Presentation is loading. Please wait.

Presentation is loading. Please wait.

KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.

Similar presentations


Presentation on theme: "KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing."— Presentation transcript:

1 KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing Tian, Wenyuan Xu and Song Wang Dept. of Computer Science and Engineering, University of South Carolina Chengzhang Qu School of Computer Science, Wuhan University

2 Outline  Introduction  KinWrite Architecture  Data Processing & Feature Extraction  Template Selection and Verification  Experiment and Evaluation  Conclusion 2

3 Introduction(1/4)  Authentication plays a key role in securing various resources including corporate facilities or electronic assets.  Authentication mechanisms can be divided into three categories  knowledge-based  token-based  biometrics-based. 3

4 Introduction(2/4)  There are some requirements of the system  Around-the-Clock Use.  Rapid Enrollment.  Rapid Verification.  No Unauthorized Access.  Low False Negative. 4

5 Introduction(3/4) There are some possible categories of attack :  Random Attack  Observer Attack  Content-Aware Attack  Educated Attack  Insider Attack 5

6 Introduction(4/4)  In this paper, we propose a user-friendly authentication system, called KinWrite.  allows users to choose short and easy-to-memorize passwords while providing resilience to password cracking and password theft.  For instance, a Kinect can be installed at the entrance of a building. 6

7 KinWrite Architecture 7

8 8

9 Data Processing  We construct a refined 3D-signature from a raw depth image sequence  Fingertip localization  Signature normalization  Signature smoothing 9

10 fingertip localization 10

11 Signature normalization 11

12 Signature smoothing Apply a Kalman filter to smooth the raw 3D-signatures We choose the time-independent variance as the variance of the fingertip positions. 12

13 KinWrite Architecture 13

14 Feature Selection  Position and Position Difference between Frames ◦ The fingertip position in the t-th frame : ◦ the inter-frame position difference :  Velocity :  Magnitude of acceleration :  Slope Angle :  Path Angle :  Log radius of curvature :  curvature : 14

15 15

16 Feature Processing  First, we normalize each feature such that it conforms to a normal Gaussian distribution N(0,1) over all the frames.  Second, we weigh each feature differently to achieve a better performance.  selected a small set of training samples for each signature  verified these training samples using the Dynamic Time Warping(DTW) classifier  simply consider the average verification rate over all signatures as the weight for this feature 16

17 Dynamic Time Warping (DTW) 17

18 KinWrite Architecture 18

19 Template Selection 19

20 Threshold Selection We calculate the DTW distance between the template of a user u and all the M training samples (from all the users), and sort them. 20

21 KinWrite Architecture 21

22 22 Experiment and Evaluation

23 Data Acquisition 23

24 Evaluation Matrix the number of true positives the number of false positives the number of true negatives the number of false negatives  Precision  reflects how cautious the system is to accept a user  Recall  quantifies the fraction of honest users that have been granted access out of all honest users 24

25 Evaluation Matrix the number of true positives the number of false positives the number of true negatives the number of false negatives  ROC curve  stands for receiver operating characteristic curve  a plot of true positive rate (TPR) over false positive rate (FPR)  An ideal system has 100% TPR and 0% FPR  means all honest users can pass the verification while none of the attackers can fool the system 25

26 Evaluate the impact of training size 26

27 Performance(1/2) 27

28 Performance(2/2) 28

29 29

30 30

31 Data Acquisition 31

32 Performance 32

33 Performance 33

34 Conclusion We have designed a behavior-based authentication system called KinWrite that can be used for building access control. To evaluate the performance of KinWrite, we collected 1180 samples for 35 different signatures over five months. In addition, we modelled 5 types of attackers and collected 1200 3D signature samples from 18 ‘attackers’. These results suggest that KinWrite can deny the access requests from all unauthorized users with a high probability, and honest users can acquire access with 1.3 trials on average. 34

35 35 Thanks for your listening!


Download ppt "KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing."

Similar presentations


Ads by Google