KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.

Slides:



Advertisements
Similar presentations
Learning Algorithm Evaluation
Advertisements

© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Other Classification Techniques 1.Nearest Neighbor Classifiers 2.Support Vector Machines.
Fusion of HMM’s Likelihood and Viterbi Path for On-line Signature Verification Bao Ly Van - Sonia Garcia Salicetti - Bernadette Dorizzi Institut National.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Behavior-based Authentication Systems
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Automatic in vivo Microscopy Video Mining for Leukocytes * Chengcui Zhang, Wei-Bang Chen, Lin Yang, Xin Chen, John K. Johnstone.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
Hidden Markov Model based 2D Shape Classification Ninad Thakoor 1 and Jean Gao 2 1 Electrical Engineering, University of Texas at Arlington, TX-76013,
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Assuming normally distributed data! Naïve Bayes Classifier.
Assessing and Comparing Classification Algorithms Introduction Resampling and Cross Validation Measuring Error Interval Estimation and Hypothesis Testing.
Model Evaluation Metrics for Performance Evaluation
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
A Data-Driven Approach to Quantifying Natural Human Motion SIGGRAPH ’ 05 Liu Ren, Alton Patrick, Alexei A. Efros, Jassica K. Hodgins, and James M. Rehg.
Robust Real-time Object Detection by Paul Viola and Michael Jones ICCV 2001 Workshop on Statistical and Computation Theories of Vision Presentation by.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
1 Integration of Background Modeling and Object Tracking Yu-Ting Chen, Chu-Song Chen, Yi-Ping Hung IEEE ICME, 2006.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Associative Learning in Hierarchical Self Organizing Learning Arrays Janusz A. Starzyk, Zhen Zhu, and Yue Li School of Electrical Engineering and Computer.
ICASSP'06 1 S. Y. Kung 1 and M. W. Mak 2 1 Dept. of Electrical Engineering, Princeton University 2 Dept. of Electronic and Information Engineering, The.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Control Charts for Attributes
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Automated malware classification based on network behavior
Evaluating Classifiers
Knowledge Acquisition from Game Records Takuya Kojima, Atsushi Yoshikawa Dept. of Computer Science and Information Engineering National Dong Hwa University.
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
Identifying Computer Graphics Using HSV Model And Statistical Moments Of Characteristic Functions Xiao Cai, Yuewen Wang.
Digital Camera and Computer Vision Laboratory Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, R.O.C.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Model Evaluation l Metrics for Performance Evaluation –How to evaluate the performance of a model? l Methods for Performance Evaluation –How to obtain.
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz.
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
Michael Isard and Andrew Blake, IJCV 1998 Presented by Wen Li Department of Computer Science & Engineering Texas A&M University.
Su-ting, Chuang 2010/8/2. Outline Introduction Related Work System and Method Experiment Conclusion & Future Work 2.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Post-Ranking query suggestion by diversifying search Chao Wang.
Su-ting, Chuang 1. Outline Introduction Related work Hardware configuration Detection system Optimal parameter estimation framework Conclusion 2.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
A New Method for Crater Detection Heather Dunlop November 2, 2006.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
1 CHAPTER (7) Attributes Control Charts. 2 Introduction Data that can be classified into one of several categories or classifications is known as attribute.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
Combining Evolutionary Information Extracted From Frequency Profiles With Sequence-based Kernels For Protein Remote Homology Detection Name: ZhuFangzhi.
Evaluating Classifiers Reading: T. Fawcett, An introduction to ROC analysis, Sections 1-4, 7 (linked from class website)An introduction to ROC analysis.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
Dynamic Background Learning through Deep Auto-encoder Networks Pei Xu 1, Mao Ye 1, Xue Li 2, Qihe Liu 1, Yi Yang 2 and Jian Ding 3 1.University of Electronic.
Evaluating Classifiers. Reading for this topic: T. Fawcett, An introduction to ROC analysis, Sections 1-4, 7 (linked from class website)
Zhaoxia Fu, Yan Han Measurement Volume 45, Issue 4, May 2012, Pages 650–655 Reporter: Jing-Siang, Chen.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Voice Activity Detection Based on Sequential Gaussian Mixture Model Zhan Shen, Jianguo Wei, Wenhuan Lu, Jianwu Dang Tianjin Key Laboratory of Cognitive.
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Evaluating Classifiers
Yun-FuLiu Jing-MingGuo Che-HaoChang
Visual Signature Verification using Affine Arc-length
Data Mining Classification: Alternative Techniques
A Framework of Remote Biometric Authentication on the Open Network
Visual-based ID Verification by Signature Tracking
Using Clustering to Make Prediction Intervals For Neural Networks
Presentation transcript:

KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing Tian, Wenyuan Xu and Song Wang Dept. of Computer Science and Engineering, University of South Carolina Chengzhang Qu School of Computer Science, Wuhan University

Outline  Introduction  KinWrite Architecture  Data Processing & Feature Extraction  Template Selection and Verification  Experiment and Evaluation  Conclusion 2

Introduction(1/4)  Authentication plays a key role in securing various resources including corporate facilities or electronic assets.  Authentication mechanisms can be divided into three categories  knowledge-based  token-based  biometrics-based. 3

Introduction(2/4)  There are some requirements of the system  Around-the-Clock Use.  Rapid Enrollment.  Rapid Verification.  No Unauthorized Access.  Low False Negative. 4

Introduction(3/4) There are some possible categories of attack :  Random Attack  Observer Attack  Content-Aware Attack  Educated Attack  Insider Attack 5

Introduction(4/4)  In this paper, we propose a user-friendly authentication system, called KinWrite.  allows users to choose short and easy-to-memorize passwords while providing resilience to password cracking and password theft.  For instance, a Kinect can be installed at the entrance of a building. 6

KinWrite Architecture 7

8

Data Processing  We construct a refined 3D-signature from a raw depth image sequence  Fingertip localization  Signature normalization  Signature smoothing 9

fingertip localization 10

Signature normalization 11

Signature smoothing Apply a Kalman filter to smooth the raw 3D-signatures We choose the time-independent variance as the variance of the fingertip positions. 12

KinWrite Architecture 13

Feature Selection  Position and Position Difference between Frames ◦ The fingertip position in the t-th frame : ◦ the inter-frame position difference :  Velocity :  Magnitude of acceleration :  Slope Angle :  Path Angle :  Log radius of curvature :  curvature : 14

15

Feature Processing  First, we normalize each feature such that it conforms to a normal Gaussian distribution N(0,1) over all the frames.  Second, we weigh each feature differently to achieve a better performance.  selected a small set of training samples for each signature  verified these training samples using the Dynamic Time Warping(DTW) classifier  simply consider the average verification rate over all signatures as the weight for this feature 16

Dynamic Time Warping (DTW) 17

KinWrite Architecture 18

Template Selection 19

Threshold Selection We calculate the DTW distance between the template of a user u and all the M training samples (from all the users), and sort them. 20

KinWrite Architecture 21

22 Experiment and Evaluation

Data Acquisition 23

Evaluation Matrix the number of true positives the number of false positives the number of true negatives the number of false negatives  Precision  reflects how cautious the system is to accept a user  Recall  quantifies the fraction of honest users that have been granted access out of all honest users 24

Evaluation Matrix the number of true positives the number of false positives the number of true negatives the number of false negatives  ROC curve  stands for receiver operating characteristic curve  a plot of true positive rate (TPR) over false positive rate (FPR)  An ideal system has 100% TPR and 0% FPR  means all honest users can pass the verification while none of the attackers can fool the system 25

Evaluate the impact of training size 26

Performance(1/2) 27

Performance(2/2) 28

29

30

Data Acquisition 31

Performance 32

Performance 33

Conclusion We have designed a behavior-based authentication system called KinWrite that can be used for building access control. To evaluate the performance of KinWrite, we collected 1180 samples for 35 different signatures over five months. In addition, we modelled 5 types of attackers and collected D signature samples from 18 ‘attackers’. These results suggest that KinWrite can deny the access requests from all unauthorized users with a high probability, and honest users can acquire access with 1.3 trials on average. 34

35 Thanks for your listening!