Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1 Biometric Solutions Company ELSYS Corp. St. Petersburg, Russia.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Introduction: What we know and don’t know about biometrics.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Multimodal Biometric Security 1.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Biometrics Viktor MINKIN

OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems Multi-modal systems Problems Links History and future

Introduction Biometrics [harmonized] Automated recognition of persons based on their biological or/and behavioral characteristics. Automated measurement of biological or/and behavioral characteristics of person for medical, security or psychological purposes.

Introduction Terms and definitions Template Capture Comparison Database Enrollment Matching Token User

Introduction Identification of a person –Verification/Verify Comparing one to one “Am I who I claim I am” –Identification Comparing one to many “Who am I”

Introduction Application Passport control Access to secured areas Surveillance ATMs Computer logins E-commerce Medicine Psychology

Introduction Traditional means of automatic identification (before biometrics) –Knowledge-based Use “something that you know” Examples: password, PIN –Token-based Use “something that you have” Examples: credit card, smart card, keys

Introduction Problems with traditional approaches –Token may be lost, stolen or forgotten –PIN may be forgotten or guessed by the imposters (25% of people seem to write their PIN on their ATM card) Estimates of annual identity fraud damages per year: –$1 billion in welfare disbursements –$1 billion in credit card transactions –$1 billion in fraudulent cellular phone use –$3 billion in ATM withdrawals

Introduction The traditional approaches are unable to differentiate between an authorized person and an imposter  Use biometrics which relies on “who you are” or “what you do”

Biometric Systems Requirements for an ideal biometric –Universality Each person should have the characteristic –Uniqueness No two persons should be the same in terms of the characteristic –Permanence The characteristic should not change

Biometric Systems Issues in a real biometric system –Performance Identification accuracy, speed, robustness, resource requirements –Acceptability Extend to which people are willing to accept a particular biometric identifier –Faked protection How easy is it to fool the system by fraudulent methods

Biometric Systems Identification accuracy FAR = false acceptance rate FRR = false rejection rate EER = equal error rate TER = total error rate = FAR + FRR FER= false enrollment rate

Biometric Systems Receiver operating characteristics (ROC) False Rejection Rate False Acceptance Rate Equal Error Rate

Biometric Systems FAR/FRR and comparison threshold

Biometric Characteristics Static (biological) parameters Fingerprints Face Iris Hand geometry / vein Retinal pattern Facial thermogram Lip information DNA

Biometric Characteristics Dynamic (behavior) biometric parameters Signature Voice Motion Pulse

Biometric Characteristics Market Shares

Biometric Characteristics Market development

Fingerprints Accurate Comparatively cheap hardware Questionable acceptance

Fingerprints Optical technology Light reflects from the surface of the prism where the finger is not in contact with it, while it penetrates the surface of the prism where the finger touches the surface of the prism. The resulting image goes through a lens into a video camera. Light source Finger Video Camera (CCD) LensPrism

Fingerprints Capacity technology

Fingerprints Fiber optic technology

Fingerprints Fingerprint types Arches Loops Whorl Bridge Dot Ridge Ending Bifurcation Enclosure Minutia types

Fingerprints Core & Deltas

Fingerprints Fingerprint minutiae

Fingerprints Image transformation Source FFT Flow field Directional Directional Directional image 1 image 2 irregularity Code Smoothing Binarization Skeleton Skeleton Minutiae formation cleaning search

Fingerprints Comparative testing

Fingerprints Fingerprint information

Unimodal Systems Facial ID Illumination Head pose Occlusion

Unimodal Systems Hand Vein Questionable accuracy Hand geometry

Unimodal Systems Retinal Pattern Highest accuracy Even more intrusive than iris recognition

Unimodal Systems Facial Thermo image and VibraImage Non-intrusive Lie detection View-dependent Emotion control Depends heavily on Criminals detector human factors, Medical monitoring body temperature Psychology testing

Multi-modal Systems Why multimodal [multiple] person identification? –Quest for non-intrusive identification methods No special purpose hardware needed Works potentially at greater distances –“Traditional” arguments for going multimodal: Increasing performance Increasing robustness –Mono-modal recognition techniques are likely to reach in a close future a saturation in performance.

Multi-modal Systems: Fusion “Early integration” or “sensor fusion” Integration is performed on the feature level Classification is done on the combined feature vector Features Modality 1 Classifier Features Modality 2 Features Modality n-1 Features Modality n Identity

Multi-modal Systems BioFinger 3 - Elsys includes BiCard, VibraImage, 3D-Elsys is biological and behavioral identification system

Multi-modal Systems The World population in 2000 was about M. people. The biometric document (ID card) market is more than $ There are 3 different ID card technologies: 1. Card with additional memory (chip, CD,..) 2. Card with 2d-bar code 3. BiCard (3D-Elsys)

Problems Errors rate Misunderstanding of real advantages and problems Incomplete true about biometric systems

Links International Biometric Group - NIST - Literature – Patents -

Biometrics evolution 19 century- not automated identification 20 century- biometric identification 21 century- emotion recognition and detection

Viktor Minkin Biometrics Thank you! 2004