1 CPSC 601.20 Historical Perspective M.L. Gavrilova.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Biometrics.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Chapter 10: Authentication Guide to Computer Network Security.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Authentication.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

1 CPSC Historical Perspective M.L. Gavrilova

2 Lecture Overview History of Biometric Development Types of biometrics Data transmission Feature extraction Biometric Applications Biometrics and Privacy

3 Historical Overview The scientific literature on quantitative measurement of humans for the purpose of identification dates back to the 1870s and the measurement system of Alphonse Bertillon. Bertillon's system of body measurements, including such measures as skull diameter and arm and foot length, was used in the USA to identify prisoners until the 1920s.

4 Alphonse Bertillon

5 Historical Overview Henry Faulds, William Herschel and Sir Francis Galton proposed quantitative identification through fingerprint and facial measurements in the 1880s. Edmond Locard introduced using biometrics in forensic identification in 1920s.

6 Historical Overview The development of digital signal processing techniques in the 1960s led to work in automatic human identification. Speaker and fingerprint recognition systems were among the first to be explored. The potential for application of this technology to high-security access control, personal locks and financial transactions were recognized in the early 1960s. The 1970s saw development and deployment of hand geometry systems, the start of large-scale testing and increasing interest in government use of these "automated personal identification" technologies. There are currently 180 readers used by about 18,000 enrolled users. Retinal and signature verification systems came in the 1980s, followed by the face systems. Iris recognition systems were developed in the 1990s.

7 System measurements Systems might measure: a one-dimensional signal (voice); several simultaneous one-dimensional signals (hand writing); a single two-dimensional measure (fingerprint); multiple two-dimensional measures (hand geometry); a time series of two-dimensional images (face and iris); or a three-dimensional image (face).

8 Data Transmission If a system is to be open, compression and transmission protocols must be standardized so that every user of the data can reconstruct the original signal. Standards currently exist for the compression of fingerprints (Wavelet Scalar Quantization), facial images (JPEG) and voice data (Code Excited Linear Prediction). Fingerprint, hand and iris system input images.

9 Feature Extraction The raw biometric pattern, even after segmentation from the larger signal, contains non-repeatable distortions caused by the presentation, sensor and transmission processes. These non-controllable distortions and any non-distinctive or redundant elements must be removed from the biometric pattern, while at the same time preserving those qualities that are both distinctive and repeatable. These qualities expressed in mathematical form are called "features". In a text-independent speaker recognition system, for instance, features are: mathematical frequency relationships in the vowels, that depend only upon the speaker and not on the words being spoken, the health status of the speaker, the speed, volume and pitch of the speech.

10 Feature Extraction In general, feature extraction is a form of a non-reversible compression, meaning that the original biometric image cannot be reconstructed from the extracted features. In some systems, transmission occurs after feature extraction to reduce the requirement for bandwidth.

11 Feature Extraction We use the term "template" to indicate stored features. The features in the template are of the same type as those of a sample. For instance, if the sample features are a "vector" in the mathematical sense, then the stored template will also be a "vector". The term "model" is used to indicate the construction of a more complex mathematical representation capable of generating features characteristic of a particular user. The term "enrollment" refers to the placing of a template or model into the database for the very first time. In large-scale identification, the pattern matching process compares the present sample to multiple templates or models from the database one at a time as instructed by the decision subsystem, sending on a quantitative "distance" measure for each comparison. In place of a "distance" measure, some systems use "similarity" measures, such as maximum likelihood values.

12 Biometrics and Privacy Biometric measures can be used in place of a name, Social Security number or other form of identification to secure anonymous transactions. Walt Disney World sells season passes to buyers anonymously, then uses finger geometry to verify that the passes are not being transferred. The real fear is that biometric measures will link people to personal data, or allow movements to be tracked. After all, credit card and phone records can be used in court to establish a person's activities and movements. Phone books are public databases linking people to their phone number. These databases are accessible on the Internet. “Reverse" phone books also exist (a name from a phone number). Unlike phone books, databases of biometric measures cannot generally be reversed to reveal names from measures because biometric measures, although distinctive, are not unique.

13 Biometrics and Privacy Five US states have electronic fingerprint records of social service recipients (Arizona, California, Connecticut, New York and Texas). Six states (California, Colorado, Georgia, Hawaii, Oklahoma and Texas) maintain electronic fingerprints of all licensed drivers. Nearly all states maintain copies of driver's license and social service recipient photos. FBI and state governments maintain fingerprint databases on convicted felons and sex offenders. Federal government maintains hand geometry records on those who have voluntarily requested border crossing cards.

14 Biometrics and Privacy Unlike more common forms of identification, biometric measures contain no personal information and are more difficult to forge or steal. Biometric measures can be used in place of a name or Social Security number to secure anonymous transactions. Some biometric measures (face images, voice signals and "latent" fingerprints left on surfaces) can be taken without a person's knowledge, but cannot be linked to an identity without a pre- existing database. A Social Security or credit card number, and sometimes even a legal name, can identify a person in a large population. This capability has not been demonstrated using any single biometric measure.

15 Biometric and Privacy Like telephone and credit card information, biometric databases can be searched outside of their intended purpose by court order. Unlike credit card, telephone or Social Security numbers, biometric characteristics change from one measurement to the next. Searching for personal data based on biometric measures is not as reliable or efficient as using better identifiers, like legal name or Social Security number. Biometric measures are not always secret, but are sometimes publicly observable and cannot be revoked if compromised.

16 Summary As a authentication tool, biometrics firmly established itself as equal, if not surpassing, to other methods. Feature extraction is the key procedure in biometrics. Privacy levels are high when using biometrics.