Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Access control techniques
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric authentication system. Problem formulation: authentication and identification. Structure of a biometric system. Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics.

Methods of Identity Verification Is their any need for automatic biometric identification? Possessions (what you have) keys, cards, badges -lost or stolen -can be shared -can be duplicated -no remote or over-the-phone use Knowledge (what you know) passwordspasswords, PIN, user id -can be forgotten -can be shared -can be guessed Biometric (what you are) fingerprints, face, iris, ?

Applications of Automatic Identification and Authentication 1.physical access control (computer, car, house, room, bank, border crossing, boarding planes, … ) 2.access to services, facilities, information (computer, bank account, database) 3.user identity monitoring for authorized use (is it still the user who did the login?, authorized car driver? ) 4.surveillance, security, crime prevention 5.many other situations (authorization to collect a child) Note: applications 3. and 4. cannot be handled by classical identity verification procedure (3. requires continuous operation, 4. is covert) Market size is huge Market size is huge …..

Biometric: any measurement of person’s physiological traits or behavior fingerprint face iris retinal scan ear shape hand geometry infrared (face, body parts) speech handwriting signature lip movements keystroke dynamics gait odor Physiological: Behavior:Genetic: tissue sample Market share

hand geometry iris scan fingerprint face recognition and more …

Characterization of a biometric system Cost Recognition performance (false accept, false reject, identification precision) measured by: FAR and FAR, or ROC curves,FAR and FARROC curves User acceptability (friendliness) – depends on many factors: ease of use, ease of enrolment, prejudice, invasive/non invasive, speed of authentication … (retinal scan: low, face recognition: high, widely used on ID cards) Covert/Overt (covert: face recognition, gait; overt: signature, iris scan) One shot/continuous (keystrokes, face recognition can verify identity over time) Contact/Remote/Tele (Tele: can identity by verified over the phone?, Remote: physical contact needed?) Non-Repudiation (denial should not be possible) Attended / Unattended Subterfuge resistance (e.g. is just a recording presented? ) Human verifiable? (can be used semi-automatically)? Properties of individual biometrics Performance of selected biometrics

Problems: Identification vs. Authentication Identification (1:N matching): the system uses the biometric to determine the corresponding person from a database containing many people, or decides that the person is not enrolled in the database. Authentication (1:1 matching, identity verification): the system matches the input biometric against a single biometric record. The latter could be stored on a card presented at the transaction time, or looked up in a database with the help of a key such as an account number or employee ID. The output of the match is either “Yes” if the two biometrics match or “No” otherwise. Often during the enrollment process, we need to employ an identification system to make sure the person is not already enrolled and the subsequent usages are authentication instances using the unique number assigned to the user during the enroll. Structure of a biometric system

Literature:  Biometrics: Personal Identification in a Networked Society, Jain, Bolle, Pankanti, Eds., Kluwer Press. ISBN  Biometrics: Advanced Identify Verification: The Complete Guide, by Julian D. M. Ashbourn, 352 pages Bk&Cd-Rom edition (October 2000), Springer Verlag; ISBN:  Biometrics: Identity Verification in a Networked World, by Samir Nanavati, 224 pages 1 edition (March 15,2002) John Wiley & Sons; ISBN: