Download presentation
Presentation is loading. Please wait.
1
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009
2
Team 4 Members Sarika Chebiyam Sarika Chebiyam Kurt Doller Kurt Doller Smita Ranjan Smita Ranjan Elyse Little-Torres Elyse Little-Torres
3
Keystroke Biometric System: Background Keystroke biometrics measure typing characteristics unique to an individual Keystroke biometrics measure typing characteristics unique to an individual One application is the use to identify an individual from keystroke pattern One application is the use to identify an individual from keystroke pattern A second application is to authenticate an individual shows you are who you say you are A second application is to authenticate an individual shows you are who you say you are Pace exploring subject for 7 years Pace exploring subject for 7 years
4
Test-Taker Setup and Data Collection Deliverables Obtain keystroke data samples over weekly interval using existing data collection method Obtain keystroke data samples over weekly interval using existing data collection method Develop data collection method in stealth mode Develop data collection method in stealth mode Develop interface for professor to select course information and questions Develop interface for professor to select course information and questions
5
Project Work Done Redesign data collection tool in stealth mode Redesign data collection tool in stealth mode Designed and Built new Interface for Professor Designed and Built new Interface for Professor Customized the existing test taker system Customized the existing test taker system Developed our team web page Developed our team web page Data Collection – Request sample keystrokes Data Collection – Request sample keystrokes Become familiar and utilize BAS system to process results Become familiar and utilize BAS system to process results Enhanced the existing Test Takers Interface Enhanced the existing Test Takers Interface http://utopia.csis.pace.edu/cs691/2009- 2010/team4/team4/index.html http://utopia.csis.pace.edu/cs691/2009- 2010/team4/team4/index.html http://utopia.csis.pace.edu/cs691/2009- 2010/team4/team4/index.html http://utopia.csis.pace.edu/cs691/2009- 2010/team4/team4/index.html
6
System Overview Diagram
8
Professor's Interface http://utopia.csis.pace.edu/cs691/2009- 2010/team4/team4/2009/ProfessorInterface/courseInfo.php Database Tables Created Course Information Student Information Test Questions entry Question Order Selection Key Features
9
MySQL Tables Structure course_id students_info course_questions
10
Professor's Interface Course Information Screen
11
Professor Interface Student Information Form
12
Professor Interface Question Entry Form
13
Professor Interface Question Order Selection Form
14
Test Takers Interface http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/ Key Changes http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/ Compatible with Netscape and IE browsers Compatible with Netscape and IE browsers Checks for test-taker login authentication Checks for test-taker login authentication Error messages for Test-taker rejection Error messages for Test-taker rejection Test questions displayed one at a time in order Test questions displayed one at a time in order Data capture in Stealth operation Data capture in Stealth operation Ease of system portability for future work Ease of system portability for future work Consolidated all Keystroke data file storage Consolidated all Keystroke data file storage Overall look and feel of the interface Overall look and feel of the interface
15
Test Taker Interface Welcome Screen
16
Test Taker Interface Login Screen
17
Test Taker Interface Keyboard Selection
18
Test Taker Applet Key logging data visible
19
Test Taker Response Screen Applet in Stealth Mode
20
Test Taker Response Screen Minimum Keystrokes Check
21
Raw Keystroke Data Files Keystroke Logging Success
22
Authentication Test To authenticate the user in an online test two types of tests were performed. 1.Within-Class Test 2.Between-Class Test
23
Within-Class Test The test file consists of two different feature vectors from the same individual.The test file consists of two different feature vectors from the same individual. The training file contains many feature vectors from a variety of users but not the user being authenticated.The training file contains many feature vectors from a variety of users but not the user being authenticated. The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.
24
Within-Class Free Laptop Test
25
Within-Class Free Desktop Test
26
Between-Class Test A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be.A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be. The training set consists of difference vectors.The training set consists of difference vectors. The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.
27
Between-Class Free Laptop Test
28
Between-Class Free Desktop Test
29
Results For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%.For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%. For 10 separate between-class tests, we got an average FAR and performance of, 20% and 80%. For 10 separate between-class tests, we got an average FAR and performance of, 20% and 80%. We have now shown that the existing software will perform the one-student-at-a-time testing.We have now shown that the existing software will perform the one-student-at-a-time testing.
30
Future Work Investigate system for possible misuse by attempting to mimic user keystrokes Modify system to send keystroke data from java applet during test for real time results Utilize a Linux server with SSH capability for a more developer friendly experience Off/On stealth mode from professor's interface with java scripts
31
System Demonstration Project Webpage Professor's Interface Professor's Interface Test Takers Interface Test Takers Interface
32
Thank You ! Questions? Please email to schebiyam@gmail.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.