Hand Geometry-based Biometric Systems

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Discrete Finger and Palmar Feature Extraction for Personal Authentication Junta Doi, Member, IEEE,and Masaaki Yamanaka Advisor:Wen-Shiung Chen Student:
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics: Faces and Identity Verification in a Networked World
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Biometrics and Authentication Shivani Kirubanandan.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
February 11, Hand Geometry BIOM 426 Instructor: Natalia A. Schmid.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics Authentication Technology
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Multimodal Biometric Security 1.
Biometric Time & Attendance Solutions + Access Control
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Hand Geometry By: Kieran Hepworth.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Hand Recognition using Geometric Classifiers
A SEMINAR REPORT ON BIOMETRICS
Hybrid Finger print recognition
Presentation transcript:

Hand Geometry-based Biometric Systems Biometrics seminar Hand Geometry-based Biometric Systems Leena.ikonen@lut.fi 24.11.2003

Topics What is hand geometry? Why hand geometry? How do hand geometry systems work? What features are used and how? History Commercial applications Conclusions

Main Sources Jain, Ross & Pankanti: A prototype Hand Geometry-based Verification system (AVBPA 1999) Sanchez-Reillo et al: Biometric Identification through Hand Geometry Measurements (PAMI 2000) Kumar et al: Personal Verification using Palmprint and Hand Geometry Biometric (AVBPA 2003) Oden, Ercil & Buke: Combining implicit polynomials for hand recognition (PRL 2003) These are the main publications. There are a few more by Jain as well as Sanchez-Reillo et al. Most other cites are www-documents.

Hand Geometry Biometric used in verification (and identification) Verification: “Is this person who he claims to be?” Identification: “Who is this person?” Geometric features: finger widths, finger lengths, palm dimensions… Hand feature templates stored in database

Advantages of Hand Geometry User acceptance Low to medium cost Simple setup, simple equipment Small template size (typically 9-25 bytes) No association to criminal records (fingerprint)

Architecture Enrollment phase: take images, compute features and store template (typically average features from a few images) Comparison: take new image and compare to: One template (verification of given ID) All templates (identification)

Imaging setup for Hand Geometry Application Jain, Ross & Pankanti: A prototype hand geometry-based verification system Camera Platform + mirror Guiding pegs (pressure sensors activate camera)

Image capturing and Preprocessing Sanchez-Reillo et al. Binarize color image Eliminate background Resize and rotate Edge detection Jain, Ross & Pankanti: Gray-level image Pegs serve as control points Oden et al. One view (backlighting) No guiding pegs Edge detection Kumar et al. Binarize with threshold Align with best fitting ellipse Erosion for palmprint image

Preprocessing example From Oden et al Find fingertips and interfinger points

Feature selection Typical features: Finger lengths, widths, heights Jain, Ross & Pankanti Typical features: Finger lengths, widths, heights Palm widths

More examples of Features Left: Bulatov Right: Kumar (geometric features used in addition to the implicit polynomials)

... and more features Implicit polynomials (Oden): Model shapes of fingers with implicit polynomials Fitting is the main problem Polynomial coefficients are features in classification

Shape alignment Jain and Duta: Deformable matching of hand shapes for verification Mean Alignment Error

Selecting Significant Features Statistical analysis to find significant features by Sanchez-Reillo et al: variability ratio = interclass variability intraclass variability Features not significant enough are eliminated

Classification and Verification Feature vectors can be compared and classified with basic Pattern Recognition techniques Almost any classifier could be used (Bayesian, kNN, SVM, GMM, neural networks...) Classify to ”nearest” class or verify identity if feature values are close enough

Feature vector distances Distance metrics: Euclidean distance (sum squared error) Hamming distance (with some variance) Absolute or weighted absolute distance

Classification using correlation Kumar et al: Personal verification using palmprint and hand geometry biometrics: Compute normalized correlation between sample and template Match if correlation exceeds threshhold Kumar

Example of Classification Results Sanchez-Reillo: Hand Geometry Pattern Recognition through Gaussian Mixture Modelling GMM results compared with Hamming distance

Bimodal Biometric Systems Hand Geometry and Fingerprint frequent verification / infrequent identification Hand Geometry and Palmprint (Kumar et al) Information fusion at representation level: Concatenate feature vectors Information fusion at decision level: Separate match scores + e.g. max rule

Smart cards Hand geometry data can be stored on the user’s own smart card (Sanchez-Reillo et al) Personal data stays on the card Increased security & confidentiality The hand is the “PIN” associated with the card

Hand Geometry Applications Commercial hand geometry applications have been in use since 1970’s Widespread use since the 1990’s Access control Time and attendance Recognition Systems Inc is the big vendor

Identimat Identimat – pioneer in biometric systems One of the very first commercial applications Finger length and hand shape measurements First application in Wall Street investment firm Used in highly secure facilities (e.g. nuclear weapon industry) in 1970’s Not used at the Moscow Olympics...

RSI HandReaders Recognition Systems Inc. (Ingersoll-Rand) ID3D in the 1990’s: daycare centers, airports, university cafeterias, hospitals (birth centers) ... Prisons in Northern Ireland (Youth Offenders Centre in Belfast was first in 1994) Sandia Laboratories reported 0.2 % equal error rate for RSI verification already in 1991 Superior in user acceptance

ID3D HandKey by RSI PIN to provide identity (or magnetic stripe card) Re-averaging with sample at verification adjustable thresholds globally, per reader individually, per user tradeoff between false rejects (usability suffers) and false accepts (security suffers)

RSI HandReaders Access control Time and attendance (eliminates ”Buddy punching”) Platform with pegs > 90 measurements 9 byte feature vector No cards or badges PIN code to provide identity

INSPASS INS Accelerated Service System Inspection system used at airports in USA Frequent business travelers can avoid long lines by checking in via RSI HandReader kiosks PortPASS card, hand feature template Processing times typically 15-20 seconds Free enrollment, valid one year at a time

Finger Geometry at Disney World Biomet partners (Switzerland) The only major application not by RSI Two-finger geometry (index and middle finger) For season pass holders Convenience: pass holders can avoid long lines Deterrant: friends can not borrow passes

More application examples Electronic voting in South Africa (1994) Olympic Village security in Atlanta (1996) BASEL: hand geometry integrated with face recognition at border between Israel and Palestina to check people who cross daily

Conclusions Hand Geometry is simple, cheap and easy to use Hardly any user objections Discimination capability is low – but verification results are high ?? Hand geometry information may change (weight gain, weight loss, injuries, illness...) Using the systems is easy, but the best way to reduce false rejections is user training…

Easy is not always easy enough

Conclusions continued Low identification (but high verification) capability can be a good thing low risk of privacy violations no association to criminal records Physical size prevents use in some applications (e.g. laptop computers) – display scanners?

Problems with this review Conflicting information not accurate – but results are excellent ?? identification vs. verification Mostly commercial material – companies do not reveal the algorithms behind their systems Few research articles Performance higher in commercial systems than in scientifically published applications

Acknowledgements Thanks to Jani Peusaari, Esa Ruuth, Sami Seppänen and Petri Äijö for lending me their Machine Vision course project ”Identification by Hand Geometry” Features: hand perimeter, area, compactness