Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Creating and Maintaining Databases Dr. Pushkin Kachroo.
Statistical Techniques I EXST7005 Lets go Power and Types of Errors.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Information Fusion in Multibiometric Systems
Bayesian Decision Theory Chapter 2 (Duda et al.) – Sections
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Indexing and Binning Large Databases
Biometrics II CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Visual Recognition Tutorial
1 BENCHMARKING FINGERPRINT ALGORITHMS Dr. Jim Wayman, Director US National Biometric Test Center San Jose State University
Large Scale Applications Dr. Pushkin Kachroo TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
880.P20 Winter 2006 Richard Kass Propagation of Errors Suppose we measure the branching fraction BR(Higgs  +  - ) using the number of produced Higgs.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
1 Power and Sample Size in Testing One Mean. 2 Type I & Type II Error Type I Error: reject the null hypothesis when it is true. The probability of a Type.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Chapter 9 Power. Decisions A null hypothesis significance test tells us the probability of obtaining our results when the null hypothesis is true p(Results|H.
Chapter 6 USING PROBABILITY TO MAKE DECISIONS ABOUT DATA.
Biometrics Authentication Technology
1 Biometric Databases. 2 Overview Problems associated with Biometric databases Some practical solutions Some existing DBMS.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Simple examples of the Bayesian approach For proportions and means.
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Hypothesis Testing and the T Test. First: Lets Remember Z Scores So: you received a 75 on a test. How did you do? If I said the mean was 72 what do you.
ECE 8443 – Pattern Recognition LECTURE 04: PERFORMANCE BOUNDS Objectives: Typical Examples Performance Bounds ROC Curves Resources: D.H.S.: Chapter 2 (Part.
Statistical Techniques
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition LECTURE 04: GAUSSIAN CLASSIFIERS Objectives: Whitening.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Hypothesis Testing Steps for the Rejection Region Method State H 1 and State H 0 State the Test Statistic and its sampling distribution (normal or t) Determine.
Hypothesis Testing and Statistical Significance
Inferential Statistics. Population Curve Mean Mean Group of 30.
This represents the most probable value of the measured variable. The more readings you take, the more accurate result you will get.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Inferential Statistics Psych 231: Research Methods in Psychology.
Host and Application Security Lesson 8: You are you… mostly.
Speaker Recognition UNIT -6. Introduction  Speaker recognition is the process of automatically recognizing who is speaking on the basis of information.
Visual Recognition Tutorial
FACE RECOGNITION TECHNOLOGY
Secure and Privacy-Preserving User Authentication Using Biometrics
LECTURE 05: THRESHOLD DECODING
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
ROC Curves Receiver Operating Characteristic (ROC) curves are used to determine the appropriate operating point of a system, the tradeoff between False.
Reasoning in Psychology Using Statistics
Reasoning in Psychology Using Statistics
LECTURE 05: THRESHOLD DECODING
Presentation transcript:

Integrating Information Dr. Pushkin Kachroo

Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2

Expanding a Biometric Multiple Matchers Multiple Biometrics Multiple Fingers Multiple Samples Multiple Sensors One Finger Multiple Tokens

Coupling Sensor 1Sensor 2 Process 1 Process 2 Integration Match Decision Sensor 1Sensor 2 Process 1 Process 2 Integration Match Decision Tightly Coupled Loosely Coupled

Boolean Combinations Biometric a Biometric b Accept/Reject AND Accept/Reject Biometric a Biometric b OR

Boolean: Convenience/Security Biometric a Biometric b Accept/Reject AND Accept/Reject Biometric a Biometric b OR Improve Convenience: Lower FRR (OR) Improve Security: Lower FAR (AND)

Filtering-Binning  Penetration Rate: P pr : The fraction of database being matched on average  Binning Error Rate: P be Filtering using non-biometric, e.g. using last name. (P,B) Binning using biometric, e.g. some whorl pattern (B,B’) Tradeoff

Filtering Error-Negative Identification Adding P n for subject d n to negative identification prescribes narrowing down on a smaller set of biometric template => Since we are comparing over a smaller set, the chance of false positives goes down. However, false negatives goes up because you might say the person is not in the database (looking at the smaller set) when the person might be in the full database.

Filtering Error-Positive Identification The probability that a person is who she/he says she/he is equals the probability of a match between stored biometric template and a newly acquired biometric sample. This match probability does not change if additional knowledge or possession is supplied.

Dynamic Authentication Example: Conversational biometric….allows for natural filtering by asking knowledge information during conversation; could include possession; while speaker recognition is taking place.

Boolean: Score Level Integration

Normal Distribution Accept Reject

Normal Distribution: Problems Covariance Matrix is assumed to be diagonal; okay for disparate biometrics but not for similar ones e.g. two fingers. Gaussian gives non-zero probability to negative scores.

Distance based B and B m are templates from the same biometric per means person

Degenerate Cases

ROC based Methods Match Mismatch Compare to… T FNM FM