User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
ISECON 2011 A Decade Review of a Masters-Level Real-World-Projects Capstone Course Charles Tappert and Allen Stix Pace University, New York.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Indexing and Binning Large Databases
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 13 Biometrics What you are
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
A User Verification System: Spring, 2002 Timely Problems, Novel Solutions Project Team Members: William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
1 Pattern Recognition Concepts How should objects be represented? Algorithms for recognition/matching * nearest neighbors * decision tree * decision functions.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Journal 2010 The Trend toward Online Project- Oriented Capstone Courses Charles Tappert and Allen Stix Pace University, New York.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
ISECON 2011 A Decade Review of a Masters-Level Real-World-Projects Capstone Course Charles Tappert and Allen Stix Pace University, New York.
Biometrics Authentication Technology
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
BIOMETRICS.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Today’s Session Introduction Overview of Biometrics Dr. Charles C
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Hybrid Finger print recognition
Presentation transcript:

User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha

Aim: To improve confidence level by hybridizing multiple biometrics such as Face, Finger print, Handwriting, Hand geometry, Iris and Voice. Confidence Level: Percentage of correct answers, valid user accepted and invalid user rejected. To reduce false positive and false negative errors : - valid user rejected - invalid user accepted

Types of Biometrics decided for this project experiment: Face Handwriting Voice Finger print

biomouse Fingerprint scanner Digital Camera LCD Pen tablet Microphone Multi-modality Biometric Authentication Embeded & Hybrid User Verification system System that requires user verification

Hand Writing features: Width Height Drag count Total stroke time Total stroke distance Stroke direction sequence string Acceleration Tools used: LCD Pen Tablet for data collection Java application for feature extraction

Each person writes differently.

Face Recognition: Photos collected have to be properly sized and also be gray scale. Eigen face technology is used to calculate the mean face/value Recognition is done using Nearest Neighbor method. Tools Used: Digital Camera for data collection Mathworks’ Matlab for training and recognition

Each person has different faces.

? Query Face DB Face Recognition System

width, length User 1 User 2 User1 s1 = ( 12, 16 ) User1 s2 = ( 11, 20 ) User2 s1 = ( 9, 8 ) User2 s2 = ( 10, 7 ) Truthfeatures Measurements

slant width user1 user2 = user1 ? Nearest Neighbor Classifier too slow for users to wait for the output.

Data Acquisition Feature Extraction Training an ANN Classification System HandwritingDone -- FaceDone** VoiceDone--- Finger print ---- Modality Steps Project Status ** - Eigen face and nearest neighbor methods used.

Advantages: Higher accuracy of determining an individual Reliable by having multiple recognition techniques or biometrics Increased security in companies Reduced amount of time to identify a suspect or criminal for law enforcement Difficult to challenge the system by forging names and mimicking voices making it virtually impossible to pass as someone else Possible use in a court of law to prove criminal cases Low maintenance software

Future Plan: Handwriting training and classification. Voice feature extraction methods Finger print data collection

Demonstration Handwriting Face Recognition

Sub-classing with Java