Introduction to CBIRF and Biometrics Frank Yeong-Sung Lin Department of Information Management National Taiwan University EMBA 2009 – Information Systems.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Authentication Technology
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Ch6. Introduction to Database. What is a Database? Database is a collection of related information. It is organized so that it can easily be accessed,
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Stone Lock ® Pro Facial Recognition for Access Control TM.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Intelligent Face Recognition
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Introduction to CBIRF and Biometrics Frank Yeong-Sung Lin Department of Information Management National Taiwan University EMBA 2009 – Information Systems and Applications Lecture III

Outline Introduction to CBIRF Introduction to (face-based) biometrics Discussions 2

Introduction to CBIRF CBIRF – Content Based Image/Information Retrieval and Filtering Characteristics Adoption of only color, texture, shape and object position/size/orientation information in an image No metadata or human indexing/annotation required Real-time response High scalability High availability/reliability Internet as the search target Relevance feedback (learning) Other applications Anti-pornography Engine Anti-leakage Engine (for protection of confidential images) 3

4 Introduction to CBIRF (cont’d) Content based image retrieval Characteristics Feature extraction High dimensional indexing Relevance feedback (learning) ImageFeatures (color, texture, shape…) Database

5 Introduction to CBIRF (cont’d) Query/Seed Image Search Results

6 Applications of CBIRF Image search Video search Logo search IPR protection Confidential image management Objectionable image management Image and photo organizer Biometrics

7 Extension of CBIRF — Porn Filtering Anti pornography engine Applications 1. filtering 2.Desktop content management 3.Porn blacklist collection 4.Objectionable URL/Web content blocking PornographyPornographic FeaturesDatabase

8 Extension of CBIRF — Leakage Detection Anti (confidentiality/privacy) leakage engine Applications 1. filtering 2.Confidential content management Confidential Images FeaturesDatabase

9 Introduction to Biometrics Total biometrics industry revenue would grow from more than US$3.4 billion in 2009 to more than US$9.3 billion in 2014 (excluding the revenue from related professional and integration services). (International Biometric Group, )

10 Introduction to Biometrics (cont’d) TLJ Confidential

Remarks by Bill Gates, Chairman and Chief Software Architect, Microsoft Corporation IT Forum 2004 Copenhagen, Denmark, November 16, 2004 Passwords will soon be a thing of the past, replaced by biometric and smart-card technology, Bill Gates reiterated on Tuesday. – from Tech News on ZDNews Another major issue for identity systems is, of course, the weakness of the password. Passwords have been the primary way that people identify who they are. Unfortunately, for the type of critical information on these systems and the regulations that ask that these systems be secure, whether it is health data, financial data or customer access to customer records where only certain people should have that information, we are not going to be able to simply rely on passwords. Therefore, moving to biometric identification and particularly in moving to smart cards, is a way that is coming. This is something that has been talked about for several years, but now we finally see the leading edge customers taking that step. From “(i) what you have” to “(ii) what you know about” and eventually to “ (iii) who you really are” ICAO advocates biometrics technologies, particularly face-based, for passport holder authentication. Introduction to Biometrics (cont’d) 11

12 Introduction to Biometrics (cont’d) First choice Biometric Types Defined by ICAO (International Civil Aviation Organization)

Introduction to Biometrics (cont’d) The Enrollment Process Photo Taking Facial Area Positioning Face Detection Facial Feature Extraction from the Facial Area Facial Feature Archiving into the Specified Storage Device as a “Gallery” 13

Introduction to Biometrics (cont’d) The Facial Feature Verification Process Photo Taking Facial Area Positioning Face Detection Facial Feature Extraction from the Facial Area Retrieval of the Enrolled Facial Feature (Gallery) from the Storage Device Intelligent Comparison of the 2 Feature SetsComparison Result Reporting ACCEPT 14

Introduction to Biometrics (cont’d) Advantages of face-based over fingerprint-based biometric approaches More convenient Less intrusive More hygienic Leveraging on existing infrastructure (webcam) Less prone to duplicate (fingerprints easily available on protected devices, e.g. NBs) Capable of continuous verification Verifiability by human eyes Effects of deterrence and non-repudiation by logging probe/novel images 15

Introduction to Biometrics (cont’d) Characteristics of desirable face verification technologies Suitability for PCs/NBs/UMPCs/PDAs/Mobile Phones Insensitivity to lighting, pose, expression and accessory variations Low enrollment time Low verification time User adjustable and personalized sensitivity Dynamic thresholding Intelligent and self-learning galleries Factuality/Liveness detection Extremely high accuracy: e.g. product of FAR (False Acceptance Rate) & FRR (False Rejection Rate) lower than Integration with other, e.g., the credential (ID and password) mechanism 16

Merry Christmas and Happy New Year! 17