Biometric Authentication

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Field Supervisor First Supervisor Outline 1. The Basics 2. Biometric Technologies 3. Multi-model Biometrics 4. Performance Metrics 5. Biometric Applications.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics: Faces and Identity Verification in a Networked World
® Norman Poh Hoon Thian What is Biometric Authentication? A process of verifying an identity claim using a person’s behavioral and physiological characteristics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
1 Biometrics and the Department of Defense February 17, 2003.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
What is Biometrics? The automated use behavioral and physiological characteristics to determine or veiry an identity. Know HaveBe Rapid!
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Multimodal Biometric Security 1.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Biometrics Security in Banking Systems Image processing in ATM
WELCOME TO
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
ATM WITH AN EYE Suresh kumar.
Hand Geometry Recognition
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, Ronald C. Tantiado Computer Engineer.
Presentation transcript:

Biometric Authentication Introduction to Biometric Authentication By Norman Poh Field Supervisor Prof. Jerzy Korczak First Supervisor Dr. Ahmad Tajudin Khader

Outline The Basics Biometric Technologies Multi-model Biometrics Performance Metrics Biometric Applications

Section I: The Basics Why Biometric Authentication? Frauds in industry Identification vs. Authentication

What is Biometrics? The automated use behavioral and physiological characteristics to determine or veiry an identity. PIN Rapid! Know Have Be

Frauds in industry happens in the following situations: Safety deposit boxes and vaults Bank transaction like ATM withdrawals Access to computers and emails Credit Card purchase Purchase of house, car, clothes or jewellery Getting official documents like birth certificates or passports Obtaining court papers Drivers licence Getting into confidential workplace writing Checks

Why Biometric Application? To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties To prevent fraudulent acts like faking ID badges or licenses. To ensure safety and security, thus decrease crime rates

Identification vs. Authentication It determines the identity of the person. It determines whether the person is indeed who he claims to be. No identity claim Many-to-one mapping. Cost of computation  number of record of users. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users. Captured biometric signatures come from a set of known biometric feature stored in the system. Captured biometric signatures may be unknown to the system.

Section II: Biometric Technologies Several Biometric Technologies Desired Properties of Biometrics Comparisons

Types of Biometrics Fingerprint Face Recognition  Session III Hand Geometry Iris Scan Voice Scan  Session II Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA Odour: sensor arrays  sensor descriptors (a set of vocabulary) Main Obstacles: sensors may drift, of suffer from poisoning, limited lifetime (constantly replaced), Not as sensitive as human nose. Complicated by the use of deodorants, perfumes and diets We are looking for instruments capable of distinguishing invariant components of human odour

2D Biometrics (CCD,IR, Laser, Scanner)

Fingerprint

Fingerprint Extraction and Matching

Hand Geometry Captured using a CCD camera, or LED CCD = Charged coupled device, LED = Light Emitting Diodes Captured using a CCD camera, or LED Orthographic Scanning Recognition System’s Crossover = 0.1%

IrisCode 2D Gabor wavelets 256 bytes

Principal Component Analysis Face Principal Component Analysis

Desired Properties Universality Uniqueness Permanence Collectability Performance User’s Accpetability Robustness against Circumvention

Comparison Biometric Type Accuracy Ease of Use User Acceptance Fingerprint High Medium Low Hand Geometry Voice Retina Iris Signature Face

Section III: A Multi-model Biometrics Multi-modal Biometrics Pattern Recognition Concept A Prototype

Multimodal Biometrics

Pattern Recognition Concept Sensors Extractors Image- and signal- pro. algo. Classifiers Negotiator Threshold Decision: Match, Non-match, Inconclusive Biometrics Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc Data Rep. 1D (wav), 2D (bmp, tiff, png) Feature Vectors Scores Enrolment Training Submission

An Example: A Multi-model System Sensors Extractors Classifiers Negotiator Accept/ Reject ID Face Extractor Face Feature Face MLP The objective of the project! The approach: use several algorithms manipulating the same data. AND 2D (bmp) Voice Extractor Voice Feature Voice MLP 1D (wav) Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool

Abstraction Negotiation Logical AND Learning-based Classifiers Diff. Combination Strategies. e.g. Boosting, Bayesian Learning-based Classifiers Voice MLP Face MLP Cl-q … NN, SVM, Extractors Voice Ex Face Ex Ex-q … Different Kernels (static or dynamic) {Fitlers, Histogram Equalisation, Clustering, Convolution, Moments} Basic Operators {LPC, FFT, Wavelets, data processing} Signal Processing, Image Procesing Data Representation 1D 2D 3D Biometrics Voice, signature acoustics Face, Fingerprint, Iris, Hand Geometry, etc. Face

An Extractor Example: Wave Processing Class fWaveProcessing cWaveProcessing cWaveOperator 1 1 Operators 1 1 1 1 1 1 cWaveStack cPeripherique Audio cFFT cFFilter cWavelet cLPC cDataProcessing Input data Output data Operants 1 1 * cWaveObject

System Architecture in Details LSIIT, CNRS-ULP, Groupe de Recherche en Intelligence Artificielle System Architecture in Details USM Identité Accepter, Rejeter w1 w2 Effacer les silences Transformation de l’ondelette C0 C1 C2 C3 C4 C5 C6 C7 C9 C10 C11 C12 C13 C14 C15 Fréquence Temps Normalisation + Codage Réseau des neurones Apprentissage et Reconnaissance Détection des yeux Trouver X Trouver Y Filtre de base Inondation + Convolution Extraction Moment Vert Bleu Hue Saturation Intensité Visage Voix Base des données Décision Pour plus de renseignements : Pr J. Korczak, Mr N. Poh <jjk, poh>@dpt-info.u-strasbg.fr

Section IV: Performance Metrics Confusion Matrix FAR and FRR Distributed Analysis Threshold Analysis Receiver Operating Curve

Testing and Evaluation: Confusion Matrix ID-1 ID-2 ID-3 Correct Wrong Cl-1 0.98 0.01 0.01 0.90 0.05 0.78 Cl-2 … … … Threshold = 0.50 Cl-3 … … … False Accepts False Rejects

A Few Definitions EER is where FAR=FRR Crossover = 1 : x Where x = round(1/EER) Failure to Enroll, FTE Ability to Verify, ATV = 1- (1-FTE) (1-FRR)

Distribution Analysis A = False Rejection B = False Acceptance A typical wolf and a sheep distribution

Distribution Analysis: A Working Example Before learning After learning Wolves and Sheep Distribution

Threshold Analysis Minimum cost FAR and FRR vs. Threshold

Threshold Analysis : A Working Example Face MLP Voice MLP Combined MLP

Receiver Operating Curve (ROC)

ROC Graph : A Working Example

Equal Error Rate Face : 0.14 Voice : 0.06 Combined : 0.007

Section V: Applications Authentication Applications Identification Applications Application by Technologies Commercial Products

Biometric Applications Ø      Identification or Authentication (Scalability)? Ø      Semi-automatic or automatic? Ø      Subjects cooperative or not? Ø      Storage requirement constraints? Ø      User acceptability?

Biometrics-enabled Authentication Applications Cell phones, Laptops, Work Stations, PDA & Handheld device set. 2. Door, Car, Garage Access 3. ATM Access, Smart card Image Source : http://www.voice-security.com/Apps.html

Biometrics-enabled Identification Applications Forensic : Criminal Tracking e.g. Fingerprints, DNA Matching Car park Surveillance Frequent Customers Tracking

Application by Technologies Biometrics Vendors Market Share Applications Fingerprint 90 34% Law enforcement; civil government; enterprise security; medical and financial transactions Hand Geometry - 26% Time and attendance systems, physical access Face Recognition 12 15% Transaction authentication; picture ID duplication prevention; surveillance Voice Authentication 32 11% Security, V-commerce Iris Recognition 1 9% Banking, access control

International Biometric Group Commercial Products The Head The Eye The Face The Voice Eye-Dentify IriScan Sensar Iridian Visionics Miros Viisage iNTELLiTRAK QVoice VoicePrint Nuance The Hand The Fingerprint Hand Geometry Behavioral Identix BioMouse The FingerChip Veridicom Advanced Biometrics Recognition Systems BioPassword CyberSign PenOp Other Information Bertillonage International Biometric Group Palmistry Source: http://library.thinkquest.org/28062/link.html Biometric Authentication Percentages By Chris DeVoney & David Hakala, Sm@rt Partner http://www.zdnet.com/sp/stories/issue/0,4537,2664300-8,00.html

Main Reference [Brunelli et al, 1995] R. Brunelli, and D. Falavigna, "Personal identification using multiple cues," IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955-966, 1995 [Bigun, 1997] Bigun, E.S., J. Bigun, Duc, B.: “Expert conciliation for multi modal person authentication systems by Bayesian statistics,” In Proc. 1st Int. Conf. On Audio Video-Based Personal Authentication, pp. 327-334, Crans-Montana, Switzerland, 1997 [Dieckmann et al, 1997] Dieckmann, U., Plankensteiner, P., and Wagner, T.: “SESAM: A biometric person identification system using sensor fusion,” In Pattern Recognition Letters, Vol. 18, No. 9, pp. 827-833, 1997 [Kittler et al, 1997] Kittler, J., Li, Y., Matas, J. and Sanchez, M. U.: “Combining evidence in multi-modal personal identity recognition systems,” In Proc. 1st International Conference On Audio Video-Based Personal Authentication, pp. 327-344, Crans-Montana, Switzerland, 1997 [Maes and Beigi, 1998] S. Maes and H. Beigi, "Open sesame! Speech, password or key to secure your door?", In Proc. 3rd Asian Conference on Computer Vision, pp. 531-541, Hong Kong, China, 1998 [Jain et al, 1999] Jain, A., Bolle, R., Pankanti, S.: “BIOMETRICS: Personal identification in networked society,” 2nd Printing, Kluwer Academic Publishers (1999) [Gonzalez, 1993] Gonzalez, R., and Woods, R. : "Digital Image Processing", 2nd edition, Addison-Wesley, 1993.