KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network &...
-
Upload
rolf-perkins -
Category
Documents
-
view
256 -
download
0
Transcript of KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network &...
![Page 1: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/1.jpg)
KinWrite: Handwriting-Based Authentication Using Kinect
Proceedings of the 20th Annual Network & Distributed System Security Symposium,
NDSS 2013
Jing Tian, Wenyuan Xu and Song WangDept. of Computer Science and Engineering, University of South CarolinaChengzhang QuSchool of Computer Science, Wuhan University
![Page 2: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/2.jpg)
OutlineIntroduction
KinWrite ArchitectureData Processing & Feature ExtractionTemplate Selection and Verification
Experiment and Evaluation
Conclusion
2
![Page 3: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/3.jpg)
Introduction(1/4)Authentication plays a key role in securing various resources including corporate facilities or electronic assets.
Authentication mechanisms can be divided into three categoriesknowledge-basedtoken-basedbiometrics-based.
3
![Page 4: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/4.jpg)
Introduction(2/4)There are some requirements of the system
Around-the-Clock Use.Rapid Enrollment.Rapid Verification.No Unauthorized Access.Low False Negative.
4
![Page 5: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/5.jpg)
Introduction(3/4) There are some possible categories of attack :
Random Attack
Observer Attack
Content-Aware Attack
Educated Attack
Insider Attack
5
![Page 6: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/6.jpg)
Introduction(4/4)In this paper, we propose a user-friendly authentication system, called KinWrite.allows users to choose short and easy-to-memorize passwords while
providing resilience to password cracking and password theft.
For instance, a Kinect can be installed at the entrance of a building.
6
![Page 7: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/7.jpg)
KinWrite Architecture
7
![Page 8: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/8.jpg)
KinWrite Architecture
8
![Page 9: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/9.jpg)
Data ProcessingWe construct a refined 3D-signature from a raw depth image sequenceFingertip localizationSignature normalizationSignature smoothing
9
![Page 10: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/10.jpg)
fingertip localizationWe choose a small number of the first K = 3 frames, and find the pixel with the minimum-depth value in each frame.If they show good temporal continuity, we consider them as the
fingertip positions in these K frames and process all the other frames.
Otherwise, we remove the first frame of these K frames and add the next frame.
given the fingertip position(t) =((t); (t); (t)) at the t-th frame
The fingertip position should only vary in a small range between two consecutive frames.we only search within a small region (4040 pixels) centered at in
frame (t + 1) for the fingertip position
10
![Page 11: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/11.jpg)
Signature normalizationThe size of a signature in the xy image plane may vary when the distance between the user and the Kinect sensor changes.
We scale the raw 3D-signatures into a 111 bounding box.
11
![Page 12: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/12.jpg)
Signature smoothing Apply a Kalman filter to smooth the raw 3D-signatures
We choose the time-independent variance as the variance of the fingertip positions.
12
![Page 13: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/13.jpg)
KinWrite Architecture
13
![Page 14: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/14.jpg)
Feature SelectionPosition and Position Difference between Frames
◦ The fingertip position in the t-th frame :◦ the inter-frame position difference :
Velocity :
Magnitude of acceleration :
Slope Angle :
Path Angle :
Log radius of curvature :
curvature :
14
![Page 15: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/15.jpg)
15
![Page 16: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/16.jpg)
Feature ProcessingFirst, we normalize each feature such that it conforms to a normal Gaussian distribution N(0,1) over all the frames.
Second, we weigh each feature differently to achieve a better performance.selected a small set of training samples for each signatureverified these training samples using the Dynamic Time
Warping(DTW) classifiersimply consider the average verification rate over all signatures as the
weight for this feature
16
![Page 17: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/17.jpg)
Dynamic Time Warping (DTW) We use DTW to quantify the difference between two 3D signature samples.◦ Time warping can compensate the feature difference caused by the
signing speed.
Given two 3D-signature samples, we denote their feature vectors
construct a N1 N2 distance matrix D with
17
![Page 18: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/18.jpg)
KinWrite Architecture
18
![Page 19: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/19.jpg)
Template Selectionwe simply choose the most representative 3D-signature sample from the training set.given n training 3D signature samplescalculate the pairwise DTW distance choose the template that has the minimum total DTW distance
to all these n samples
19
![Page 20: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/20.jpg)
Threshold Selection We calculate the DTW distance between the template of a user u and all the M training samples (from all the users), and sort them.
20
![Page 21: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/21.jpg)
KinWrite Architecture
21
![Page 22: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/22.jpg)
22
Experiment and Evaluation
![Page 23: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/23.jpg)
We use the Microsoft Kinect for data collection.
The resolution of the depth image to 240320 pixels (30 fps).
The distance between the user and the Kinect was in the range of [1.5, 2.5] meters.
We studied 18 users who provided 35 different 3D-signatures.
For each signature, we collected 18 to 47 3D-signature samples over a period of five months.
In total, we collected 1180 genuine 3D-signature samples for 35 signatures.
Data Acquisition
23
![Page 24: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/24.jpg)
Evaluation Matrix
the number of true positives
the number of false positives
the number of true negatives
the number of false negatives
Precision reflects how cautious the system is to accept a user
Recallquantifies the fraction of honest users that have been granted access
out of all honest users
24
![Page 25: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/25.jpg)
Evaluation Matrix
the number of true positives
the number of false positives
the number of true negatives
the number of false negatives
ROC curve stands for receiver operating characteristic curvea plot of true positive rate (TPR) over false positive rate (FPR)
An ideal system has 100% TPR and 0% FPRmeans all honest users can pass the verification while none of the
attackers can fool the system
25
![Page 26: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/26.jpg)
Evaluate the impact of training size
26
![Page 27: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/27.jpg)
Performance(1/2)
27
![Page 28: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/28.jpg)
Performance(2/2)
28
![Page 29: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/29.jpg)
29
![Page 30: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/30.jpg)
30
![Page 31: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/31.jpg)
Data AcquisitionWe selected four signatures as the victims with the spelling being “Bry”, “Jy”, “ma”, and “Tj”.
considered the other 31 signatures as random attackers
collected 1200 attack samples for all types of attackersCA : 6 attackers 10 samples 4 signatures = 240 attack samplesOb-1 : 12 attackers samples signatures = 240 attack samplesOb-4 : 12 attackers samples signatures = 240 attack samplesCA-Ob4 : 12 attackers samples signatures = 240 attack samplesInsider : 6 attackers 10 samples 4 signatures = 240 attack samples
31
![Page 32: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/32.jpg)
Performance
32
![Page 33: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/33.jpg)
Performance
33
![Page 34: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/34.jpg)
Conclusion We have designed a behavior-based authentication system called KinWrite that can be used for building access control.
To evaluate the performance of KinWrite, we collected 1180 samples for 35 different signatures over five months.
In addition, we modelled 5 types of attackers and collected 1200 3D signature samples from 18 ‘attackers’.
These results suggest that KinWrite can deny the access requests from all unauthorized users with a high probability, and honest users can acquire access with 1.3 trials on average.
34
![Page 35: KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.](https://reader033.fdocuments.in/reader033/viewer/2022061607/56649ddc5503460f94ad407b/html5/thumbnails/35.jpg)
35
Thanks for your listening!