Biometric Product Investigation
There are some relatively inexpensive products and some free software available for many biometrics.
For example, several face recognition freeware applications were previously examined,
see the Research Day 2009 papers:
Face Biometric Systems
and Face Biometrics: A Longitudinal Study.
This project team will acquire several biometric software systems and evaluate their performance (more on this later).
Your first task (should take only one week) will be to create a table of the available biometric products
that includes the biometric, the company, a link to the product, and the cost
(some software may be free on a trial basis).
Your customer will purchase some of these products, and
while the products are being obtained you can work with those that are free on a trial basis.
The main tasks will be structured on completion of the first task and will require some programming.
One of the products we will almost certainly purchase is a key logger that records all keystrokes
on the machine on which it is installed.
One of these key loggers was investigated in an earlier project, see Research Day 2010 paper entitled
Keystroke Biometric: Data/Feature Experiments.
In order to test the key logger output we will convert the output of at least one of the keyloggers
into the raw-data input format of the Pace University Keystroke Biometric System.
Another task on this project might be to compare several face recognition systems
and create an interesting face recognition demonstration.
The demonstration will allow an instructor to collect face images of a class of students
and determine which students look most similar to other students in the class.
Fast Agile XP Deliverables
We will use the agile methodology,
particularly Extreme Programming (XP) which involves small releases and fast turnarounds in roughly two-week iterations.
Many of these deliverables can be done in parallel by different members or subsets of the team.
The following is the current list of deliverables
(ordered by the date initiated, deliverable modifications marked in red,
initiated date marked in bold red if programming involved,
completion date and related comments marked in green,
pseudo-code marked in blue):
- 9/30 (to be completed in one week). Completed 10/15.
Obtain a basic understanding of biometrics and review previous project work.
Investigate biometric products costing less than about $1000 each and create a list of these products that includes:
the biometric (face, finger, palm, etc.), product name and company, price (and if free trial available), and description.
If available, download trial versions for testing.
This must be done quickly because we have approximately $10K that needs to be spent in October.
- 10/15 (to be completed by midterm checkpoint 11/11) .
Working in subgroups of one or two, become familiar with and conduct preliminary tests on trial versions of the following types of products:
- Face: Develop a procedure to conduct an interesting security demonstration that compares faces of the students in a class.
Test the procedure on the face images (photos) of the students in this class to obtain a matrix of similarity scores,
allowing us to easily determine which students look most similar.
Also compare the student face images against famous people (Elvis Presley, etc.)
to determine which famous person each student most closely resembles.
Preliminary work on this was performed in an earlier project.
- Voice: Develop a procedure for an interesting security demonstration that compares voices of the students in a class.
Test the procedure on the wav files of the students in this class to obtain a matrix of similarity scores,
so it is easy to determine which students sound most similar.
Have each student record the phrase "My name is (say name)" and extract the initial portion of the speech signal "My name is"
which is in common to all the recordings.
- Keylogger: Capture the keystroke information of ten users entering short paragraphs of about 100 words in a simulated email application.
Each of the ten users should enter ten free-text (arbitrary input) paragraphs, five for training and five for testing.
Convert the format of the keylogger output into the format of the Pace University Keystroke System (PKS) -
this step requires programming.
Obtain system performance on the ten users by running the converted-format data through PKS.