BIOMETRICS Prof. G. Annapoorani, Department of Computer Science and Engineering, Bharathidasan Institute of Technology, Anna University, Tiruchirappalli.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
TYPES OF BIOMETRICS (Based on Chapter 3&4)
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRICS Prof. G. Annapoorani, Department of Computer Science and Engineering, Bharathidasan Institute of Technology, Anna University, Tiruchirappalli –

Outline Biometrics Brief History Categories of Biometrics Biometrics – How do they work? Biometric Identifiers The Future

Biometrics Definition: “Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity”

Descriptions Authorization: Permission or approval. Authentication: Validating or figuring out the identity of a person.

Authentication There are 3 traditional way of verifying the identity of a person: Possessions Knowledge Biometrics

Introduction - Authentication Possessions (keys, passports, smartcards, …) KeysCards

Introduction - Authentication Knowledge Secret (passwords, pass phrases, …) Non-secret (user Id, mothers maiden name, favorite color) Passwords/PINs

Introduction - Authentication Biometrics “Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity” Physiological: based on data derived from the measurement of a part of a person’s anatomy fingerprints, face, iris, … Behavioral: based on data derived from measurement of an action performed by a person walking, keystroke pattern, talking, …

Authentication The 3 modes of authentication are sometimes combined User id + password ATM card + password Passport + face picture and signature

The Beginning First recorded use in China in 14 th Chinese children had feet inked Modern Fingerprinting developed by French Police Clerk Used to Identify Criminals

Modern Biometrics Used by Government agencies to protect confidential information Airline Industry and Casinos use facial recognition software Disney World uses fingerprinting to ensure only one person uses a pass Governments such as the U.S., Brazil, and Canada have implemented biometric information into their IDs

Categories of Biometrics Physiological – also known as static biometrics: Biometrics based on data derived from the measurement of a part of a person’s anatomy. For example, fingerprints and iris patterns, as well as facial features, hand geometry and retinal blood vessels Behavioral – biometrics based on data derived from measurement of an action performed by a person and, distinctively, incorporating time as a metric, that is, the measured action. For example, voice (speaker verification)

Biometrics – How do they work? Although biometric technologies differ, they all work in a similar fashion: The user submits a sample that is an identifiable, unprocessed image or recording of the physiological or behavioral biometric via an acquisition device (for example, a scanner or camera) This biometric is then processed to extract information about distinctive features to create a trial template or verification template Templates are large number sequences. The trial template is the user’s “password.”

Biometric Identifiers Common: Fingerprint Recognition Face Recognition Speaker Recognition Iris Recognition Hand Geometry Signature verification Others: DNA Retina recognition Thermograms Gait Keystroke Ear recognition Skin reflection Lip motion Body odor

Vein Pattern Sweat Pores Fingernail Bed Hand Grip Brain Wave Pattern Footprint and Foot Dynamics Some More* …

Properties of biometric identifiers Universality describes how common a biometric is found in each individual. Uniqueness is how well the biometric separates one individual from another. Permanence measures how well a biometric resists aging. Collectability explains how easy it is to acquire a biometric for measurement. Acceptability indicates the degree of approval of a technology by the public in everyday life.

1.Fingerprint Recognition An extremely useful biometrics technology since fingerprints have long been recognized as a primary and accurate identification method.

“ Livescan ” fingerprint scanners  Optical methods (FTIR)  CMOS capacitance  Thermal sensing  Ultrasound sensing Devices Acquisition Devices Ink & paper – the oldest way Ink-less Methods - sense the ridges on a finger

Applications Identification, or 1-to-Many: identifies a person from the entire enrolled population. Authentication, or 1-to-1: matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token).

Minutiae  Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae  The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger MinutiaeFinger Image + Minutiae Finger Image

Fingerprint scanning (Minutiae based approach)

Matching Approaches Image techniques Use both optical and numerical image correlation techniques Two basic classes of matching techniques: Combining the above two techniques: Hybrid techniques (with improved accuracy) Feature techniques Extracts features and develop representations from these features

2.Face Recognition Uses an image or series of images either from a camera or photograph to recognize a person. Principle: analysis of the unique shape, pattern and positioning of facial features.

Features Passive biometrics and does not require a persons cooperation Highly complex technology and largely software based. Primary advantage is that the biometric system is able to operate “hands-free” and a user’s identity is confirmed by simply staring at the screen.

Details Source of data: Single image, video sequence, 3D image and Near Infrared Models: weak models of the human face that model face shape in terms of facial texture  Face appearance Examples: eigenfaces  Face geometry Examples: feature-based method

Examples MIT Media Laboratory MIT Media Laboratory Vision and Modeling Group Face Recognition Demo

3.Voice Recognition Voice recognition is not the same as speech recognition, it is speaker recognition Considered both physiological and behavioral Popular and low-cost, but less accurate and sometimes lengthy enrollment

Application categories Fixed text Text dependent Text independent Conversational

Features Advantage  Acoustic features : 1. Misspoken or misread phrases; 2. The human voice's tremendous variability, due to colds, aging, and simple tiredness  Can be captured surreptitiously by a third party and replayed  Less requirements for users, such that they do not have to go through a separate process for verification  Very little hardware is required, and ideally suited to telephone- based system for a remote identification  Zero client-side cost, no special reader needs to be installed Disadvantage

4.Iris recognition Analysis of the iris of the eye, which is the colored ring of tissue that surrounds the pupil of the eye. Based on visible features, i.e. rings, furrows, freckles and the corona. Features and their location are used to form the Iriscodes, which is the digital template. Widely regarded as the most safe, accurate biometrics technology and capable of performing 1-to-many matches at extraordinarily high speeds, without sacrificing accuracy.

Example Iris Image

Example Iris Images

Applications Iris recognition is a highly mature technology with a proven track record in a number of application areas. Used very effectively all over the world. Heathrow Airport (London) - Iris

5.Hand geometry Hand geometry systems are commonly available in two main forms. Full hand geometry systems take an image of the entire hand for comparison while Two Finger readers only image two fingers of the hand. Hand recognition technology is currently one of the most deployed biometrics disciplines world wide

How does it work A camera capture an image of the hand, with the help of a mirror to get also the edge. The silhouette of the hand is extracted, and some geometrical characteristics stored. ( See Jain et al. A Prototype Hand Geometry-based Verification System )A Prototype Hand Geometry-based Verification System

Applications BenGurion Airport - Hand Geometry INSPASS - Hand Geometry see INS Passenger Accelerated Service SystemINS Passenger Accelerated Service System

6.Signature Verification Static/Off-line: the conventional way Dynamic/On-line: using electronically instrumented device  Principle: the movement of the pen during the signing process rather than the static image of the signature.  Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes

Applications Examples of Commercial products: Cyber-SIGN PenOpCyber-SIGN CIC Communication Intelligence Corp. "The power to sign online"CIC Communication Intelligence Corp. For more technical information: IBM online signature verification

Biometrics in Early Stages DNARetinaThermograms GaitKeystrokeEar recognition Skin reflectionLip motionBody odor ScleraVein

I.DNA DNA has been called the “ultimate identifier” Identify information from every cell in the body in a digital form Not yet fully automated, not fast and expensive Theoretical limitation: Identical twins have the same DNA Privacy issue – DNA contains information about race, paternity, and medical conditions for certain disease

Comparison Chart DNAConventional Biometrics Requires an actual physical sample Uses an impression, image, or recording Not done in real-time; not all stages of comparison are automated Done in real-time; “lights-out” automated process Does a comparison of actual samples Uses templates or feature extraction

II.Retina recognition The pattern of blood vessels that emanate from the optic nerve and disperse throughout the retina depends on individuals and never changes. No two retinas are the same, even in identical twins. Commercial products: Retinal Technologies Retinal Technologies

III.Thermograms Thermograms requires an infrared camera to detect the heat patterns of parts of the body that are unique to every human being (such as the face) Normally expensive because of the sensors Useful paper: Illumination Invariant Face Recognition Using Thermal Infrared Imagery (Solikinski & als)Illumination Invariant Face Recognition Using Thermal Infrared Imagery

IV.Gait The final objective: to recognize persons using standard cameras in any conditions. Gait recognition is particularly studied as it may enable identification at distance. Examples for measurements (from Georgia Institute of Technology)Georgia Institute of Technology

V.Keystroke 100% software-based, requiring no sensor more sophisticated than a home computer Example The rhythms with which one types at a keyboard are sufficiently distinctive to form the basis of the biometric technology known as keystroke dynamics

VI.Ear recognition Ear geometry recognition uses the shape of the ear to perform identification Suggestions have been made that the shapes and characteristics of the human ear are widely different An infrared image can be used to eliminate hair Might be recognized at a distance

Example

VII. Skin reflection Lumidigm Inc. has established that the absorption spectrum of the skin depends on the individuals. Lumidigm Inc. In a range of wavelengths over 6mm patch, several LEDs send light into the skin, and photodiodes read the scattered light, which is analyzed to perform the authentication.

VIII.Lip motion Compares the characteristic lip motions of people while they speak. Helps identification associated with speaker recognition. Different imaging conditions: Infrared (high security & cost) and Near Infrared (cheap, normally used for active sensing)

IX.Body odor It’s absolutely clear that people with differing immunity genes produce different body odors Electronic/artificial noses: developed as a system for the automated detection and classification of odors, vapors, gases. Prometheus (Alpha Mos), an example of electronic nose Schematic Diagram of Artificial nose Artificial noses are not yet sophisticated enough to do all the job

X Sclera Recognition 56

XI Vein Patterns 57

The Future Biometrics could be used to identify you in your own home (Gates house) Car with no key and personal settings Get to work and clock in and get access to your computer Pay for lunch with a thumb press Better and Faster security all around Trade privacy for convenience

Thank you. Any Question?