Presentation is loading. Please wait.

Presentation is loading. Please wait.

Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.

Similar presentations


Presentation on theme: "Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case."— Presentation transcript:

1 Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case for the usefulness of the study How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature

2 Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification (2009), edited by Liang Wang and Xin Geng Authors Charles C. Tappert, Mary Villani, and Sung-Hyuk Cha Summarizes keystroke biometric work 2005-2008 3 DPS dissertations 2 on identification, 1 on missing/incomplete data About 6 masters-level projects New material – authentication, longitudinal, touch-type model

3 Keystroke Biometric Studies Build a Case for Usefulness of Study Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of scope and methodology Summary of paper organization

4 Keystroke Biometric Studies Validate importance of study – describe important applications Internet authentication application Authenticate (verify) student test-takers Internet identification application Identify perpetrators of inappropriate email Internet security for other applications Important as more businesses move toward e-commerce

5 Keystroke Biometric Studies Define Keystroke Biometric The keystroke biometric is one of the less-studied behavioral biometrics Based on the idea that typing patterns are unique to individuals and difficult to duplicate

6 Keystroke Biometric Studies Appeal of Keystroke over other Biometrics Not intrusive – data captured as users type Users type frequently for business/pleasure Inexpensive – keyboards are common No special equipment necessary Can continue to check ID with keystrokes after initial authentication As users continue to type

7 Keystroke Biometric Studies Previous Work on the Keystroke Biometric One early study goes back to typewriter input Identification versus authentication Most studies were on authentication Two commercial products on hardening passwords Few on identification (more difficult problem) Short versus long text input Most studies used short input – passwords, names Few used long text input – copy or free text Other keystroke problems studied One study detected fatigue, stress, etc. Another detected ID change via monitoring

8 Keystroke Biometric Studies No Direct Study Comparisons on Same Data No comparisons on a standard data set (desirable, available for many biometric and pattern recognition problems) Rather, researchers collect their own data Nevertheless, literature optimistic of keystroke biometric potential for security

9 Keystroke Biometric Studies Feature Measurements Features derived from raw data Key press times and key release times Each keystroke provides small amount of data Data varies from different keyboards, different conditions, and different entered texts Using long text input allows Use of good (statistical) feature measurements Generalization over keyboards, conditions, etc.

10 Keystroke Biometric Studies Make Case for Using Data over the internet Required by applications Long text input More and better features Higher accuracy Free text input Required by applications Predefined copy texts unacceptable

11 Keystroke Biometric Studies Extends Previous Work by Authors Previous work on keystroke identification Feasibility: fixed text & same keyboard for train/test Improved system – two independent variables Ideal: same input mode & keyboard type for train/test Non-ideal: different input mode and/or different keyboard type for train/test New work Clearer presentation of improved system results Keystroke authentication system and associated studies Ideal and non-ideal conditions as above Longitudinal (over time) identification & authentication studies Hierarchical feature/fallback model and parameter studies

12 Keystroke Biometric Studies Summary of Scope and Methodology Determine distinctiveness of keystroke patterns Two application types Identification (1-of-n problem) Authentication (yes/no problem) Two indep. variables (4 data quadrants) Keyboard type – desktop versus laptop Entry mode – copy versus free text

13 Keystroke Biometric Studies Summary of Paper Organization Section 1 – introduction (described above) Section 2 – system components Data capture over internet Feature extraction Classification Section 3 – experimental design and data collection Section 4 – experimental results Identification Authentication Longitudinal studies System model and parameters Section 5 – conclusions

14 Keystroke Biometric Studies Build a Case for Usefulness of Study Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of scope and methodology Summary of paper organization

15 Keystroke Biometric Studies No Explicit Research Question or Hypotheses Implicit research question What identification and authentication performance (accuracy) can be attained by a long-text-input keystroke biometric system and how does performance vary over various controlled changes Implicit research hypotheses Performance decreases In going from ideal to non-ideal conditions As time between enrollment and testing increases As the input text length decreases

16 Keystroke Biometric Studies Summary Describe the problem being investigated Build a case for the usefulness of the study How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature


Download ppt "Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case."

Similar presentations


Ads by Google