Multimodal Biometric Security

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Biometrics.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
® Norman Poh Hoon Thian What is Biometric Authentication? A process of verifying an identity claim using a person’s behavioral and physiological characteristics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Mulitmodal Biometric Systems Munir Bandukwala Rajesh Subramanian.
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Going beyond passwords
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Presented by Tienwei Tsai July, 2005
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
BIOMETRICS THE MAN MACHINE INTERFACE
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Multimodal Biometric Security 1.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Challenge/Response Authentication
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Fusing Binary Templates for Multi-biometric Cryptosystems
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Multimodal Biometric Security Presented By: Qurratulain PhD Scholar SEIEE Department, Shanghai Jiao Tong University Email:qurratulain291@gmail.com

Introduction An application of modern statistical methods to the measurements of biological objects PIN Identification of an individual on the basis of “Who you are?” rather than “What do you know?” Knowledge-based security, e.g. a password , a PIN.. “What do you have?” Token-based security, e.g. passport, driver’s license, ID card.. Know Be Have

Introduction Working of a biometric system Test Test

An example of multibiometric system Introduction Sensors Extractors Image- and signal- pro. algo. Classifiers Negotiator Threshold Biometrics Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc Data Rep. 1D (wav), 2D (bmp, tiff, png) Feature Vectors Scores Enrolment Training Submission An example of multibiometric system

Introduction Need for Multimodal Biometrics Limitations Increase security Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! Replace hard-to-remember passwords Prevent unauthorized use of lost, stolen or "borrowed" ID cards Limitations Noise in sensed data results in a significant reduction in accuracy For voice and signature, circumvention by spoofed attacks

Problem Statement The use of signature verification is a time-consuming process for the user in real time situations User-involvement at image acquisition stage reduces the time efficiency of the identification process and causes delay Mostly PCA and LDA based global features are used for feature extraction and superiority of LDA over PCA has been affirmed many times so far, therefore a newer approach for feature extraction is required that can outperform the existing methods e.g. Discrete Cosine Transform (DCT) because of its energy compaction property

Problem Statement Moreover, security concerns have been increased because of the following drawbacks of unimodal biometric systems: Noise in sensed data results in a significant reduction in accuracy Non-universality leads to Failure To Enroll error (FTE) Lack of Individuality or Uniqueness increases False Accept Rate (FAR) Openness to circumvention by spoofed attacks commonly for voice and signature

Solution A multibiometric system can be used based on feature Level fusion and feature vector optimization through genetic algorithm. Multibiometric system can be implemented so that it can reduce error rate caused by unibiometric systems, e.g., If the biometric sample obtained from one of the sources is not of sufficient quality during a particular acquisition, the samples from other sources may still provide sufficient discriminatory information to enable reliable decision-making. Non-Universality If a person cannot be enrolled in a finger print system due to worn-out ridge details, he can still be identified using other biometric traits like face or iris Noisy data

Solution Discrete Cosine Transform (DCT) can be employed along with the old techniques of feature extraction like PCA and LDA DCT has been selected as it offers many benefits: Provides good compromise between energy packing ability and computational complexity The energy packing property of DCT is superior to that of any other unitary transform Transforms that redistribute or pack the most information into the fewest coefficients Provides the best sub-image approximations and, consequently, the smallest reconstruction errors

Solution A multimodal biometric system can be introduced that reduces user involvement at the image acquisition stage Discrete Cosine Transform (DCT) can be employed along with the old techniques of feature extraction like PCA and LDA Normalization of feature vector can be performed using z-score Normalized feature vectors can be fused to form multibiometric system, fusion being done by product, sum and min rules Genetic Algorithm (GA) can be used for feature vector optimization after feature level fusion Selected features can then be incorporated into a Bayesian Classifier for calculating the accuracy of the proposed system

Proposed Solution Face image Iris image Ear image Face Preprocessing Iris Preprocessing Ear Preprocessing Face, Iris, and Ear Features DCT System Face, Iris, and Ear Features PCA System Face, Iris, and Ear Features LDA System Feature Vector Normalization Feature Vector Normalization Feature Vector Normalization Feature level Fusion Optimization using Genetic Algorithm Bayesian Classifier

Future Work In the field of Multibiometrics, there is still a lot of work requied to reduce the effects of noisy data and to increase template security The work presented in this thesis can be extended: By implementing different variation of PCA and LDA like Multilinear PCA, kernel PCA, Independent Discriminant Analysis, etc By using the energy compaction property of DCT on a feature extraction method of LDA, and PCA. In this way the feature vector of LDA and PCA systems would be optimized by DCT By employing various fusion techniques in parallel and concatenating the resultant vectors. The different levels of fusion can be evaluated for making a comparison on the multibiometric system

Thank you