Biometrics Authentication

Slides:



Advertisements
Similar presentations
Panel Moderator: Qian Zhang Hong Kong University of Science and Technology May 2008.
Advertisements

Biometrics and Security Tutorial 3. 1 (a) What is the scatter matrix (P4: 21)? Understand what about eigenvector and eigenvalue as well as their functions?
ForSe Overview Forensics and Security Laboratory (ForSe Lab) School of Computer Engineering Nanyang Technological University.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
An Introduction to Information Literacy Judith Keene Information and Learning Services, University of Worcester.
Multimedia Retrieval Organization 2011/12, term 1 Remco Veltkamp.
Department of Computer Science, Tsinghua University Introduction to the PhD Program of the Department of Computer Science and Technology at Tsinghua.
Seminar/seminar /ted.ppt 1 Suffering or Having Fun - Importance of perceived workload in teaching with computer simulation.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Overview Slide 1 EE3900 Computer Networks.
Hong Kong University of Science & Technology Research & Development Hong Kong University of Science & Technology 1 Junior Faculty Recruitment and Development.
Multimedia Retrieval Organization 2013/14, term 1 Remco Veltkamp.
Azriel Rosenfeld Prepared by Ben Shneiderman. Azriel Rosenfeld ( )
English for Computer Science Lecture 1. Introduction  Course Introduction  What this Course Teaches  What this Course Does not Teach  What.
CS 101 Introduction to Programming Dr. Basit Qureshi Assistant Professor College of Computer and Information Sciences Prince Sultan University.
Introduction to Biometric Systems
IEEE Systems Council VP Technical Operations Status; April 9, 2010 ieeesystemscouncil.org The SC has established a distinguished lecturer program. AESS.
You be the Judge! BPA Texas Teachers Provide Academics.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
IL Step 1: Sources of Information Information Literacy 1.
CA0932a Multimedia Development Lecture 1 Introduction and Educational Concepts.
Institution of Railway Signal Engineers Slide 1 of 20 An Introduction.
BEB100 – Introducing Professional Learning 2009 Researching for the Built Environment and Engineering Professions Graham Dawson Craig Milne Jennifer Thomas.
Role delineation in an iterative, cognitive skills based model of Information Literacy Judith Keene and John Colvin, University of Worcester, U.K. Justine.
Machine Learning Lecture 1. Course Information Text book “Introduction to Machine Learning” by Ethem Alpaydin, MIT Press. Reference book “Data Mining.
Sanna Liimatainen T Internetworking Seminar1 Scientific Writing T Internetworking Seminar Sanna Liimatainen, Lic. Sc. (Tech)
Introduction 1-1 Lecture 1 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks.
Advanced Computer Graphics Instructor LE Thanh Sach, Ph.D.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Sharifullah Khan.
Department of Electronic Engineering City University of Hong Kong EE3010 Data Communications and LANs Overview Slide 1 EE3010 Data Communications and LANs.
Most of contents are provided by the website Introduction TJTSD66: Advanced Topics in Social Media Dr.
Database collection evaluation An application of evaluative methods S519.
Design & Co-design of Embedded Systems Sharif University of Technology Computer Engineering Dept. Fall-Winter 2005 Maziar Goudarzi.
Distinguished Talk Dr. Jun Wang, IEEE Fellow Professor Dept. of Mechanical and Automation Engineering, The Chinese University of Hong Kong For further.
Advanced Computer Vision Chapter 1 Introduction 傅楸善 Chiou-Shann Fuh ext. 327
01 - Course Intro.CSC4071 CSC407F Software Architecture & Design Prof. Penny LP396C
Promotions Boot Camp Faculty Development November 27, 2015 Benoit H. Mulsant, MD, MS, FRCPC Professor and Chair Department of Psychiatry, University of.
By Asma Alkhamis. A citation style is used to give the reader immediate information about sources cited in the text. This guide provides an overview of.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
Eick: Papers, Articles, and Other Material to be used in COSC 7363 COSC 7363 Overview Advanced AI Hyla-Tree Frog 1994 “AI” Turing Award Lectures AI and.
2016/2/4Course Introduction1 COMP 4332, RMBI 4330 Advanced Data Mining (Spring 2012) Qiang Yang Hong Kong University of Science and Technology
Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: PQ809
Tips for Powerful Professional Presentations Organize your entire presentation around a theme to unify the different elements and to make it more memorable.
CSE 6410 Advanced Algorithmic Graph Theory s = 1 t = 16 V 8 V 7 V 6 V 5 V 4 V 3 V 2 V 1 n u 1 u 2 u
GE 306Dr SaMeH1 Engineering Report Writing (GE 306) Associate Professor of Environmental Eng. Civil Engineering Department Engineering College Almajma’ah.
Computer Vision UCT2 – Information Technologies MAP-I Doctoral Programme Miguel Tavares Coimbra (Principal Instructor), FC, UP Adérito Fernandes Marcos,
Computer Engineering Department Islamic University of Gaza
Accessing your Reading List
ECE 486/586 Computer Architecture Introductions Instructor and You
COMP24111 Course Unit Overview
Introduction Machine Learning 14/02/2017.
How to Write a High-Quality Technical Paper for Publication
ICDIS 2018 Intelligence and Security
Overview Advanced AI 1994 “AI” Turing Award Lectures AI and the Web
Thoughts on IEEE My Vision as President
Amir Hussain’s Brief Biography
Vincenzo Piuri 2019 IEEE President-Elect Candidate
Welcome My name I’m here to tell you a little bit about what Computer Science is. What would it be like to be a computer science major at UNCW? What would.
Jinchang Ren’s Brief Biography
Jiangbin Zheng’s Brief Biography
Fundamental of Artificial Intelligence (CSC3180)
C Programming Lecture 1 : Introduction
C Programming Lecture 0 : Introduction
Balani/iGroup Infotech India Pvt. Ltd.
Fundamental of Multimedia System (CSC3185)
Object Oriented Programming Course Introduction
Computer Engineering Department Islamic University of Gaza
Presentation transcript:

Biometrics Authentication Prof. David Zhang Biometrics Research Centre Department of Computing The Hong Kong Polytechnic University Tel: 2766-7271 PQ809 csdzhang@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csdzhang

Lecturer Academic Position Professional Honors Research Interests Chair Professor: Since 2005 in PolyU Founding Lecturer (COMP435p/4134): ~10 years Professional Honors IEEE Fellow/ IAPR Fellow Selected as a Highly Cited Researchers in Engineering by Thomson Reuters in 2014, 2015 and 2016, respectively. (http://highlycited.com/) Research Interests Biometrics, Image Processing and Pattern Recognition Publication >400 International Journal Papers, >15 Books and >40 Patents from USA/HK/Japan/China

Teaching Arrangement Management Assessment Objectives: Lectures 18:30-20:30, Thursday HJ302 Tutorials 20:30-21:30, Thursday HJ302 TA: Jun XU csjunxu@comp.polyu.edu.hk Kou LU koulu@126.com Assessment Continuous Assignments 45% Examination 55% Objectives: To understand the problems with current security systems To introduce biometrics technologies and systems To design some basic biometrics systems for security based on the learned techniques.

Background Knowledge Main Topics: Multimedia Pattern Recognition Introduction to information security Biometrics definitions and systems design Typical physical biometrics Typical behavioural biometrics Security applications based on biometrics  Except Computer Systems and programs, the main background is needed: Multimedia One- and two-dimension signal structure Image processing/ retrieval Pattern Recognition Feature extraction, classification and matching Statistics pattern recognition

Assignments Project Assignment 1: Paper Reading Marks (40%) Report 40% Assignment 2: Solution to Business Applications Marks (60%) Presentation and demo system 60%  Period: Week 2 – Week 13  Report/Slides Submission – Week 12  Presentation in Week 13

Recommended Materials Website: Searching Biometrics, such as www.comp.polyu.edu.hk/~biometrics - Book: D. Zhang, Y. Xu and W. Zuo, Discriminative Learning in Biometrics, Springer, Singapore, 2016. - Book: D. Zhang, Z. Guo and Y. Gong, Multispectral Biometrics- Systems & Applications, Springer, UK, 2015. - Book: D. Zhang and G. Lu, 3D Biometrics- Technologies and Systems, Springer, USA, 2014. - Book: D. Zhang, F. Song, Y. Xu and Z. Liang, Advanced Pattern Recognition Technologies with Applications to Biometrics, IGI Global, USA, 2008. - Book: D. Zhang and A. Jain (Eds.), Advances in Biometrics, International Conference - ICB2006, Springer, USA, 2006. Book: D. Zhang, X. Jing and J. Yang, Biometric Images Discrimination (BID) Technologies, IRM Press, USA, 2005. - Book: D. Zhang (ed.), Biometrics Solutions for Authentication in an e-World, Kluwer Academic Publishers, 2002. - Book: D. Zhang, Automated Biometrics: Technologies & Systems, Kluwer Academic Publishers, 2000.