Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola Garcia Cardenas, Onenetta Labeach, Vinny Monaco and James Ng Seidenberg School of Computer Science and Information Systems Pace University, White Plains, NY Student/Faculty Research Day, May 2, 2014 1
27
Embed
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems
Leigh Anne Clevenger, Laura Davis, Paola Garcia Cardenas, Onenetta Labeach, Vinny Monaco and James Ng
Seidenberg School of Computer Science and Information SystemsPace University, White Plains, NY
Student/Faculty Research Day, May 2, 2014
1
Abstract
• Some high-level biometric systems combine, or fuse, several biometrics to increase performance over that of an individual biometric system. This project investigates how to combine, at the classification output level, several Pace University biometric systems.
2
Overview
• Introduction• Multi-Biometric Fusion• Pace University Biometric Systems• Methodology• Proposed Fusion Approaches• Summary of Results• Conclusions• Future Work
3
IntroductionEnhancement of Security Systems
• 2008 Higher Education Opportunity Act In order to verify the identity of students taking online tests, the U.S Government enacted this act requiring colleges and universities to implement stricter control technologies for online systems
• There are different traits for biometric systems:
• Physical traitsFace, fingerprint, iris, retina, hand geometry, hand vein, palm print, DNA, and teeth.
• Biometric security requirements from Jain et al. include:
• Universality – each person has characteristic• Distinctiveness – characteristic different between two persons• Permanence – characteristic invariant over time• Collectability – characteristic measurable• Performance – analysis speed of biometric system• Acceptability – people will tolerate use of system• Circumvention – how easily can the system be fooled
5
IntroductionWhy a Multi-Biometric System is Needed
• To enhance overall performance of multiple biometric traits over the performance of an individual trait
• To identify online test takers authentication more efficiently
• Usage of behavioral traits:• Continuous authentication• Non-Intrusive• Cost-Effective• Process authentication over networks
6
Multi-Biometric FusionLiterature Review
Researchers have applied:
• General vector fusing algorithms at the• Feature level
• Score fusing algorithms at the• Classification level
Feature classification data are vectors of biometric input data. These vectors are combined by a classifier to produce score output used for authentication.
7
Multi-Biometric FusionBlock diagram for a generic multi-biometric system using classification output level fusion
8
Pace University Biometric Systems
• Pace University Biometric System (PBS)
• Pace University Keystroke Biometric System (PKBS)
• Pace University Systems used in Online Testing
• Pace Classifier and Simulated Authentication Process
9
Methodology
• We investigated many fusion approaches
• An accepted fusion approach would:
• Analyze our PBS score output data from online testing sessions• Work with data from sources other than online testing
sessions, for example Android data
• We narrowed the approaches down to just a few for our experimental purposes
10
MethodologyExperimental Data• Four different biometric traits were collected by Pace
University’s existing frontend system and backend classifier:
• Mouse Motion• Click• Scroll• Keystroke
• Outputs from online examinations
• 14 subjects taking 10 examinations each with 10 questions and 20 minutes duration. Sample (m) data of keystroke, click, motion and scroll were actively accumulated from each session.
11
MethodologyClassification Results
• FAR of the click trait increases as the sample data (m) increases. FRR on the other hand, decreases as more samples are added
12
MethodologyClassification Results
• The keystroke FRR and FAR results are similar to the click results; however the FRR seem to be higher when there are 100 samples and only starts decreasing significantly when it is close to the 200 samples.
13
MethodologyClassification Results
• The motion error rate is one of the traits with the better results. When up to 50~60 samples are used, the FRR and FAR are very low. The FAR only starts increasing significantly after 200 samples.
14
FRR line
MethodologyClassification Results
• This graph shows how the scroll trait is very inconsistent. It is believed that this phenomenon happens due to the fact that users do not always interact with the scrolling functionality, forcing the inconsistency of the graph.
15
MethodologyClassification Results
• In the ROC curve we can see the FAR and FRR percentages for all the four traits. Motion trait is the closest to zero.
• The local decisions (n) are combined to obtain a global decision; this combination is done by a decision fusion center (DFC):
• When this rule was applied in “Decision Fusion for Multimodel Active Authentication,” using the parallel decision fusion architecture, the global decision returned better results (lower error rate) than that of an individual decision performing at its best on its own -which is exactly the type of results we are trying to obtain for this research.
• Motion and keystroke biometric traits were the top two biometrics traits with the best performance in these studies
• Simply concatenating the feature vectors from each biometric yielded an EER of 3.9%. This is worse than the single best performer, mouse motion
19
Conclusions
• Motion data was the most accurate biometric trait / Scroll data was the most inaccurate due to different factors.
• Proposed methods of examination for classification output level fusion:
• The Chair-Varshney decision fusion rule approach • The six classifier fusion strategies (minimum, maximum, average,
median, majority vote and oracle)
20
Future Work
• Application of the proposed classification output fusion methods compared with the single measurement performances of the four individual biometric traits
• Comparison to previous EER results
• For any of these methods to be successful, we will need to yield an EER of no more than 1.139%, which is just 0.001% less than the EER of our most successful single biometric trait, motion
21
THANK YOU FOR YOUR ATTENTION!Questions?
22
MethodologyClassification Results
23
Pace University Biometric SystemsPace University Biometric System (PBS)
• PBS has a generic, robust backend system designed to accommodate various biometric frontend feature inputs like keystroke, mouse, stylometry and voice
• PBS relies on databases of approved signature templates that were enrolled and stored earlier
• PBS analyses the signature inputs against the approved data stored on the template database to verify identify and authenticate users
24
Pace University Biometric SystemsPace University Keystroke Biometric System (PKBS)
• PKBS consists of two logging components and a single backend for extracting features and classification
• Web-based loggers are loaded into any webpage and captures all keystroke and mouse movements, while buffering and transmitting them to a server
• Cross-platform native logger is written in Java
25
Pace University Biometric SystemsPace University Systems used in Online Testing
• A no-hurry system is used to authenticate user
• All keystroke data from the online testing is used
• To detect unauthorized users the system has to act in a minute or less before any harm is done
• Keystroke data is captured using a Java applet that uses the PC Windows clock to record key press and release times in millisecond format 26
Pace University Biometric SystemsPace Classifier and Simulated Authentication Process
Pace Classifier• Implements the kNN (k-Nearest Neighbor) classifier • Used to transform a multi-class (polychotomy) problem into a
dichotomy model, this is, a problem that only involves two classes. These classes are:
Simulated Authentication Process• User’s keystroke sample requiring authentication is first converted
into a feature vector. The difference between this feature vector and an earlier-obtained enrollment feature vector from this user is computed, and the resulting difference vector is classified as one of the two previous classes.