320 likes | 334 Views
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009. Team 4 Members. Sarika Chebiyam Kurt Doller Smita Ranjan Elyse Little-Torres. Keystroke Biometric System: Background. Keystroke biometrics measure typing characteristics unique to an individual
E N D
Keystroke Biometrics Test Taker Setup and Data CollectionFall 2009
Team 4 Members • Sarika Chebiyam • Kurt Doller • Smita Ranjan • Elyse Little-Torres
Keystroke Biometric System: Background • Keystroke biometrics measure typing characteristics unique to an individual • One application is the use to identify an individual from keystroke pattern • A second application is to authenticate an individual shows you are who you say you are • Pace exploring subject for 7 years
Test-Taker Setup and Data Collection Deliverables • Obtain keystroke data samples over weekly interval using existing data collection method • Develop data collection method in stealth mode • Develop interface for professor to select course information and questions
Project Work Done Redesign data collection tool in stealth mode Designed and Built new Interface for Professor Customized the existing test taker system Developed our team web page Data Collection – Request sample keystrokes Become familiar and utilize BAS system to process results Enhanced the existing Test Takers Interface http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/index.html
Professor's Interface http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/ProfessorInterface/courseInfo.php Key Features • Database Tables Created • Course Information • Student Information • Test Questions entry • Question Order Selection
MySQL Tables Structure course_id students_info course_questions
Test Takers Interfacehttp://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/Key Changes • Compatible with Netscape and IE browsers • Checks for test-taker login authentication • Error messages for Test-taker rejection • Test questions displayed one at a time in order • Data capture in Stealth operation • Ease of system portability for future work • Consolidated all Keystroke data file storage • Overall look and feel of the interface
Authentication Test • To authenticate the user in an online test two types of tests were performed. • Within-Class Test • Between-Class Test
Within-Class Test • The test file consists of two different feature vectors from the same individual. • The training file contains many feature vectors from a variety of users but not the user being authenticated. • The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.
Between-Class Test • A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be. • The training set consists of difference vectors. • The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.
Results • For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%. • For 10 separate between-class tests, we got an average FAR and performance of, 20%and 80%. • We have now shown that the existing software will perform the one-student-at-a-time testing.
Future Work Investigate system for possible misuse by attempting to mimic user keystrokes Modify system to send keystroke data from java applet during test for real time results Utilize a Linux server with SSH capability for a more developer friendly experience Off/On stealth mode from professor's interface with java scripts
System Demonstration • Project Webpage • Professor's Interface • Test Takers Interface
Thank You ! Questions? Please email to schebiyam@gmail.com