Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.

Slides:



Advertisements
Similar presentations
1 1999/Ph 514: Channel Access Concepts EPICS Channel Access Concepts Bob Dalesio LANL.
Advertisements

Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
COURSE: COMPUTER PLATFORMS
Copyright © 2006 Exportech Portugal. All rights reserved.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Socket Programming.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Chapter 5 – Big Picture Dr. V.T. Raja Oregon State University.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
OCT 1 Master of Information System Management Organizational Communications and Distributed Object Technologies Lecture 5: Distributed Objects.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Software Requirements
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Overview of Database Languages and Architectures.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Chapter 6: Packet Filtering
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
ACE Address Configuration Executive. Why ACE? ACE provides access to several address resolution protocols under a single API ACE is the only API available.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)
Feasibility Study.
Event Management & ITIL V3
Chapter 8 Evaluating Alternatives for Requirements, Environment, and Implementation.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Liang, Introduction to Java Programming, Seventh Edition, (c) 2009 Pearson Education, Inc. All rights reserved Chapter 43 Remote Method Invocation.
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Chapter 10 Defining Classes. The Internal Structure of Classes and Objects Object – collection of data and operations, in which the data can be accessed.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture Presented & Modified.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
CSC480 Software Engineering Lecture 10 September 25, 2002.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
1 Channel Access Concepts – IHEP EPICS Training – K.F – Aug EPICS Channel Access Concepts Kazuro Furukawa, KEK (Bob Dalesio, LANL)
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Testing Overview Software Reliability Techniques Testing Concepts CEN 4010 Class 24 – 11/17.
Simple Web Services. Internet Basics The Internet is based on a communication protocol named TCP (Transmission Control Protocol) TCP allows programs running.
1 Network Communications A Brief Introduction. 2 Network Communications.
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 4: Distributed Objects Dr. Ayman Srour Faculty of Applied Engineering and Urban Planning University of Palestine.
Chapter 2 Database System Concepts and Architecture
Node.js Express Web Services
FACE RECOGNITION TECHNOLOGY
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Continuous Automated Chatbot Testing
Systems Analysis and Design in a Changing World, 6th Edition
Channel Access Concepts
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005

Outline l BioAPI Standard l Reference: - Chapter

BioAPI l This specification defines the Application Programming Interface and Service Provider Interface for a standard biometric technology interface. l BioAPI V1.1 defines an open system standard API that allows software applications to communicate with a broad range of biometric technologies in a common way. l As an “open systems” specification, the BioAPI is intended for use across a broad spectrum of computing environments to insure cross-platform support. l BioAPI V1.1 was developed by the BioAPI Consortium and specifies standard functions and a biometric data format which is an instantiation of CBEFF.BioAPI Consortium

BioAPI l BioAPI creates a modular framework allowing programmers to develop once for a biometric device the easily make their work compatible with other devices l Capabilities addressed by the API include: - Enrollment, verification, identification, capture, process, match, and store l The goal is to hide as much as possible the unique aspects of individual biometric technologies and vendor implementations l Attempts to provide a high level of abstraction that an be used within a number of potential software applications

BioAPI Specification, Version 1, March 2001 l Concepts l BioAPI Definitions - E.g., BioAPI data structures, Registry schema, Error handling, Framework operations, Streaming I/O, l BioAPI Service Provide Interface - Data structures for the interface, service provider operations, Database operations

Concepts l BSP: Biometric Service provider l BIR: Biometric Identification Template l API Model l Client/Server Processing Methods l Other Concepts

Biometric Service Provider (BSP) Biometric Service Provider Identification User Interface Input Scanning Quality Enhancement Feature Extraction Process Sample Raw Sample Construct BIR Verification User Interface Enrollment User Interface Result BIR Result List Set of BIRs Verification Algorithm Identification Algorithm Intermediate BIR Intermediate BIR Processed BIR Capture (Process is a NO-OP) Match CaptureProcess Match Capture Process Match

Biometric Identification Record (BIR) t HeaderOpaque Biometric Data Signature Factors Mask BIR Data Type Length (Header + Opaque Data) Header Version Quality Purpose Mask OwnerID Format

API Model l There are three principal high-level abstraction functions in the API: - Enroll: Samples are captured from a device, processed into a usable form from which a template is constructed, and returned to the application. - Verify: One or more samples are captured, processed into a usable form, and then matched against an input template. The results of the comparison are returned. - Identify: One or more samples are captured, processed into a usable form, and matched against a set of templates. A list is returned showing how close the samples compare against the top candidates in the set.

Supporting Client Server Processing: Two approaches l Use Primitive Functions - Capture, process, Match, Create Template l Using streaming callback - The client/server application decides whether the authentication should be driven by the client or the server component. - The application calls the appropriate high-level function, and the BSP calls the Streaming Callback to initiate the BSP-to-BSP protocol. - The StreamInputOutput function is used by the partner application to deliver messages to the partner BSP, and to obtain a return message to send to the driving BSP.

Primitive Functions

Using Streaming Callback: Server Initiation Authentication Client Application Client BSP BioAPI Framework Authentication Server Application Server BSP BioAPI Framework Device Identify Verify Enroll BSP-to-BSP protocol Process and Match algorithms Streaming Callback StreamInputOutput App. Provides a communication channel for the BSPs Capture

Using Streaming Callback: Client Initiation Authentication Client Application Client BSP BioAPI Framework Authentication Server Application Server BSP BioAPI Framework Device Identify Verify Enroll BSP-to-BSP protocol Process and Match algorithms Streaming Callback StreamInputOutput App. Provides a communication channel for the BSPs

Other Concepts l There are two possible criteria for the results of a match: False Accept Rate (FAR) and False Reject Rate (FRR). - FAR is the probability that samples falsely match the presented template, - FRR is the probability that the samples are falsely rejected (i.e., should match, but don’t). l The BioAPI functions allow the application to request a match threshold in terms of maximum FAR value (i.e., a limit on the probability of a false match,) and an optional maximum FRR value. l If both are provided, the application must tell the BSP which one should take precedence.

Other Concepts l BIR Database: The BioAPI allows a BSP to manage a database of BIRs - To optimize the performance of the Identification operation over large populations - To provide access to the BIRs that may be stored on a self- contained sensing device. l User Interface: Most biometric service providers come with a built-in user interface - The API allows the application to control the “look and feel” of this user interface l Module Registry: Upon installation, BioAPI components (framework and BSPs) post information about themselves in the BioAPI module registry. - This information is used by the application to determine if the BioAPI framework has been installed.

Example BioAPI API Definitions l BioAPI_BIR: A container for biometric data. l typedef struct bioapi_bir { BioAPI_BIR_HEADER Header; BioAPI_BIR_BIOMETRIC_DATA_PTR BiometricData; /* length indicated in header */ BioAPI_DATA_PTR Signature;/* NULL if no signature; length is inherent in this type */ } BioAPI_BIR, *BioAPI_BIR_PTR;

Example BioAPI API Definitions l A BSP schema entry as posted to the BioAPI module registry. l typedef struct _bioapi_bsp_schema{ BioAPI_UUID ModuleId; BioAPI_DEVICE_ID DeviceId; BioAPI_STRING BSPName; BioAPI_VERSION SpecVersion; BioAPI_VERSION ProductVersion; BioAPI_STRING Vendor; BioAPI_BIR_BIOMETRIC_DATA_FORMAT BspSupportedFormats; uint32 NumSupportedFormats; uint32 FactorsMask; uint32 Operations; uint32 Options;

Example BioAPI API Definitions l A BSP schema entry (CONTINUED) uint32 PayloadPolicy; uint32 MaxPayloadSize; sint32 DefaultVerifyTimeout; sint32 DefaultIdentifyTimeout; sint32 DefaultCaptureTimeout; sint32 DefaultEnrollTimeout; uint32 MaxBspDbSize; uint32 MaxIdentify; BioAPI_STRING Description; char Path; }BioAPI_BSP_SCHEMA, *BioAPI_BSP_SCHEMA_PTR;

Example BioAPI Service Provier Specifications BioSPI_ModuleEventHandler l This defines the event handler interface that the BioAPI framework defines and implements to receive asynchronous notification of events of type BioAPI_MODULE_EVENT from a service provider module. Example events include insertion or removal of a hardware service module, or fault detection. l typedef BioAPI_RETURN (*BioSPI_ModuleEventHandler) ( const BioAPI_UUID *BSPUuid, void* BioAPINotifyCallbackCtx, BioAPI_DEVICE_ID DeviceID, uint32 Reserved, BioAPI_MODULE_EVENT EventType);

Directions l Development of the Standards l Development of the Products l Evaluation of the products - What are the criteria used to evaluate the products? - How do the products conform to the standards? - Are there ratings? - Is there a list of evaluated products l Similar to the National Computer Security Center's list of evaluated securer system products