Soft Biometrics and Continuous Authentication
- DR. TERENCE SIM
SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE
Soft Biometrics and Continuous Authentication DR. TERENCE SIM - - PowerPoint PPT Presentation
Soft Biometrics and Continuous Authentication DR. TERENCE SIM SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE Brief Bio Associate Professor & Vice Dean Research: face recognition, biometrics, computational photography PhD
SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE
Brief Bio
computational photography
Traditional authentication: one-time
Session hijacking
System still thinks legitimate user is there! Solution: continuous authentication
Cassandra Carrillo
R Janakiraman, S Kumar, S Zhang, T Sim 2005
Desktop Security
#1: Must be done passively
#2: Have minimal overhead
#3: Achieve low error rates
#4: Provide Authentication Certainty at all times
Observations over time
#1: Account for reliability of different modalities
more than face
#2: Older observations must be discounted to reflect the increasing uncertainty of the continued presence of the legitimate user
is the continued presence of the user.
#3: It must be possible to determine authentication certainty at any point in time, even when there is no observations in one or more modalities
the legitimate user is still present.
System Architecture
Integrator DRV User space Kernel space
User ok/ not ok (actually delay jiffies) callback If user not ok, freeze/ delay process. If user ok, continue with system call without delay. system call
P1 P2 P3 KDM+ pam
Probabilistic Approach
Tsafe.
session are suspended or delayed as a function of (Psafe- Tsafe, syscall)
Hidden Markov Model
HMM States
Safe
User still present at console.
Attacked
User is absent, or I m poster has hijacked console.
1 - p p 1
p: prob. of rem aining in Safe state at next tim e instant.
Bayesian Inference
time t.
most likely current state?
P(xt=Safe | z1, z2, … zt ) and P(xt=Attacked | z1 , z2 , … zt )
Bayesian Inference
given current state
Face Biometric
1200 images of other people (imposter), we learn:
P(y | user) P(y | imposter) Face feature y
Face Biometric
Fingerprint Biometric
fingerprint images.
Further Comments
Psafe = P(xt=Safe | z1, …, zt-1 )
p = e kΔt
when no observations available.
Further Comments
P(xt=Safe | z1,…, zt ) and P(xt=Attacked | z1,…, zt )
reads vs. writes)
Other Fusion Methods
x1 x2 x3 x4 Temporal-first Psafe
Other Fusion Methods
Psafe Modality-first y1 y2
Naïve Integration
any time instant.
whenever available.
decay it appropriately.
Reliability
Experiment: Legitimate User
significant FAR/FRR for any threshold Tsafe
ideal.
first, Modality-first curves.
Experiment: Imposter
at time = 38s
slope.
Integration detects hijacking sooner than
Experiment: Partial Impersonation
fingerprint, but not face.
Holistic and Naïve, but not by others.
Psafe for different tasks
Usability test
Usability test
affects task efficiency; (b) system performance degradation was imperceptible by users.
Discreet placement may solve this.
and usable.
New Performance Metric
taken by the imposter to the time instant that the system decides to (correctly) reject him.
damage the system, eg. To type “rm –rf *”)
New Performance Metric
than W seconds to correctly reject an imposter.
for all W
New Performance Metric
granted access to the protected resource
sometimes rejects user
New Performance Metric
USC curve for our system
Soft biometrics: Definition
information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate any two individuals under normal circumstance
System
histogram
4 modes
Hard vs Soft biometrics
Hard vs Soft biometrics
Computational time/ Energy Accuracy
Face Clothes color Iris Gender
Coping with illum change
Coping with illum change
Evaluation
Evaluation
Evaluation
Smartphones
Possible biometrics
Energy usage is critical!
Computational time/ Energy Accuracy
Face Clothes color Iris Gender
References
Sandeep Kumar. "Continuous verification using multimodal biometrics." IEEE transactions on pattern analysis and machine intelligence 29, no. 4 (2007): 687-700.
authentication." In International Conference on Biometrics,
biometric traits for continuous user authentication." IEEE Transactions on information forensics and security 5, no. 4 (2010): 771-780.
dynamics in a general setting." In International Conference on Biometrics, pp. 584-593. Springer Berlin Heidelberg, 2007.
Data, Models, and Metrics: Data, Models, and Metrics. IGI Global, 2011.