Biometric Authentication : using fingerprints and evaluating fingerprint readers M. Ndlangisa Supervised by: Prof P. Wentworth and J. Ebden.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
BIOMETRIC VOTING SYSTEM
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Department of Labor HSPD-12
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Incorporating a Fingerprinting System into the Western Kenya Health and Demographic Surveillance System, 2009 Ezekiel Chiteri, Wilfred Ijaa Frank Odhiambo,
CM-707 Standalone Fingerprint Access Control System CM -707 is biometrics fingerprint recognition standalone access control system.It can store up to 800,1500.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Biometrics II CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Large Scale Applications Dr. Pushkin Kachroo TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Large Scale USA PATRIOT Act Biometric Testing C. L. Wilson Image Group IAD-ITL.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Science Fair Project Type your project title here Your name Period # Miss Gregory Chenango Forks Middle School.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Scientific Method A blueprint for experiment success.
BSc Honours Project Introduction CSY4010 Amir Minai Module Leader.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
WFP Initial EFSA Learning Session 5.3. Overview: Initial EFSA Report 1.
Application of Maximum Entropy Principle to software failure prediction Wu Ji Software Engineering Institute BeiHang University.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
An Introduction to Biometrics
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
Science Fair Project Type your project title here Your name Period #
Latent Print Examiner.
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Secure and Privacy-Preserving User Authentication Using Biometrics
Welcome To Money pad November 23, 2018 Sample footer.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Biometric Authentication : using fingerprints and evaluating fingerprint readers M. Ndlangisa Supervised by: Prof P. Wentworth and J. Ebden

Why Fingerprints: Universal Uniqueness/distinctiveness Permanence Measurability/collectability

Project Goals versus Background: Investigate the low level functioning of Fingerprint readers Primary: Design an evaluation experiment, Develop simple Software prototype to carry an evaluation and then carry the experiment

Overview: Evaluation Experiment Design Software Design and Implementations Experiment results and observations Conclusion

Experiment design: Critical evaluation factors -Failure to enroll rate - the number of fingerprints that are rejected by the system -Matching Accuracy( verification success rate) - FAR and FRR -Access speed - time spent on matching -Effects of increasing record size - scalability

Experiment design continued………. Experiment data collection -Source -CS 2 students –Braae labs - Volunteers – Calnet -Data recorded - Failed enrolments - false acceptances and false rejects - registration times - verification times - bin size

Software Design: The ActiveX control Registration Software Verification Software - one-to-one verification match - one-to-many positive identification match - a hybrid system that partitions the database

Registration Software: Latent prints -Before a new registration is made the left- over prints are flushed using a built-in flush command Registration Demonstration using Digital Persona U are U model

Verification Software: Three different programs were developed Focus is on the “binned” solution A brief look on the one-to-one program

Binned system design:

Demonstration: Using digital Persona U are U fingerprint reader

Experiment Results : Enrolment Success Rate Enrolment results Scanner Precise Biometrics 100 SC Digital Persona reader Difference in performance Braae Laboratory[1][1] Fail-to-enroll rate 12.05%17.02%4.97% +persona Enrollment-success rate 87.95%82.98 %4.97% +persona Calnet Laboratory Fail-to-enroll rate 5.5%12 %6.5%+persona Enrollment-success rate 94.5%88%6.5%+persona Difference in performance 6.55% +braae5.02% +braae [1][1] The CS undergrad Laboratory where the experiment was conducted

Matching Accuracy: “ Binned example” Verification Success Rate Digital Persona U are U Precise Biometrics 100 SC Difference in FRR/FAR FAR 2.74%9.3%6.56%+precise FRR 1.36%39.5%38.14%precise Difference 1.38%+far30.2%+frr

Matching Accuracy: One-to-one Precise 100 SC Digital Persona Difference Verification Success Rate 66%94%28%+persona FAR4%0%4%+precise Difference62%+vsr94%+vsr

Access speed: The average bin size was 9 records Binned ExampleDigital PersonaPrecise 100 SCDifference in time Average time3 seconds1 seconds2 seconds +persona One-to-one verification 0.5 seconds0.4 seconds0.1seconds +persona Difference in time2.5 seconds +binned0.6 seconds +binned Average time

Observations: The Digital persona is better than the Precise fingerprint reader in one important aspect - matching accuracy In general the two fingerprint readers can hardly work unsupervised Making it hard for them to be implemented in a Lab Access Control problem

Conclusion: I hope my Affair with Biometric Authentication will get me an honours degree!!!