This will be a continuation of last year's keystroke biometric system.
A description of that system can be found at
Keystroke Conference Paper
The requirements for this year's system will be provided by the DPS student.
The project description at the beginning of last year's project follows.
We have a computer program that captures key and mouse data. The keystroke data captured by the program consists of the ID and duration of each key pressed, and the transition time from one key press to the next. The mouse information is similar - the item clicked, left or right mouse button pressed, and the mouse button depression duration.
We are exploring keystroke biometric applications, and corresponding experimental procedures and system designs. The keystroke biometric has several possible applications. One application is for hardening password entry by adding a keystroke authentication process (accept/reject response) as a second stage following password matching before allowing user entry. Thus, if the password is not entered in the normal keystroke pattern, the system could ask the user to reenter it. For example, a user on a particular occasion might be drinking a cup of coffee and be entering the password uncharacteristically with one hand. The system, then, could reject the password, sending the user a message like, "Please reenter your password in your normal manner," and after, say, three tries, possibly rejecting the user entirely. The user upon receiving the message would likely put down the coffee cup and enter the password in his/her normal fashion in order to be accepted.
A second application is to identify an individual from his/her keystroke pattern. Suppose, for example, there has been a problem with the circulation of offensive emails from easily accessible desktops in a work environment. The security department wants to reduce this problem by collecting keystroke biometric data from all employees and developing a keystroke biometric identification system (one-of-n response).
You task is to work with your team to design, for one of the above applications, the following aspects of the biometric system:
Once the design is completed you will then run experiments and write a technical paper describing your work.