User authentication through biometric sensors and decision fusion

Sayandeep Acharya, Alex Fridman, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The interaction between humans and most desktop and laptop computers is often performed through two input devices: the keyboard and the mouse. Continuous tracking of these devices provides an opportunity to verify the identity of a user, based on a profile of behavioral biometrics from the user's previous interaction with these devices. We propose a bank of sensors, each feeding a binary detector (trying to distinguish the authentic user from all others). In this study the detectors use features derived from the keyboard and the mouse, and their decisions are fused to develop a global authentication decision. The binary classification of the individual features is developed using Naive Bayes Classifiers which play the role of local detectors in a parallel binary decision fusion architecture. The conclusion of each classifier (ï¿ï¿ï¿authentic userï¿ï ¿ï¿ or ï¿ï¿ï¿otherï ¿ï¿ï¿) is sent to a Decision Fusion Center (DFC) where we use the Neyman-Pearson criterion to maximize the probability of detection under an upper bound on the probability of false alarms.We compute the receiver operating characteristic (ROC) of the resulting detection scheme, and use the ROC to assess the contribution of each individual sensor to the quality of the global decision on user authenticity. In this manner we identify the characteristics (and local detectors) that are most significant to the development of correct user authentication. While the false accept rate (FAR) and false reject rate (FRR) are fixed for the local sensors, the fusion center provides trade-off between the two global error rates, and allows the designer to fix an operating point based on his/her tolerance level of false alarms. We test our approach on a real-world dataset collected from 10 office workers, who worked for a week in an office environment as we tracked their keyboard dynamics and mouse movements during interaction with laptops and desktop computers.

    Original languageEnglish (US)
    Title of host publication2013 47th Annual Conference on Information Sciences and Systems, CISS 2013
    DOIs
    StatePublished - Aug 20 2013
    Event2013 47th Annual Conference on Information Sciences and Systems, CISS 2013 - Baltimore, MD, United States
    Duration: Mar 20 2013Mar 22 2013

    Publication series

    Name2013 47th Annual Conference on Information Sciences and Systems, CISS 2013

    Other

    Other2013 47th Annual Conference on Information Sciences and Systems, CISS 2013
    CountryUnited States
    CityBaltimore, MD
    Period3/20/133/22/13

    Fingerprint

    Biometrics
    Authentication
    Fusion reactions
    Detectors
    Laptop computers
    Sensors
    Personal computers
    Classifiers

    Keywords

    • Active Au-thentication
    • Behavioral Biometrics
    • Binary Classification
    • Decision Fusion

    ASJC Scopus subject areas

    • Information Systems

    Cite this

    Acharya, S., Fridman, A., Brennan, P., Juola, P., Greenstadt, R., & Kam, M. (2013). User authentication through biometric sensors and decision fusion. In 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013 [6552271] (2013 47th Annual Conference on Information Sciences and Systems, CISS 2013). https://doi.org/10.1109/CISS.2013.6552271

    User authentication through biometric sensors and decision fusion. / Acharya, Sayandeep; Fridman, Alex; Brennan, Patrick; Juola, Patrick; Greenstadt, Rachel; Kam, Moshe.

    2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. 2013. 6552271 (2013 47th Annual Conference on Information Sciences and Systems, CISS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Acharya, S, Fridman, A, Brennan, P, Juola, P, Greenstadt, R & Kam, M 2013, User authentication through biometric sensors and decision fusion. in 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013., 6552271, 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013, 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013, Baltimore, MD, United States, 3/20/13. https://doi.org/10.1109/CISS.2013.6552271
    Acharya S, Fridman A, Brennan P, Juola P, Greenstadt R, Kam M. User authentication through biometric sensors and decision fusion. In 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. 2013. 6552271. (2013 47th Annual Conference on Information Sciences and Systems, CISS 2013). https://doi.org/10.1109/CISS.2013.6552271
    Acharya, Sayandeep ; Fridman, Alex ; Brennan, Patrick ; Juola, Patrick ; Greenstadt, Rachel ; Kam, Moshe. / User authentication through biometric sensors and decision fusion. 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013. 2013. (2013 47th Annual Conference on Information Sciences and Systems, CISS 2013).
    @inproceedings{16da474a61d34d748f6e4a8d9ec941fa,
    title = "User authentication through biometric sensors and decision fusion",
    abstract = "The interaction between humans and most desktop and laptop computers is often performed through two input devices: the keyboard and the mouse. Continuous tracking of these devices provides an opportunity to verify the identity of a user, based on a profile of behavioral biometrics from the user's previous interaction with these devices. We propose a bank of sensors, each feeding a binary detector (trying to distinguish the authentic user from all others). In this study the detectors use features derived from the keyboard and the mouse, and their decisions are fused to develop a global authentication decision. The binary classification of the individual features is developed using Naive Bayes Classifiers which play the role of local detectors in a parallel binary decision fusion architecture. The conclusion of each classifier ({\"i}¿{\"i}¿{\"i}¿authentic user{\"i}¿{\"i} ¿{\"i}¿ or {\"i}¿{\"i}¿{\"i}¿other{\"i} ¿{\"i}¿{\"i}¿) is sent to a Decision Fusion Center (DFC) where we use the Neyman-Pearson criterion to maximize the probability of detection under an upper bound on the probability of false alarms.We compute the receiver operating characteristic (ROC) of the resulting detection scheme, and use the ROC to assess the contribution of each individual sensor to the quality of the global decision on user authenticity. In this manner we identify the characteristics (and local detectors) that are most significant to the development of correct user authentication. While the false accept rate (FAR) and false reject rate (FRR) are fixed for the local sensors, the fusion center provides trade-off between the two global error rates, and allows the designer to fix an operating point based on his/her tolerance level of false alarms. We test our approach on a real-world dataset collected from 10 office workers, who worked for a week in an office environment as we tracked their keyboard dynamics and mouse movements during interaction with laptops and desktop computers.",
    keywords = "Active Au-thentication, Behavioral Biometrics, Binary Classification, Decision Fusion",
    author = "Sayandeep Acharya and Alex Fridman and Patrick Brennan and Patrick Juola and Rachel Greenstadt and Moshe Kam",
    year = "2013",
    month = "8",
    day = "20",
    doi = "10.1109/CISS.2013.6552271",
    language = "English (US)",
    isbn = "9781467352376",
    series = "2013 47th Annual Conference on Information Sciences and Systems, CISS 2013",
    booktitle = "2013 47th Annual Conference on Information Sciences and Systems, CISS 2013",

    }

    TY - GEN

    T1 - User authentication through biometric sensors and decision fusion

    AU - Acharya, Sayandeep

    AU - Fridman, Alex

    AU - Brennan, Patrick

    AU - Juola, Patrick

    AU - Greenstadt, Rachel

    AU - Kam, Moshe

    PY - 2013/8/20

    Y1 - 2013/8/20

    N2 - The interaction between humans and most desktop and laptop computers is often performed through two input devices: the keyboard and the mouse. Continuous tracking of these devices provides an opportunity to verify the identity of a user, based on a profile of behavioral biometrics from the user's previous interaction with these devices. We propose a bank of sensors, each feeding a binary detector (trying to distinguish the authentic user from all others). In this study the detectors use features derived from the keyboard and the mouse, and their decisions are fused to develop a global authentication decision. The binary classification of the individual features is developed using Naive Bayes Classifiers which play the role of local detectors in a parallel binary decision fusion architecture. The conclusion of each classifier (ï¿ï¿ï¿authentic userï¿ï ¿ï¿ or ï¿ï¿ï¿otherï ¿ï¿ï¿) is sent to a Decision Fusion Center (DFC) where we use the Neyman-Pearson criterion to maximize the probability of detection under an upper bound on the probability of false alarms.We compute the receiver operating characteristic (ROC) of the resulting detection scheme, and use the ROC to assess the contribution of each individual sensor to the quality of the global decision on user authenticity. In this manner we identify the characteristics (and local detectors) that are most significant to the development of correct user authentication. While the false accept rate (FAR) and false reject rate (FRR) are fixed for the local sensors, the fusion center provides trade-off between the two global error rates, and allows the designer to fix an operating point based on his/her tolerance level of false alarms. We test our approach on a real-world dataset collected from 10 office workers, who worked for a week in an office environment as we tracked their keyboard dynamics and mouse movements during interaction with laptops and desktop computers.

    AB - The interaction between humans and most desktop and laptop computers is often performed through two input devices: the keyboard and the mouse. Continuous tracking of these devices provides an opportunity to verify the identity of a user, based on a profile of behavioral biometrics from the user's previous interaction with these devices. We propose a bank of sensors, each feeding a binary detector (trying to distinguish the authentic user from all others). In this study the detectors use features derived from the keyboard and the mouse, and their decisions are fused to develop a global authentication decision. The binary classification of the individual features is developed using Naive Bayes Classifiers which play the role of local detectors in a parallel binary decision fusion architecture. The conclusion of each classifier (ï¿ï¿ï¿authentic userï¿ï ¿ï¿ or ï¿ï¿ï¿otherï ¿ï¿ï¿) is sent to a Decision Fusion Center (DFC) where we use the Neyman-Pearson criterion to maximize the probability of detection under an upper bound on the probability of false alarms.We compute the receiver operating characteristic (ROC) of the resulting detection scheme, and use the ROC to assess the contribution of each individual sensor to the quality of the global decision on user authenticity. In this manner we identify the characteristics (and local detectors) that are most significant to the development of correct user authentication. While the false accept rate (FAR) and false reject rate (FRR) are fixed for the local sensors, the fusion center provides trade-off between the two global error rates, and allows the designer to fix an operating point based on his/her tolerance level of false alarms. We test our approach on a real-world dataset collected from 10 office workers, who worked for a week in an office environment as we tracked their keyboard dynamics and mouse movements during interaction with laptops and desktop computers.

    KW - Active Au-thentication

    KW - Behavioral Biometrics

    KW - Binary Classification

    KW - Decision Fusion

    UR - http://www.scopus.com/inward/record.url?scp=84881505288&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84881505288&partnerID=8YFLogxK

    U2 - 10.1109/CISS.2013.6552271

    DO - 10.1109/CISS.2013.6552271

    M3 - Conference contribution

    AN - SCOPUS:84881505288

    SN - 9781467352376

    T3 - 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013

    BT - 2013 47th Annual Conference on Information Sciences and Systems, CISS 2013

    ER -