Some high-level biometric systems combine, or fuse, several biometrics to increase performance over that of the individual biometric systems.
The "Continual Burst Authentication Strategy" section of  gives an overview of what we are trying to do.
This project will combine several biometric systems - two that we have developed and one under development.
Initially, the keystroke and stylometry systems will be combined and performance measured,
and some preliminary work in this area has been initiated by John Stewart .
Later, we will also combine the mouse movement system being developed in project 2.
Convert keystroke sequences into text
We are currently capturing data through a keylogger that captures keyboard and mouse data.
However, it does not have access to sent email or Word documents,
so if we want stylometry information (linguistic level word and syntax information) we must obtain it from the keystroke data.
Therefore, the text data for stylometry analysis will be obtained by converting keystroke input back into text,
and it is possible to come close to getting it correct except for mouse editing.
For example, the input of characters and spaces presents no problem.
Strikes of the "backspace" and "delete" keys, however, will delete data and and these data must be appropriately deleted.
You must keep track of where the cursor is currently located because it can be moved,
for example, by the "home", "end", and arrow keys prior to hits of keys that delete data.
This will require a relatively simple program.
The input is a file of keystroke data and the output is a file of text.
Browser Data Experiments
Browsing on the Internet, such as performing Google searches, usually involves both keyboard and mouse input.
Therefore, browser data appears to be ideal for combining keystroke, mouse, and possibly stylometry information.
Browser data will be provided by Ned Bakelman.
Team 1 will provide the mouse feature vectors and your conversion program will provide the text to obtain the stylometry feature vectors.
Ned and your customers can help you run the experiments.
Also, Vinnie is working on a new version of the biometric classifier and might run experiments for you.
The following experiments are of interest:
- Experiment 1: keystroke data alone (anticipate reasonable good performance depending on the quantity of keystrokes)
- Experiment 2: mouse data alone (anticipate weak performance relative to experiment 1 due to lower information content of mouse data)
- Experiment 3: stylometry data alone (anticipate weaker performance relative to experiments 1 & 2 due to small quantities of word-level data)
- Experiment 4: keystroke and mouse data (performance hopefully better than keystroke or mouse data alone)
- Experiment 5: keystroke, mouse, and stylometry data (performance may be worse than in experiment 4 based on previous experience)
- John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, and Charles C. Tappert, Developing a Keystroke Biometric System
for Continual Authentication of Computer Users, EISIC Conf., Denmark, 2012.
- J.C. Stewart, J.V. Monaco, S. Cha, and C.C. Tappert (2011).
An Investigation of Keystroke and Stylometry Traits.
Proc. Int. Joint Conf. Biometrics (IJCB 2011), Wash. D.C., October 2011.
Pace University Biometric Authentication System
This is a general authentication system that operates on feature vectors where each vector component is a real number in the range 0-1.
In contrast to identification (1-of-n problem), authentication is a binary problem (yes, you are the person you claim to be, or no you are not).
- Cha, S. & Srihari, S.N. (2000). Writer Identification: Statistical Analysis and Dichotomizer. Proc. SPR and SSPR 2000, LNCS - Advances in Pattern Recognition, v. 1876, 123-132.
- Yoon, S., Choi, S-S., Cha, S-H., Lee, Y., & Tappert, C.C. (2005).
On the individuality of the iris biometric.
Proc. Int. J. Graphics, Vision & Image Processing, 5(5), 63-70.
- R.S. Zack, C.C. Tappert & S.-H. Cha (2010).
Performance of a Long-Text-Input Keystroke Biometric Authentication System Using an Improved k-Nearest-Neighbor Classification Method.
Proc. IEEE 4th Int Conf Biometrics: Theory, Apps, and Systems (BTAS 2010), Wash. D.C.
- Tappert, C.C, Cha, S.-H., Villani, M., & Zack, R.S. (2010).
A Keystroke Biometric System for Long-Text Input,
invited paper, Int. J. Info. Security and Privacy (IJISP), Vol 4, No 1, 2010, pp 32-60.