Presentation is loading. Please wait.

Presentation is loading. Please wait.

Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.

Similar presentations


Presentation on theme: "Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008."— Presentation transcript:

1 Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008

2 Presentation outline Biometrics? Problem description Experiment setup Data analysis and distance measurements Results Conclusions Further work

3 Biometrics – What? There are three ways of authenticating someone: – By something the person know – By something the person have – By something the person is A biometric is something a person is

4 Biometrics - Why? Hard to mimic unique features about a person Passwords are subject to shoulder hacking. People can forget passwords Key cards / dongles can be stolen

5 Biometrics – How?

6 Biometrics – Performance? Performance of biometric systems are measured using false positives and false negatives The difference is measured between templates and the data submitted for verification. This is the distance between users. Same users should have low distance Different users should have high distance

7 Problem description Using any computer mouse as authentication tool (except mouse pads or ball mouse's) Design tasks to capture mouse data Preprocessing / feature extraction Measure the distance between users (distance metrics)

8 Motivation It is cheap Most people have one Not threatening Alternative to passwords, do not have to remember Previous project performed showed potential to go further

9 Research questions What data to collect and how to analyze it? What features should be extracted and how should they be compared? Is mouse authentication a good technique alone?

10 Experiment setup Experiment performed with 46 participants Program with two tasks written in java to support today's major operating systems and platforms Tasks: Labyrinth and connect-the-dots

11 Experiment setup – Program (Labyrinth)

12 Experiment setup – Program (Connect-the-dots)

13 Experiment setup - Practical Participants performed a total of 30 session over a period of 1-2 week(s). During this period the sessions were split into 5 sessions over 6 different days. Users may become very used to doing the same tasks over and over.

14 Data - Filtering Program collects position data (X, Y) of mouse pointer at given time and stores. Data sampled every 10 ms. Raw data filtered with Moving Average Filter or Weighted Moving Average. Remove noise.

15 Data - Feature extraction Focused on labyrinth Velocity data calculated after filtering Horizontal and vertical tracks (movement) were classified Tracks extracted form velocity data and variance calculated in opposite axis

16 Data – Distance measurements Edit distance / Levenshtein distance used Include distance on variance Distance metrics proposed: – Applying edit distance to filtered velocity data – Analyzing tracks using edit distance – Analyzing tracks using edit distance and optionally involving variance as penalty

17 Results – edit distance to filtered velocity data

18 Results – Tracks with variance This distance metric uses the distance of the variance as a penalty First the edit distance between the tracks in the same alignment (vertical or horizontal) are calculated. This is then multiplied with the Euclidean distance of the variance in the opposite axis.

19 Results – Tracks with variance

20 Results – Tracks with penalty This metric calculates the edit distance for the tracks in the same alignment. Then a the ratio between the variances in the opposite axis is calculated. This is supplied to a function that decides the penalty factor.

21 Results – Tracks with variance

22 Conclusions Mouse authentication shows potential and should be further researched Feature extraction should be further researched Results show that using the techniques presented here is not adequate to use mouse authentication as a stand alone system

23 Further work Further research into features Distance metrics that uses these features How to analyze random data as produced by the connects-the-dots task Other data collection tasks


Download ppt "Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008."

Similar presentations


Ads by Google