1 / 32

Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009

Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009. Team 4 Members. Sarika Chebiyam Kurt Doller Smita Ranjan Elyse Little-Torres. Keystroke Biometric System: Background. Keystroke biometrics measure typing characteristics unique to an individual

ridella
Download Presentation

Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keystroke Biometrics Test Taker Setup and Data CollectionFall 2009

  2. Team 4 Members • Sarika Chebiyam • Kurt Doller • Smita Ranjan • Elyse Little-Torres

  3. Keystroke Biometric System: Background • Keystroke biometrics measure typing characteristics unique to an individual • One application is the use to identify an individual from keystroke pattern • A second application is to authenticate an individual shows you are who you say you are • Pace exploring subject for 7 years

  4. Test-Taker Setup and Data Collection Deliverables • Obtain keystroke data samples over weekly interval using existing data collection method • Develop data collection method in stealth mode • Develop interface for professor to select course information and questions

  5. Project Work Done Redesign data collection tool in stealth mode Designed and Built new Interface for Professor Customized the existing test taker system Developed our team web page Data Collection – Request sample keystrokes Become familiar and utilize BAS system to process results Enhanced the existing Test Takers Interface http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/index.html

  6. System Overview Diagram

  7. Professor's Interface http://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/ProfessorInterface/courseInfo.php Key Features • Database Tables Created • Course Information • Student Information • Test Questions entry • Question Order Selection

  8. MySQL Tables Structure course_id students_info course_questions

  9. Professor's InterfaceCourse Information Screen

  10. Professor InterfaceStudent Information Form

  11. Professor InterfaceQuestion Entry Form

  12. Professor InterfaceQuestion Order Selection Form

  13. Test Takers Interfacehttp://utopia.csis.pace.edu/cs691/2009-2010/team4/team4/2009/Key Changes • Compatible with Netscape and IE browsers • Checks for test-taker login authentication • Error messages for Test-taker rejection • Test questions displayed one at a time in order • Data capture in Stealth operation • Ease of system portability for future work • Consolidated all Keystroke data file storage • Overall look and feel of the interface

  14. Test Taker InterfaceWelcome Screen

  15. Test Taker InterfaceLogin Screen

  16. Test Taker InterfaceKeyboard Selection

  17. Test Taker AppletKey logging data visible

  18. Test Taker Response ScreenApplet in Stealth Mode

  19. Test Taker Response ScreenMinimum Keystrokes Check

  20. Raw Keystroke Data FilesKeystroke Logging Success

  21. Authentication Test • To authenticate the user in an online test two types of tests were performed. • Within-Class Test • Between-Class Test

  22. Within-Class Test • The test file consists of two different feature vectors from the same individual. • The training file contains many feature vectors from a variety of users but not the user being authenticated. • The test resulted in a correct within-class match (FRR=0/1 or 0% and Performance=1/1 or 100%). And the same result was shown for kNN or 1, 3, 5,7, and 9.

  23. Within-Class Free Laptop Test

  24. Within-Class Free Desktop Test

  25. Between-Class Test • A between-class test is made by taking the difference between two feature vectors -- one from the impostor and one from the person the impostor claims to be. • The training set consists of difference vectors. • The test resulted in (FAR=0/1 or 0% and Performance=1/1 or 100%). The same result was shown for kNN or 1, 3, 5,7, and 9.

  26. Between-Class Free Laptop Test

  27. Between-Class Free Desktop Test

  28. Results • For 10 separate within-class tests, we got an average FRR and performance of, 10% and 90%. • For 10 separate between-class tests, we got an average FAR and performance of, 20%and 80%. • We have now shown that the existing software will perform the one-student-at-a-time testing.

  29. Future Work Investigate system for possible misuse by attempting to mimic user keystrokes Modify system to send keystroke data from java applet during test for real time results Utilize a Linux server with SSH capability for a more developer friendly experience Off/On stealth mode from professor's interface with java scripts

  30. System Demonstration • Project Webpage • Professor's Interface • Test Takers Interface

  31. Thank You ! Questions? Please email to schebiyam@gmail.com

More Related