BioSec © 2004 BioSec Consortium 1 Biometrics & Security IST-2002-001766 1st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages.

Slides:



Advertisements
Similar presentations
Becars: an Automatic Speaker Verification system
Advertisements

Some activities on Biometrics at ENST/CNRS-LTCI
Fraunhofer Institute Secure Telecooperation Areas of Work.
COST ACTION 275 BIOMETRICS-BASED RECOGNITION OF PEOPLE OVER THE INTERNET Progress Report June 2001-May 2002 Aladdin Ariyaeeinia University of Hertfordshire,
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
ISO/IEC JTC1 SC37 Overview
Information Fusion in Multibiometric Systems
SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Identity Verification in a Networked World
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Chapter 10: Authentication Guide to Computer Network Security.
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
SecurePhone : a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly IST Secure contracts.
An Introduction to Biometric Identity Verification
BioSec Biometrics & Security IST CEN/ISSS FG Biometrics © 2004 BIOSEC Consortium 1Sept 2004 Orestes SanchezBioSec CoordinatorTelefónica I+D,
BioSec Biometrics & Security IST COPRAS Kick-off © 2004 BIOSEC Consortium 1Oct 2004 Orestes SanchezBioSec CoordinatorTelefónica I+D, S.A.U.
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
COST-275, Halsmtad 03 Javier Ortega-Garcia / BRL UPM 1/7 Biometrics Research Lab. /ATVS Universidad Politecnica de Madrid Javier Ortega-Garcia,
Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Secure contracts signed by mobile Phone IST Jacques Koreman, NTNU Andrew Morris, Spinvox International Workshop on Verbal and Nonverbal Communiation.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Bob Jones Technical Director CERN - August 2003 EGEE is proposed as a project to be funded by the European Union under contract IST
Biometrics Authentication Technology
BioSecure : A Network of Excellence on Biometric identity authentication B. Dorizzi, GET-INT, France G. Chollet, GET-ENST, Paris.
1 ISO/IEC JTC1/SC37 Standards A presentation of the family of biometric standards October 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
Multimodal Biometric Security 1.
Biometric Recognition Implementation for Automatic Monitoring Kamen Spassov, PhD, MBA Associate Professor FMI, Sofia University.
Unobtrusive Authentication Using ACTIvity Related and Soft BIOmetrics
TeleTrusT Initiatives for PKI Solutions
Multimodal Biometric Security
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Use of Biometric Technology in Payments to avoid Frauds
Biometric technology.
E-Commerce for Developing Countries (EC-DC)
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BioSec © 2004 BioSec Consortium 1 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Moderator: Dolores Garcia-Plaza Ibermática

BioSec © 2004 BioSec Consortium 2 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004

BioSec © 2004 BioSec Consortium 3 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Anil K. Jain Michigan State University

BioSec © 2004 BioSec Consortium 4 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004

BioSec © 2004 BioSec Consortium 5 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Fabio Roli University of Caligary (Italy)

BioSec © 2004 BioSec Consortium 6 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004

BioSec © 2004 BioSec Consortium 7 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Josef Kittler University of Surrey (England)

BioSec © 2004 BioSec Consortium 8 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004

BioSec © 2004 BioSec Consortium 9 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Gérard Chollet CNRS-LTCI, GET-ENST (France)

BioSec © 2004 BioSec Consortium 10 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Biometric Identity Verification within GET (Groupe des Ecoles de Télécommunication) Signature, Fingerprint and Iris (INT) Speaker Verification (ENST and Eurecom) Face (Eurecom), Talking face (ENST) Fingerprint and Hand-shape (ENST) Collection of the BIOMET database (talking faces, infrared faces, 3D faces, fingerprints, signatures, hands) BIOLAB : usability studies in Biometrics Participation to the speaker (NIST), fingerprint (FVC) and signature (SVC) evaluation campaigns Partner in on-going projects : SecurePhone, TRUST-eS Technical coordinator of the NoE-BioSecure

BioSec © 2004 BioSec Consortium 11 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 BioSecure : A Network of Excellence on Multimodal Biometric Identity Authentication Kick-off meeting on July 2nd, 2004, work plan for 3 years Initiator and technical coordinator: GET (Groupement des Ecoles de Télécommunication) 29 Core Partners  Main academic actors in the field  Satisfy excellence criteria : publications, PhD, etc…  Involved in different aspects of Biometrics  With experience in evaluation campaigns Relations with Industrials, small companies... through a Forum of Industrial and end user partners :  Thales, ST-Microelectronics, France Telecom, Bouygues Telecom, Gemplus, OPSIS, ELRA/ELDA, ORGA, etc…

BioSec © 2004 BioSec Consortium 12 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 NoE-BioSecure : specific objectives on multimodal fusion Develop and distribute open-source reference algorithms for each modality and for the fusion of modalities : fingerprint, palmprint, face, iris, signature, handwriting, text-dependent and text-independent speaker verification, talking face, … Define and distribute evaluation protocols on available databases (XM2VTS, DAVID, BANCA, BIOMET, NIST,…) using the concept of ‘virtual’ (chimeric) identity Contribute to the collection of data to complement existing databases. Organise a 4-weeks residential workshop in Sept to experiment and evaluate fusion techniques Organise a 3-weeks residential workshop in July 2007 to ‘fuse’ the improvements made by all partners.

BioSec © 2004 BioSec Consortium 13 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 False acceptance (a topic to be debated…) Some conditions are unfavorable for biometry :  Some fingers cannot be registered  Illumination is a problem in face recognition  Noise and distortions are problems for speech  Cooperation is necessary for iris Most modalities are prone to falsification :  Dummy fingers  Voice transformation  Face morphing  Lenses Multimodality is a solution but :  User friendliness should be maintained  A talking face (with iris capture) could be a natural combination

BioSec © 2004 BioSec Consortium 14 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Andrew Morris Saarland University (Germany)

BioSec © 2004 BioSec Consortium 15 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 ergal SecurePhone Secure contracts signed by mobile phone IST

BioSec © 2004 BioSec Consortium 16 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Project aims Secure PKI infrastructure Deal secure m-contracts during a mobile phone call secure: private key stored on SIM card user-friendly: intuitive, non-intrusive flexible: legally binding text/audio transactions dynamic: mobile e-signing “on the fly”

BioSec © 2004 BioSec Consortium 17 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multi-modal biometric verification preprocessing modelling preprocessing face voicesignature modelling “welcome” / “access denied” “Please repeat” fusion

BioSec © 2004 BioSec Consortium 18 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Ear, iris, odour: search for the perfect system Owen Bowcott, The Guardian, Friday June 18, 2004 Many pilot projects launched amid expectations that they would transform retail behaviour or prevent bank card fraud have been quietly shelved. Some encountered consumer resistance, SecurePhone authentication will be psychologically neutral and high-tech functionalities will be masked under the reassuring interface of a smartphone others were technically unreliable SecurePhone will combine only dependable authentication techniques or required massive investments that might never earn their return. The SecurePhone will be assembled only from standard components

BioSec © 2004 BioSec Consortium 19 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages and Drawbacks; Different Understanding of Building a Multimodal System 1st BioSec Workshop Barcelona, June 28th, 2004 Tommi Rakshit Home Office – Finland BIOSEC partner

BioSec © 2004 BioSec Consortium 20 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004