Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
April 14, Infrared Identification Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
March 10, Iris Recognition Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
BIOMETRICS.   technology/9742-1_ html.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 14: FINGERPRINTS
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Hybrid Finger print recognition
Presentation transcript:

Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics

Outline n Basic Concepts n Fingerprint n Iris Scan n Hand Geometry n Face Recognition

Identification vs Verification n Identification: Who am I? One-to-many search n Verification: Am I who I claim I am? One-to- one search n Detection: Find out whether there is an instance of a given type of object in an environment. n Recognition: detection + identification

Terminology n False Acceptance Rate (FAR) : the probability that a biometric device will allow a ‘bad guy’ to pass. Related to security. n False Rejection Rate (FRR):the probability that a biometric device won't recognize a good guy. Related to convenience. n The point where false accept and false reject curves cross is called the "Equal Error Rate." The Equal Error Rate provides a good indicator of the unit's performance. The smaller the Equal Error Rate, the better.

Validity of Test Data n Testing biometrics is difficult, because of the extremely low error rates involved. n Some are based on theoretical models. n Some are obtained from actual field testing. n It's important to remember that error rates are statistical: they are derived from a series of transactions by a population of users.

What is a good biometric feature? n Uniqueness n Invariance n Non-intrusive n Easy (or not too difficult) to acquire n Low processing cost

Fingerprint n Finger-scan biometrics is based on the distinctive characteristics of the human fingerprint. n A fingerprint image is read from a capture device, features are extracted from the image, and a template is created. n If appropriate precautions are followed, what results is a very accurate means of authentication.

Fingerprints vs Finger-scans n Fingerprint images require 250kb per finger for a high-quality image. n Can be acquired using ink-and-roll procedure, optical or non-contact methods. n Finger-scan technology doesn't store the full fingerprint image. It stores particular data about the fingerprint in a much smaller template, requiring from bytes.

AFIS n AFIS (Automated Fingerprint Identification Systems) - commonly referred to as "AFIS Systems" (a redundancy) - is a term applied to large-scale, one-to-many searches. n Although finger-scan technology can be used in AFIS on 100,000 person databases, it is much more frequently used for one-to- one verification within 1-3 seconds.

Fingerprint Characteristics n Can be classified according to the decades-old Henry system: u left loop u right loop u arch u whorl u tented arch

Feature Extraction Steps Minutiae, the discontinuities that interrupt the otherwise smooth flow of ridges, are the basis for most finger- scan authentication.

Accuracy n False Rejection Rates (FRR), or the likelihood that the system will not "recognize" an enrolled user's finger-scan, in the vicinity of 0.01%. n False Acceptance Rates (FAR), or the likelihood that the system will mistakenly "recognize" the finger-scan of a user who is not in the system, are frequently stated in the vicinity of 0.001%. n The point at which the FAR and FRR meet is the Equal Error Rate, frequently claimed to be 0.1%.

Iris Scan n Iris recognition is based on visible (via regular and/or infrared light) qualities of the iris. n A primary visible characteristic is the trabecular meshwork (permanently formed by the 8th month of gestation), a tissue which gives the appearance of dividing the iris in a radial fashion. n Other visible characteristics include rings, furrows, freckles, and the corona.

Iris Recognition Technology n Iris recognition technology converts the visible characteristics discussed before into a 512 byte IrisCode(tm), a template stored for future verification attempts.

Accuracy n The odds of two different irises returning a 75% match (i.e. having a Hamming Distance of 0.25): 1 in 10^16 n Equal Error Rate (the point at which the likelihood of a false accept and false reject are the same): 1 in 1.2 million n The odds of 2 different irises returning identical IrisCodes: 1 in 10^52

Benefits n Uniqueness n Established prior to birth and remains intact through out the life.

For more details n Check Dr. John Daugman’s web page:

Hand Scan n Hand-scan reads the top and sides of the hands and fingers, using such metrics as the height of the fingers, distance between joints, and shape of the knuckles. n Although not the most accurate physiological biometric, hand scan has proven to be an ideal solution for low- to mid-security applications where deterrence and convenience are as much a consideration as security and accuracy.

Example n HandPunch 2000/3000 model developed by Recognition Systems

Pros and Cons n Advantages u Ease of use u Resistant to fraud u Template size u User perception n Disadvantages u Static design u Cost u Injury to hands u Accuracy

Face Recognition n Most natural because this is how we human recognize other people. n Remains a difficult subject.

Primary Facial Scan Technologies n Eigenfaces n feature analysis n neural network n automatic face processing

Typical Eigenfaces

Feature Analysis n The most widely utilized facial recognition technology n Local Feature Analysis (LFA) utilizes dozens of features from different regions of the face, and also incorporates the relative location of these features. n The extracted (very small) features are building blocks, and both the type of blocks and their arrangement are used to identify/verify.

ANN Approach n Features from both faces - the enrollment and verification face - vote on whether there is a match. n Neural networks employ an algorithm to determine the similarity of the unique global features of live versus enrolled or reference faces, using as much of the facial image as possible.

AFP n Automatic Face Processing (AFP) is a more rudimentary technology, using distances and distance ratios between easily acquired features such as eyes, end of nose, and corners of mouth. n Not as robust, but AFP may be more effective in dimly lit, frontal image capture situations.