Creating and Maintaining Databases Dr. Pushkin Kachroo.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Chapter 4 Pattern Recognition Concepts: Introduction & ROC Analysis.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
Access Control Methodologies
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Biometrics.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
Presentation of Master’s thesis Gait analysis: Is it possible to learn to walk like someone else? Øyvind Stang.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Biometrics II CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Large Scale Applications Dr. Pushkin Kachroo TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
The Practice of Statistics
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
CS Bayesian Learning1 Bayesian Learning. CS Bayesian Learning2 States, causes, hypotheses. Observations, effect, data. We need to reconcile.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Identity theft By: Blake D uncan.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
CORE ZOO. INTRODUCTION Will biometric characteristics within a zoo menagerie change with the addition of good and bad quality biometric enrollments?
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
G53SEC 1 Authentication and Identification Who? What? Where?
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
G53SEC 1 Authentication and Identification Who? What? Where?
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometrics.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation transcript:

Creating and Maintaining Databases Dr. Pushkin Kachroo

Enrollment Collect Private Information, e.g. fingerprint Follow “enrollment policy” Policy should be: –acceptable to the public –Clear on how, where and when the private info will be used

Enrollment Steps Positive Enrollment: –Trusted Individuals –Enrollment Policy E M –Authentication through: Seed Documents (Birth Cert., passport) –Store machine representation of the enrolled in Verification Database M

Enrollment Steps Negative Enrollment: –Criminal Identification –Enrollment Policy E N –Store machine representation of the enrolled in Screening Database N

General Enrollment Target Population: World W Ground Truth: legacy databases: –Criminal or civil –Can contain Fake and Duplicate Identities

Fake Identity Created Identity –Non-existent person –Biometric screening against criminal databases might catch the “fake” Stolen Identity

The Zoo Sheep: –Real world biometric distinctive and stable Goats: –Difficult to authenticate Lambs: –Enrolled that are easy to imitate (cause passive FA) Wolves: –Good at imitating (cause active FA) Chameleons: –Easy to imitate and are good at imitating

Sample Quality Control Random False Reject/Accept caused by Adverse Signal Acquisition Solution –Better User Interface –Better model probabilistic into feature extraction/matching –Interactively improve input

Quality Control Define “desirable” Quality related to process-ability Quantify quality to decide action based on the level of quality, e.g. present info differently, apply image enhancement etc. Compromise between convenience and quality –Affects FTE, and also FA and FR ROC can be improved by eliminating poor data

ROC-Quality Control FMR (False Match Rate) FNMR (False Non-match Rate) Throw out bad data

Training Like Machine Learning Relate scores to probability that the biometric matches someone or doesn’t Training Testing

Enrollment as System Training Assigning IDs to Subjects Three possibilities –Correct –Someone faking enrolled (duplicate) –Someone faking unenrolled (fake) –P D =Prob(duplicate) –P F =Prob(fake)

Database Integrity How well database reflects the truth data Database duplication: Purge detected duplicates P D =FNMR E X P DEA –Prob of duplicate= Match bet. 2 samples not detected; double enroll P F =FMR E X P IA –Prob of fake enroll= Match bet. 2 samples falsely detected; Impersonation attack

P D -P F FMR (P F… ) FNMR (P D..)

Probabilistic Enrollment Enrollment Process Goal: –Build access control for from that are authorized –Likelihood of d_i given stored token B_i

Probabilistic Enrollment Enrollment Process Goal: –Machine representation of the “real” biometric Assumption about score : likelihood that we have the same subject –True if equivalently –.

Probabilistic Enrollment.. For realistic assumptions we need to model the world Probability can be approximated unrealistically by We need (given biomeric data collected during enrollment, O)

Modeling the World-1 Prior probability that subject d_i is present Prior probability that this observation will occur Modeling numerator on right is a matter of fitting model to data; rest impractical/impossible

Modeling the World-2 Cohorts –Models of most similar subjects World Modeling: –Reduce cohorts to a single model

Modeling the World-3 For Cohort Modeling

Updating Probabilities

Use of Probabilities Accuracy improvements Define measure of biometric integrity Integrity of different biometrics can be combined etc.