurements Results Conclusions Further work

Biometrics – What? There are three ways of authenticating someone: – By something the person know – By something the person have – By something the person is A biometric is something a person is

Biometrics - Why? Hard to mimic unique features about a person Passwords are subject to shoulder hacking. People can forget passwords Key cards / dongles can be stolen

Biometrics – How?

Biometrics – Performance? Performance of biometric systems are measured using false positives and false negatives The difference is measured between templates and the data submitted for verification. This is the distance between users. Same users should have low distance Different users should have high distance

Problem description Using any computer mouse as authentication tool (except mouse pads or ball mouse's) Design tasks to capture mouse data Preprocessing / feature extraction Measure the distance between users (distance metrics)

Motivation It is cheap Most people have one Not threatening Alternative to passwords, do not have to remember Previous project performed showed potential to go further

Research questions What data to collect and how to analyze it? What features should be extracted and how should they be compared? Is mouse authentication a good technique alone?

Experiment setup Experiment performed with 46 participants Program with two tasks written in java to support today's major operating systems and platforms Tasks: Labyrinth and connect-the-dots

Experiment setup – Program (Labyrinth)

Experiment setup – Program (Connect-the-dots)

Experiment setup - Practical Participants performed a total of 30 session over a period of 1-2 week(s). During this period the sessions were split into 5 sessions over 6 different days. Users may become very used to doing the same tasks over and over.

Data - Filtering Program collects position data (X, Y) of mouse pointer at given time and stores. Data sampled every 10 ms. Raw data filtered with Moving Average Filter or Weighted Moving Average. Remove noise.

Data - Feature extraction Focused on labyrinth Velocity data calculated after filtering Horizontal and vertical tracks (movement) were classified Tracks extracted form velocity data and variance calculated in opposite axis

Data – Distance measurements Edit distance / Levenshtein distance used Include distance on variance Distance metrics proposed: – Applying edit distance to filtered velocity data – Analyzing tracks using edit distance – Analyzing tracks using edit distance and optionally involving variance as penalty

Results – edit distance to filtered velocity data

Results – Tracks with variance This distance metric uses the distance of the variance as a penalty First the edit distance between the tracks in the same alignment (vertical or horizontal) are calculated. This is then multiplied with the Euclidean distance of the variance in the opposite axis.

Results – Tracks with variance

Results – Tracks with penalty This metric calculates the edit distance for the tracks in the same alignment. Then a the ratio between the variances in the opposite axis is calculated. This is supplied to a function that decides the penalty factor.

Results – Tracks with variance

Conclusions Mouse authentication shows potential and should be further researched Feature extraction should be further researched Results show that using the techniques presented here is not adequate to use mouse authentication as a stand alone system

Further work Further research into features Distance metrics that uses these features How to analyze random data as produced by the connects-the-dots task Other data collection tasks