1 / 9

Biometric Data Mining

Biometric Data Mining. “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data”. Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave. Presentation Summary. Project Description Experiment Structure Algorithms and Techniques Results of Experiments

Télécharger la présentation

Biometric Data Mining

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.

  2. Presentation Summary • Project Description • Experiment Structure • Algorithms and Techniques • Results of Experiments • Future Research • Conclusions

  3. Project Description The study extends previous studies at Pace University on Biometric data by running previously obtained data sets through a data mining tool called Weka, using various algorithms and techniques.

  4. Study Experiments • Authentication • Dichotomy model • Identification • Normalized data • Additional • Normalized data

  5. Algorithms and Techniques • Authentication • IBk with k = 1 on Dichotomy data • Identification • IBk with k = 1 on Normalized data • Additional • PredictiveApriori • simpleKmeans • IBk with k = 1 using leave-one-out and percentage splits

  6. Results Results of Longitudinal Authentication Experiments on new Keystroke Capture Data

  7. Results Results of Longitudinal Identification Experiments on the new KeystrokeCapture Data.

  8. Opportunities for Research Authentication based solely on subject in question. • Separate sets of data holding only within and between class records for each subject, • Rather than comparing a community of subjects to a community of records. • Higher accuracies could be legitimately obtained in this manner.

  9. Conclusion The study has furthered previous studies at Pace University through running experiments on Mouse Movement, Stylometry, and Keystroke Biometric data, new and previously obtained, using the data mining tool Weka. The data mining algorithms with which the experiments were conducted are widely used and provide an entry point for future researchers into the use of data mining with biometric data sets.

More Related