A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Following the work of John Daugman University of Cambridge
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
BIOMETRICS THE MAN MACHINE INTERFACE
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
BIOMETRICS.
Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
Biometrics Security in Banking Systems Image processing in ATM
Hand Geometry Recognition
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Following the work of John Daugman University of Cambridge
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey

© 2003 by David Lin2 Outline Problems and motivations Different identification methods –Face Recognition –Fingerprints –Iris Recognition –Hand Geometry –Others Summary and Conclusions

© 2003 by David Lin3 Problems Security has always been an important concern to many people. Such as banks, industrial, military systems, and personal information. Traditional security and identification are base on things that can be easily breached. Knowledge based or token based. Not unique, can be duplicated, e.g. Passwords and ID cards.

© 2003 by David Lin4 Biometrics System Identity verification of living, human individuals based on physiological and behavioral characteristics. “Something you are or you do” In general, biometric system is not easily duplicated and unique to each individuals

© 2003 by David Lin5 Biometrics System What should we look for in Biometrics systems? –Universality, which means that each person should have the characteristic –Uniqueness, which indicates that no two persons should be the same in terms of the characteristic –Permanence, which means that the characteristic should not be changeable –Collectability, which indicates that the characteristic can be measured quantitatively

© 2003 by David Lin6 Face Recognition Techniques such as, Eigenfaces, geometry representation, Gabor wavelet transform, Karhunen-Loeve, etc. Acquisitions - frontal view, half profile, profile view. Affected by facial beard, glasses, hair style, age.

© 2003 by David Lin7 Fingerprints Most of the existing systems uses “minutiae” in a fingerprint image for matching. Minutiae are the details in the fingerprint ridges, ridge endings and bifurcations. Endings Bifurcations

© 2003 by David Lin8 Fingerprints Extraction Filter 1 = ending 2 = ridge 3 = bifurcation

© 2003 by David Lin9 Iris Recognition The highly randomized appearance of the iris makes its use as a biometric well recognized. Its suitability as an exceptionally accurate biometric derives from its, –extremely data-rich physical structure, –genetic independence, no two eyes are the same –stability over time –physical protection by a transparent window (the cornea) that does not inhibit external viewability.

© 2003 by David Lin10 Iris Recognition Daugman Method, zero-crossing 1D wavelet transform, multi-channel Gabor filtering Most of them uses Gabor wavelets filter Iris code is calculated using circular bands that have been adjusted to conform to the iris and pupil boundaries. Eyelashes or the eyelid obscure part of the grid might influence system operations

© 2003 by David Lin11 Multi-channel Gabor filtering Extracted block is 512 x 64 pixels Daugman Method Eight circular band 512-byte iris code

© 2003 by David Lin12 Hand Geometry Different views of the prototype designed: (a) Platform and camera, (b) placement of the user's hand, and (c) photograph taken. Measurements Widths Heights Deviations Angles Classifiers Euclidean Distance Hamming Distance Gaussian Mixture Models GMM shows the best result

© 2003 by David Lin13 Hand Vein Patterns Hand vein pattern is distinctive for various individuals. The veins under the skin absorb infrared light and thus have a darker pattern on the image of the hand taken by an infrared camera. One system is manufactured by British Technology Group is called Veincheck and uses a template with the size of 50 bytes. Back of the hand

© 2003 by David Lin14 Retinal Patterns Uses the vascular patterns of the retina of the eye. In healthy individuals, the vascular pattern in the retina does not change over the course of an individual's life. The patterns are scanned using a low-intensity (e.g. near-infrared) light source.

© 2003 by David Lin15 Retinal Patterns The main drawback of the retina scan is its intrusiveness. A laser light must be directed through the cornea of the eye. Operation of the retina scanner is not easy. The size of the eye signature template is 96 bytes.

© 2003 by David Lin16 Signature Uses the dynamic analysis of a signature to authenticate a person. Measuring dynamic features such as speed, pressure and angle used when a person signs a standard, recorded pattern (e.g. autograph). Captured using a tablet One focus for this technology has been e-business applications and other applications where a signature is an already accepted method of personal authentication.

© 2003 by David Lin17 Summary & Conclusions Ease of use Error incidence AccuracyUser acceptance Required security level Long- term stability FingerprintHighDryness, dirtHighMediumHigh Hand Geometry HighHand injury, age HighMedium IrisMediumPoor Lighting Very HighMediumVery HighHigh RetinaLowGlassesVery HighMediumHigh SignatureHighChanging signatures HighVery highMedium FaceMediumLighting, age, hair, glasses HighMedium

© 2003 by David Lin18 Summary & Conclusions By combining two or more individual biometric systems cheaper and reliable security can be obtained.