Collecting Multimodal Biometric Data Ross J. Micheals Image Group, Charlie Wilson, Manager Information Access Division, Martin Herman, Chief National Institute.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

International Workshop on Usability and Biometrics: NIST Welcome
Face Processing in Social Networking Services NTIA Privacy Multistakeholder Process: Commercial Facial Recognition Technology March 25, 2014 Olga Raskin.
ITIL: Service Transition
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Zen and the Art of Facial Image Quality Terry P. Riopka.
FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Biometric Eye Model and Ray Tracing for Improved Iris Recognition Goal: Superior Iris Biometric Scanning Technology - Enhanced Recognition of Irises Principal.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Introduction to Fingerprint Biometrics By Tamar Bar.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
KBA 1 Korea’s Advances in Biometrics Market & Technology Alex H. Choi Korea Biometric Association.
ACCOUNT RELATIONSHIP MANAGEMENT
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Proxy Design Pattern Source: Design Patterns – Elements of Reusable Object- Oriented Software; Gamma, et. al.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Chapter 10: Authentication Guide to Computer Network Security.
Large Scale USA PATRIOT Act Biometric Testing C. L. Wilson Image Group IAD-ITL.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 1 Business Driven Technology.
1 Biometrics and the Department of Defense February 17, 2003.
Privacy Protection for Life-log Video Jayashri Chaudhari, Sen-ching S. Cheung, M. Vijay Venkatesh Department of Electrical and Computer Engineering Center.
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Biometric Measures for Human Identification
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
CHAPTER 1 Understanding RESEARCH
The IBM VM CS450/550 Section 2 Stephen Kam. IBM VM - Origins Originally an experimental OS called “CP-67” Designed to run on the IBM System/360 Model.
Worldwide Biometrics
Eye regions localization Balázs Harangi – University of Debrecen Ciprian Pop – Technical University of Cluj-Napoca László Kovács – University of Debrecen.
Biometric Iris Recognition System INTRODUCTION Iris recognition is fast developing to be a foolproof and fast identification technique that can be administered.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
1 Melanie Alexander. Agenda Define Big Data Trends Business Value Challenges What to consider Supplier Negotiation Contract Negotiation Summary 2.
Supporting Market Adoption of Contactless Fingerprint Capture Technologies John Libert ITL/Information Access Division.
Data Management Managing Big Data Briefing 10/2012 Will Graves US-VISIT Chief Biometric engineer Chair of Biometric Domain.
1 C H A P T E R © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in.
Defining the Marketing Research Problem and Developing an Approach
Retinal & Iris Scanners
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Lecture Outline 12 Other ways of obtaining systems IS Department in a Business Organization The Future of IS.
Chapter 1 Computer Technology: Your Need to Know
Black Ice Security Services
Service Organization Control (SOC)
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Model Based Iris Recognition with Plenoptic Cameras
© 2012 The McGraw-Hill Companies, Inc.
Biometrics.
Biometric technology.
Optical Networks & Smart Grid Lab.
CVE.
Presented by: k.ramya krishna
Presentation transcript:

Collecting Multimodal Biometric Data Ross J. Micheals Image Group, Charlie Wilson, Manager Information Access Division, Martin Herman, Chief National Institute of Standards and Technology International Meeting of Biometrics Experts 23 March 2004

The United States government has no multimodal database of face, fingerprint, and iris images suitable for evaluation. Challenges

Multimodal Biometrics  Initial motivation: Collect an iris image database  Data collections have substantial fixed costs  Additional sensors are relatively less expensive  Extension of original goal: Collect a multimodal biometric database

Iris Recognition  Iris images are an ICAO (International Civil Aviation Organization) approved biometric  Large market expansion anticipated in early 2005 at expiration of iris recognition concept patent  Iris recognition systems have been deployed internationally and are in operation today

Multimodal Biometrics  There are inherent correlations among different biometric modalities  NIST Face Recognition Vendor Test Young females (face vs. fingerprints) Chinese (face vs. iris?) More data is an opportunity to discover additional relationships  Multimodal data is being collected right now, every day (US-VISIT)

MBARK Multimodal Biometric Accuracy Research Kiosk  MBARK is an externally deployable, multimodal biometric acquisition and information system  NIST as the maintainer, and synchronizer, and gatekeeper  Two major purposes: To collect biometric data To obtain data about collecting biometrics  Multi-agency project Department of Homeland Security (S&T, TSA) Intelligence Technology Innovation Center (ITIC) Department of State

MBARK Multimodal Biometric Accuracy Research Kiosk  Current goal for one MBARK session Eighteen face images (two sets of nine each) Forty fingerprints (two sets on two sensors) Four iris images (two sets of two each)  Most of the data will be sequestered for use in future evaluations  Small portions of the data will be released for scientific and research purposes

Aside: Privacy  Rule of thumb “Would we want to be in the database?”  Suppose we release face, fingerprint, and iris images of a subject in the database  Critical to ensure that multiple modalities could not be synchronized outside of NIST and Privacy Act protection  Conclusion: Release one and only one modality per subject externally

Research & Operational Needs  Data collections should address a real operational need or a specific research question  Data collected to evaluate a deployed system would be an operational motivation  The design of MBARK reflects a mixture of operational and research needs  MBARK Face: Operational and research Fingerprint & Iris: Operational

MBARK : Face  Nine color cameras  Five-megapixels per image  Olympus C5050Z  Some reliability problems  Operational Multiple images  Research Multiple images (FRVT 2002) Texture-based Image-based 3D

MBARK: Fingerprint  Optical slap scanners  Smiths-Heimann LS2  CrossMatch ID500  Operational Ohio WebCheck Sensor comparisons

MBARK: Iris  Oki IrisPass-WG  Near infrared illumination  Grayscale iris images  Two irises in one sitting  User does not need to manipulate camera  Primarily an operational driven component

MBARK: Registration  Identification of subjects returning later  Using a well-studied model (US-VISIT) as an aid to identify subjects on return visits  Single fingerprint scanner  CrossMatch Verifier 300

Open Systems  NIST evaluations are typically with an emphasis on open systems  Ensures interoperability among components  Prevents deployments from being locked into any particular vendor  Requires component evaluations  Example: Face Recognition Vendor Test (FRVT) and Fingerprint Vendor Technology Evaluation (FpVTE) compared algorithms over a set of common images

System vs. Component Evaluation  Iris-recognition market is system oriented  I.e., what you buy is meant to be used in an end-to-end system, rather than an interoperable component  How does this effect image-based evaluations?  Hypothetical example: “MH Electrics,” iris camera manufacturer “EyeRidian,” iris recognition software

Iris Camera Model MH 5000 Iris Recognition Algorithm EyeRidian v1.2 Control Software Iris Recognition System

Iris Recognition Algorithm EyeRidian v1.2 Iris Recognition Algorithm EyeRidian v1.2 RecognitionImage Quality For “high” quality images, recognition is 99.99% But, suppose only 70% of all data is high quality. Iris Recognition System

Iris Recognition Algorithm EyeRidian v1.2 Iris Recognition Algorithm EyeRidian v1.2 RecognitionImage Quality Iris Recognition System

Iris Camera Model MH 5000 Iris Recognition Algorithm EyeRidian v1.2 Image Quality MH Control Software What about the 30% of images that are not “high” quality? How might other algorithms do on these images? If there are no images of sufficient quality, the sensor reports a failure to acquire (FTA). FTA data is usually not available for image- based evaluations.

Iris Camera Model MH 5000 Iris Recognition Algorithm EyeRidian v1.2 Image Quality MH Control Software Iris Recognition System

Conclusion  In component testing, be aware of the internals of each component and how evaluations might be effected  For some modalities, we can reduce bias by using a mix of sensors Example: Many fingerprint scanners all with different control logic  For other modalities, testing components requires more sensitivity  The degree of this minimization depends on the state of the market and vendor support

Questions?