C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

International Workshop on Usability and Biometrics: NIST Welcome
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Introduction to Applicant Livescan processing for DPW.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
INTEROPERABILITY OF BIOMETRIC INFORMATION
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
NIST Special Publication Biometric Data Specification for Personal Identity Verification March 3, 2006 Update.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Introduction to Fingerprint Biometrics By Tamar Bar.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Collecting Multimodal Biometric Data Ross J. Micheals Image Group, Charlie Wilson, Manager Information Access Division, Martin Herman, Chief National Institute.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Large Scale USA PATRIOT Act Biometric Testing C. L. Wilson Image Group IAD-ITL.
1 National Fingerprint-based Applicant Check Study (N-FACS) Gary L. Williams Project Manager Programs Development Section Gary S. Barron Project.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Biometric Measures for Human Identification
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
8 th Grade Forensic Science A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
8th Grade Forensic Science
BIOMETRICS.
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
Texas DPS AFIS Update Texas Homeland Security Conference San Antonio April 27, 2011.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
A Closer Look at Fingerprints
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
Biometric technology.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Making a Match.
Hybrid Finger print recognition
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
A Closer Look at Fingerprints
Presentation transcript:

C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act

Statutory Mandates USA Patriot Act (PL ) Enhanced Border Security and Visa Entry Reform Act (PL ) Develop and certify technology standard to –verify identity of foreign nationals applying for a visa visa application at embassies and consulates background check against FBI criminal database and DHS databases and “watch lists” ensure person has not received visa under a different name –verify identity of persons seeking to enter the U.S. verify that the person holding the travel document is the same person to whom the document was issued airports, land border crossings, sea entry points

Statutory Mandates (cont) NIST worked together with Dept of Justice (including FBI & JMD) Dept of Homeland Security and Dept of State to develop a report on these activities to Congress under section 303a of the Border Security Act NIST must determine estimates of the accuracy of biometrics in the 303a report and subsequent mandatory reports. NIST must establish document authentication standards for tamper-resistant travel documents in the 303a report which should not conflict with ICAO mandates NIST must provide interoperability standards

Status of NIST Patriot Act Projects  Biometric accuracy determination requires use of large- scale databases for testing.  Large realistic test samples of images have been obtained from the State Department, Homeland Security and Justice Departments and Texas, Ohio, and California.  Initial testing will be of face and fingerprints. A large sample of iris data is presently being planned.  All tests conducted by NIST use image-based biometrics. No tests using templates for face and fingerprint have been conducted. Most vendors state that their products only work when their proprietary templates are used.

Results Presented in the Report to Congress  Results show that fingerprints and face provide similar accuracy for verification when image quality is well controlled. Uncontrolled face image quality results in a rapid accuracy decrease to less than 50%.  Using realistic DHS (INS) data, one index fingerprint can provide 90% probability of verification with a 1% probability of false acceptance for verification using current commercial technology.  Tests show that for the best commercial systems using well controlled State Department data, face recognition can provide 90% probability of verification with a 1% probability of false acceptance for verification. Outdoor illumination results in 47% probability of verification.  Large scale identification requires four or more fingerprints. Ten flat fingerprints were recommended.

BIOMERTIC TESTING IS SCALE DEPENDENT SAMPLE SIZE 100-1,000 Proves feasibility SAMPLE SIZE 1,000-10,000 Measures subject variation SAMPLE SIZE 10,000-1,000,000 Measures operational quality control Existing government databases contain millions of entries and have widely varying quality.

ONLY IMAGE BASED BIOMETRICS ARE INTEROPERABLE All fingerprint vendors claim significant accuracy loss using templates that are not their own unique proprietary pattern or minutia based templates. No common face template has been accepted. The only Iris template in use is proprietary. After these projects started an image based iris exchange standard was developed.

DATA QUALITY IS CRITICAL Existing high quality public database will yield optimistic results. Archival databases contain data of widely variable quality. Demographic factors will affect the accuracy of future systems.

Fingerprint Data Sets

Face Data Sets

FINGERPRINT STUDIES Data quality determines the results Lab Quality Data –NIST SD published data –Used to investigate Rolled-Rolled, Plain-Rolled, and Plain-Plain matching Operational Quality Data –New live scan data –Typical law enforcement data –Low quality data Operational Systems –Track NIST public domain matcher but with similar accuracy.

FINGERPRINT EVALUATION IS MULTIVARIENT Image quality is a very critical parameter see: ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_7020.pdf Algorithms are important but vary widely in sensitivity to image quality. Multi finger fusion is required for many applications.

Operational Fingerprint Data May include failure to register data Can be nonstationary in the usual time series sense Has demographic variations which may be or may not be nonstationary Usually contains source specific factors which cause variations

Comparison of Thumb and Index Finger Verification Using DHS 10 Print Data

Large Scale Identification Database sizes will approach 50M Existing AFIS system –Use 10 rolled fingerprints –Filter the database to reduce the required matches NIST tests track with known IAFIS results –hard and easy data sets are still hard and easy –failure to acquire rates are similar

Commercial AFIS Testing Is More Complex Commercial system usually have data screening, a primary matched, and multi- finger score resolution. Commercial systems use data screening to reduce database size. The primary matcher then matches the reduced database. Additional matches are used to resolve near matches.

FACE STUDIES FRVT 2002 established a baseline for the capabilities of existing commercial technology. Demographic sources of variation were characterized using operational DOS data. Error rates were cut in half from the FRVT 2000 test.

Factors Beyond the Control of the System Developers Are Important Demographic –Age –Gender Source Conditions –Time Since Image Capture Archival –Illumination –Type of Input Device

Identification as a Function of Illumination

FACE VERIFICATION Used 3 copies of 37,437 well controlled visa images from the State Department Achieved 90% probability of verification at 1% false accept rate Achieved 70% probability of verification at 0.01% false accept rate Using outdoor illumination, face achieves 47% probability of verification at 1% false accept rate

IDENTIFICATION USING FACES Used 37,437 well control1ed State Department visa pictures. Achieved 86% probability of identification at rank one on a gallery size of 500. Achieved 77% probability of identification at rank one on a gallery size of 10,000.

NIST 303a Conclusions Not all subjects can be easily fingerprinted with existing technology. About 2% of subjects have damaged friction ridges. The intelligence community often only has face data. This indicates that a dual biometric system including two fingerprint images and a face image is needed to meet existing verification system requirements.

NIST 303a Conclusions For identification 10 flat fingerprints were recommended and at least four are essential. Existing sensor technology dictates 8 or 10. Face may be used for hard to fingerprint individuals.

Expect New Results Analysis and testing for both face and fingerprints is continuing. New questions are being raised by both the entry-exit agencies and Congress. New data is being acquired. New test are performed - FpVTE

SDK Testing - 8 Algorithms, 12 datasets, 3.46G matches