1 / 35

Keystroke Biometric Authentication System

Keystroke Biometric Authentication System. Spring 2009. Team Members. Spring '09 Team Members Alpha Amatya James Aliperti Thomas Mariutto Ankoor Shah Michael Warren. Spring 2009 Focus. Web Based Authentication continued development of the test-taker authentication application

callum-pace
Download Presentation

Keystroke Biometric Authentication System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keystroke Biometric Authentication System Spring 2009

  2. Team Members Spring '09 Team Members • Alpha Amatya • James Aliperti • Thomas Mariutto • Ankoor Shah • Michael Warren

  3. Spring 2009 Focus • Web Based Authentication continued development of the test-taker authentication application • Development of New Concepts weighted & unweighted top n choices strong vs. weak enrollment • Modify Existing & Write New Programs to simulate various scoring procedures • Run Experiments to produce various scenarios

  4. Reasons for Study • Keystroke Biometrics is one of the least studied Biometrics Applications used for user authentication • Most studies use short input; passwords & user names • This study focuses on long text input – Free/Copy • Typing characteristics are said to be: 1) Unique to an individual 2) Difficult to duplicate • Very important for online test taking systems • Important for overall Computer System Security • No special equipment is needed

  5. Contents of System A PHP Website registers the user. A modified Java applet captures 300 keystrokes and produces two files: a raw data file and a text file. A Java program, BioFeature++, extracts 230 feature measurements. A Java program, Biometric Authentication System (BAS), performs authentication tests.

  6. 4 Quadrant Data Collection 36 Subjects 4 Quadrants 5 samples per quadrant Types of Data Collected • Copy Text • Free Text Entry Modes • Desktop • Laptop

  7. Keystroke Biometric Authentication System (Data Flow)‏

  8. Raw Data Sample

  9. Deliverables • Recreate authentication experiment from Keystroke Book Chapter • Rewrite user and technical manuals • Modify classifier program to produce top n Within/Between choice and distances • Create 1st, 3rd and 5th Nearest Neighbor output tables • Create output file of top 3 choices from Classifier program and obtain FRR, FAR and Performance • Create ROC curves for each of the 4 quadrant data samples • Run two small-training, strong-enrollment authentication experiments • Run big-training, strong-enrollment authentication experiments, incrementally increase training sizes • Write detailed descriptions of data formats • Investigate discrepancy between 230 and 239 Linguistic-model features

  10. Hierarchical Fallback Models • Touch-type Model- - based on keys struck by touch typists 254 distinctive measurements • Linguistic Model- -based on language and most frequently used keys 230 distinctive measurements • Increased performance results found utilizing the Linguistic Model

  11. Experimental Recreation

  12. Experimental Recreation limiting sample size to 500

  13. Top n=10 W/B Choices And Distance • The implementation compared each sample from the dichotomized test data with every sample from the dichotomized train data. • The shortest Euclidean distance was taken for n=10 choices . • This distance and the choice class , Within (W) or Between (B) was recorded. • This program was run for all four quadrants. • Each output contained 180 Within + 3825 Between = 4005 choice tables.

  14. Cross Section of Output File

  15. Overall Accuracy For n=10 Output File using 1st,3rd,& 5st Nearest Neighbors • Implemented a program to check overall accuracy on the outputs created in Deliverable 3. • Calculated FRR, FAR and performance for all the experiments in the 4 quadrants. • Precisely matched Deliverable 1 outputs using 1-Nearest Neighbor, thus proving our experiments are carried out precisely and accurately. • Resulted in a slight improvement using 3 & 5 nearest neighbors as expected.

  16. 1st and 3rd Nearest Neighbor Choice

  17. 1st, 3rd and 5th Nearest Neighbor Within and Between Choices derived using Euclidean distance

  18. Receiver Operating Characteristics (ROC curve) Graphical representation of FAR and FRR FAR- False Acceptance Rate • authenticating an imposter FRR- False Rejection Rate • rejecting a valid user Top n Nearest Neighbor Responses Unweighted each output choice counted equally Weighted first output choice (more valuable) is scored higher

  19. Receiver Operating Characteristics (ROC curve) Implementation: Weighted • Taking n=10 W/B choice output file as input, authenticated a user if 1 or more of the 10 choices is Within(W). • Each match was scored using the formula score +=(10-j+1) where score: 0 ->55 , j: 1->10& choice =W • Maximum score = 55 • Minimum score = 0 • FRR, FAR for i=0 -> 55 was calculated and ROC plotted.

  20. Receiver Operating Characteristics (ROC curve) Implementation: Unweighted • Taking n=10 W/B choice output file as input, authenticated a user if 1 or more of the 10 choices is Within(W). • Each match was scored using the formula score +=1 where score: 0 ->10 , j: 1->10& choice =W • Maximum score = 10 • Minimum score = 0 • FRR, FAR for i=0 -> 10 was calculated and ROC plotted.

  21. Laptop Copy ROC Curve

  22. Desktop Copy ROC Curve

  23. Laptop Free ROC Curve

  24. Desktop Free ROC Curve

  25. 2 big training, strong enrollment authentication experiments Train on 36 subjects and test on 18 subjects

  26. Increased Sample Size Experiments

  27. Increased Sample Size Experiments

  28. Increased Sample Size Experiments

  29. Increased Sample Size Experiments

  30. Feature measurements Duration - Calculates the average response time and the standard deviation Transition – Divided into two types Type I - short transition is the time between release and next press Type II – long transition is the time between press and the next press Percentage - Expressed as a ratio of total number of occurrences over total number of KeyStrokes Discrepancy between 239 and 230 feature measurements Additon of 6 other least frequent consonants feature group include (q,v,j,x,z,k) Removal of 15 long transition (type 2) feature group include (th, st, nd, an, in,er,es,on,at,en, or, he, re, ti, ea) Linguistic Features Identify Discrepancies

  31. Small training, strong enrollment authentication experiments

  32. Big training, strong enrollment authentication experiments. 5000, 10000 and 20000 inter-class samples

  33. Documentation Creation • User Manual • Technical Manual http://utopia.csis.pace.edu/cs691/2008-2009/team4/

  34. Future Work • Experiment to determine why Laptop input is less consistent in comparison to Desktop input • Possible reasons • Different keyboard layouts • Different body positioning during typing • Desktop are more fixed and consistent • Data should be stored in a database as opposed individual files • Older code should be re-factored in order to run more efficiently • Combine last and this semesters work into one project

  35. Conclusion • Thank you for your time and attention

More Related