CS 691 - Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.

Slides:



Advertisements
Similar presentations
Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Advertisements

Decision Errors and Power
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Hypothesis testing Week 10 Lecture 2.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
Evaluating Hypotheses Chapter 9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics.
Chapter 11: Sequential Clinical Trials Descriptive Exploratory Experimental Describe Find Cause Populations Relationships and Effect Sequential Clinical.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
System Design and Analysis
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Evaluating Hypotheses Chapter 9 Homework: 1-9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics ~
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Validating and Improving Test-Case Effectiveness Author: Yuri Chernak Presenter: Lam, Man Tat.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Descriptive Statistics
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Statistics: Communicating with Numbers By Sanjiv Jaggia.
The problem of sampling error in psychological research We previously noted that sampling error is problematic in psychological research because differences.
CSCI 347 / CS 4206: Data Mining Module 06: Evaluation Topic 01: Training, Testing, and Tuning Datasets.
AM Recitation 2/10/11.
Introduction to Systems Analysis and Design Trisha Cummings.
© 2011 Pearson Prentice Hall, Salkind. Introducing Inferential Statistics.
Chapter 8 Introduction to Hypothesis Testing
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
The WinMine Toolkit Max Chickering. Build Statistical Models From Data Dependency Networks Bayesian Networks Local Distributions –Trees Multinomial /
Feature selection LING 572 Fei Xia Week 4: 1/29/08 1.
Mapping in Surveys Uses of maps: Plan operations Facilitate data collection Presentation and analysis of results There are two main categories of maps:
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Quantitative Research 2
Biometric for Network Security. Finger Biometrics.
CHAPTER OVERVIEW Say Hello to Inferential Statistics The Idea of Statistical Significance Significance Versus Meaningfulness Meta-analysis.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Introduction to System Analysis and Design MADE BY: SIR NASEEM AHMED KHAN DOW VOCATIONAL & TECHNICAL TRAINING CENTRE.
Statistics (cont.) Psych 231: Research Methods in Psychology.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Chapter 8 Introducing Inferential Statistics.
Keystroke Biometric Studies
Dr.MUSTAQUE AHMED MBBS,MD(COMMUNITY MEDICINE), FELLOWSHIP IN HIV/AIDS
Hypothesis Testing and Confidence Intervals (Part 1): Using the Standard Normal Lecture 8 Justin Kern October 10 and 12, 2017.
Statistical Inference for the Mean Confidence Interval
Project 1 Binary Classification
Dynamic Authentication of Typing Patterns
Keystroke Biometric System
Chapter Nine Part 1 (Sections 9.1 & 9.2) Hypothesis Testing
Evaluation of a Stylometry System on Various Length Portions of Books
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Towards a Personal Briefing Assistant
iSRD Spam Review Detection with Imbalanced Data Distributions
Dynamic Authentication of Typing Patterns
Psych 231: Research Methods in Psychology
Psych 231: Research Methods in Psychology
Presentation transcript:

CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System

Project Objectives Develop a biometric authentication system Develop a biometric authentication system Application coded in Java Application coded in Java Determine the feasibility of the Dichotomy Model Determine the feasibility of the Dichotomy Model Report results using standard authentication system performance statistics Report results using standard authentication system performance statistics Biometric Authentication System CS Team 5

Dichotomy Model A statistically inferable approach to establishing the individuality of a biometric Classifies two biometric samples as coming either from the same person (intra-variation) or from two different people (inter-variation) Classifies two biometric samples as coming either from the same person (intra-variation) or from two different people (inter-variation) Uses distance measure between two samples of the same class and between those of two different classes Biometric Authentication System CS Team 5

Objective of Dichotomy Model Validation of individuality of biometric data statistically Not the detection of differences of specific instances Find the individuality of the entire population based on the individuality of a sample of n people, where n is much less than the population. Allows inferential classification of individuals where large classes are involved and the whole population is not available for sampling Biometric Authentication System CS Team 5

Dichotomy vs. Polychotomy Binary decision, yes/no Authentication or Verification process A user is verified as being the person s/he claims to be More suitable for establishing individuality of a person, where number of classes is too large to completely sample, eg. population of an entire nation. One-of-many decision Identification process A user is identified from within a population of n users One-of-n response Biometric Authentication System CS Team 5

Original Feature Vector Data File Biometric Authentication System CS Team 5

Dichotomy Converted File Biometric Authentication System CS Team 5

Dichotomy Conversion Example First row : First row : SAME, 254, | |,.. SAME, 254, | |,.. Fifth row : Fifth row : DIFF, 254, | |,.. DIFF, 254, | |,.. Total number of Total number of Intra (SAME) class data samples : Intra (SAME) class data samples : m * (m-1) * n /2 m * (m-1) * n /2 Inter (DIFF) class data samples : Inter (DIFF) class data samples : m * m * n * (n-1) /2 m * m * n * (n-1) /2 Where Where n = number of subjects n = number of subjects m = number samples from each subject m = number samples from each subject For the given example : For the given example : Intra-class size = 40; Inter-class size = 150; n=4, m=5 Intra-class size = 40; Inter-class size = 150; n=4, m=5 Biometric Authentication System CS Team 5

Polychotomy to Dichotomy Conversion Reference: Biometric Authentication System CS Team 5

System Evaluation FRR (False Reject Rate) FRR (False Reject Rate) Same person’s biometric data identified as coming from two different people Same person’s biometric data identified as coming from two different people FAR (False Accept Rate) FAR (False Accept Rate) Biometric data provided by two different people are classified as coming from the same person Biometric data provided by two different people are classified as coming from the same person System Performance System Performance Biometric data correctly classified Biometric data correctly classified Biometric Authentication System CS Team 5

Project Specifications Convert training and testing files of n-class feature data into files of 2-class (inter and intra- class) dichotomy-model feature data Convert training and testing files of n-class feature data into files of 2-class (inter and intra- class) dichotomy-model feature data Prepare sets of inter and intra-class data for training and testing Prepare sets of inter and intra-class data for training and testing Implement the nearest-neighbor technique to obtain accuracy results on the data (Euclidean distance) Implement the nearest-neighbor technique to obtain accuracy results on the data (Euclidean distance) Biometric Authentication System CS Team 5

Application Design Decisions Allows for users to save Test Dichotomy Data both intra and inter class data sets Allows for users to save Test Dichotomy Data both intra and inter class data sets Allows for users to also save the Train Dichotomy Data both intra and inter class data sets Allows for users to also save the Train Dichotomy Data both intra and inter class data sets Users are able to view a log file of what action is currently being executed Users are able to view a log file of what action is currently being executed Results can be saved as a.html file to easily save and distribute them Results can be saved as a.html file to easily save and distribute them GUI is simple, clear and easy to use GUI is simple, clear and easy to use Biometric Authentication System CS Team 5

Application Demonstration Biometric Authentication System CS Team 5

Biometric Authentication System Tutorial

Experimental Results Experiments Performed on data obtained from Experiments Performed on data obtained from Mouse Movement biometric system Mouse Movement biometric system Stylometry biometric system Stylometry biometric system Keystroke biometric system Keystroke biometric system Results show Results show Overall System Performance % Overall System Performance % FRR (False Reject Rate) % FRR (False Reject Rate) % FAR (False Accept Rate) % FAR (False Accept Rate) %

Mouse Movement Results Different subjects same conditions Intra-Inter class Sizes FRR (%)FAR (%)Performance (%) TrainTest Biometric Authentication System CS Team 5  Training set : 115 samples from 5 subjects  30 samples each from 3 subjects, 15 samples from 1 subject, 10 samples from 1 subject  Testing set : 90 samples from other 5 subjects  10 samples from 3 subjects, 30 samples each from 2 subjects

Mouse Movement Results Using all subjects; train and test sets captured 3 weeks apart Intra-Inter class Sizes FRR (%)FAR (%)Performance (%) TrainTest Biometric Authentication System CS Team 5  Training set : 50 samples from all 5 subjects  10 samples from each 5 subjects  Testing set : 50 samples from all 5 subjects  10 samples from each 5 subjects ; approximately 3 week interval

Stylometry Results Different subjects same conditions Intra-Inter class Sizes FRR (%)FAR (%)Performance (%) TrainTest Biometric Authentication System CS Team 5  Training set : 60 samples from 6 subjects  10 samples from each 6 subjects  Testing set : 60 samples from other 6 subjects  10 samples from each 6 subjects

Stylometry Results Train and test set on all subjects by dividing the samples Intra-Inter class Sizes FRR (%)FAR (%)Performance (%) TrainTest Biometric Authentication System CS Team 5  Training set : 60 samples from all 12 subjects  5 samples from each 12 subjects  Testing set : 60 samples from all 12 subjects  5 samples from each 12 subjects

Keystroke Results Keystroke Results Different Subjects Same Conditions Conditions Intra-Inter Class Sizes FRR (%) FAR (%)Performance (%) TrainTest Desktop/ Copy Laptop/ Copy Desktop/ Free Laptop/ Free Biometric Authentication System CS Team 5  Training set : 90 samples from 18 subjects  5 samples from each 18 subjects  Testing set : 90 samples from other 18 subjects  5 samples from each 18 subjects; all intra-inter data used

Keystroke Results Keystroke Results Different Subjects Same Conditions – Using a randomized set of 500 inter-class data Conditions Intra-Inter Class Sizes FRR (%) FAR (%) Performance (%) TrainTest Desktop/ Copy Laptop/ Copy Desktop/ Free Laptop/ Free Biometric Authentication System CS Team 5  Training set : 90 samples from 18 subjects  5 samples from each 18 subjects  Testing set : 90 samples from other 18 subjects  5 samples from each 18 subjects; 500 intra-inter sets used

Keystroke Results Keystroke Results Test results for “old” keystroke data (180 samples : 36 subjects 5 samples each) on same subjects and different conditions. ConditionsIntra-Inter Class Sizes FRR (%) FAR (%)Performance (%) TrainTestTrainTest Desktop/ Copy Desktop/ Free Desktop/ Free Desktop/ Copy Laptop/ Copy Laptop/ Free Laptop/ Free Laptop/ Copy Desktop/ Copy Laptop/ Copy Laptop/ Copy Desktop/ Copy Desktop/ Free Laptop/ Free Laptop/ Free Desktop/ Free Desktop/ Copy Laptop/ Free Laptop/ Free Desktop/ Copy Desktop/ Free Laptop/ Copy Laptop/ Copy Desktop/ Free Biometric Authentication System CS Team 5

Keystroke Results Keystroke Results Longitudinal authentication test results on same subjects and conditions but at two-week data collection interval. Condition Intra-Inter Class Sizes FRR (%)FAR (%)Performance (%) TrainTest Desktop/ Copy Laptop/ Copy Desktop/ Free Laptop/ Free Biometric Authentication System CS Team 5  Training set (baseline) : 20 samples from 4 subjects  5 samples from each 4 subjects  Testing set (2-week interval): 20 samples from 4 subjects  5 samples from each 4 subjects

Keystroke Results Keystroke Results Longitudinal authentication test results on same subjects and conditions but at four-week data collection interval. Condition Intra-Inter class Sizes FRR (%)FAR (%)Performance (%) TrainTest Desktop/ Copy Laptop/ Copy Desktop/ Free Laptop/ Free Biometric Authentication System CS Team 5  Training set (baseline) : 20 samples from 4 subjects  5 samples from each 4 subjects  Testing set (4-week interval): 20 samples from 4 subjects  5 samples from each 4 subjects

Project Achievements Utilized the dichotomy model in the authentication of biometric data obtained from the Keystroke, Stylometry and Mouse Movement biometric systems. Sought to establish that the dichotomy model is the preferred model over the polychotomy model when dealing with an enormous number of classes where the whole population is not available for sampling, that it is the statistically inferable approach. Biometric Authentication System CS Team 5

Summary of Results For the mouse movement and stylometry biometric data – small number of users (classes) For the mouse movement and stylometry biometric data – small number of users (classes) System performance : between 66% and 76% System performance : between 66% and 76% FAR and FRR : high FAR and FRR : high For the keystroke biometric data - large number of users (classes) For the keystroke biometric data - large number of users (classes) System performance : above 90% in most cases System performance : above 90% in most cases FAR : less than 15% in most cases FAR : less than 15% in most cases FRR : almost always less than 10%. FRR : almost always less than 10%. Biometric Authentication System CS Team 5

Conclusion The results on the keystroke biometric data are encouraging and indicate that the dichotomy model may be a feasible solution to the authentication problem when a large number of classes are involved. The results on the keystroke biometric data are encouraging and indicate that the dichotomy model may be a feasible solution to the authentication problem when a large number of classes are involved. Biometric Authentication System CS Team 5

Future Work Comparative analysis of the dichotomy authentication results with polychotomy authentication results obtained on the same keystroke biometric data. Comparative analysis of the dichotomy authentication results with polychotomy authentication results obtained on the same keystroke biometric data. Study to see whether the results for the mouse movement and stylometry data improved significantly as the sample sizes increased. Study to see whether the results for the mouse movement and stylometry data improved significantly as the sample sizes increased. Biometric Authentication System CS Team 5

Biometric Authentication System CS Team 5 Please Visit Our Website ahttp://utopia.csis.pace.edu/cs691/ /team5/index.html To obtain the latest downloads and information please visit us online.

Thank you Biometric Authentication System CS Team 5