By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Creating and Maintaining Databases Dr. Pushkin Kachroo.
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
1 CPSC Historical Perspective M.L. Gavrilova.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometric for Network Security. Finger Biometrics.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Biometrics Dr. Nermin Hamza
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

By Hafez Barghouthi

Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristic

Definition Explaining Automated Different from human identification Living person Single persons, no groups Alive not dead (just JOKING)

Definition Explaining Physiological biometrics Fingerprint, Iris, Face, Hand Behavioural biometrics Signature, Gait, Voice

History - 1 Dates back to ancient Egypt Anthropometry (bodily measurements): Adolphe Quetelet (1871), Belgian mathematician Alphonse Bertillon (1880’s), French policeman Fingerprints and palmprints Used already by Babylonian kings Jan Evangelista Purkinje, Czech studying sweat glands Juan Vucetich, Argentinian policeman, first to take fingerprints in ink Francis Galton, Edward Henry: Galton-Henry system for classification

History - 2 Fingerprints and facials, 1880’s, Henry Faulds, William Herschel and Francis Galton fingerprint recognition on current form, 1960’s Hand geometry, 1970’s Retinal, signature and face verification, 1980’s Iris recognition, 1990’s Newer and newer: gait, keystroke dynamics, mouse movement, cardiac sounds, brain waves

Positive / Negative Positive recognition To prevent multiple people from using the same identity Negative recognition To prevent one person from using multiple identities

Physiological / Behavioural Physiological: Physical features ”unchangeably” attached to a person E.g. fingerprint, DNA, and face Behavioural: Behaviour that is very specific to a person E.g. signature, gait, and voice

Examples - Ear Shape of ear can be used for authentication

Examples - Face Used by humans Many different techniques available

Examples - Thermograms Facial, hand, hand vein

Examples - Fingerprint Global featuresLocal features

Examples - Gait "Great Juno comes; I know her by her gait" from "The Tempest“ by Shakespeare

Examples - Geometry Hand and finger geometry

Examples - Iris Remains unchanged after 2 years Iris code.

Examples - Keystroke Typical way of typing Combinations of keys Speed, force and press-down

Examples - Odor Used by humans Many problems

Examples – Retinal Scan Supposed to be the most secure biometric Not user friendly

Characteristics - overview Universality Distinctiveness Permanence Collectability Performance Acceptability Circumvention

Characteristic - Universality Each person should have the characteristic Failure to Enroll Rate (FER)

Distinctiveness Different persons should have different biometric properties False Match Rate (FMR)

Characteristic – Permanence The characteristic should be sufficiently invariant over a period of time False Non-Match Rate (FNMR)

Characteristic – Collectability The biometric property should be easy to collect (electronically) and to quantify

Characteristic – Performance This refers to the achievable recognition accuracy and speed False Non Match Rate (FNMR) Failure to Capture Rate (FCR)

Characteristic – Acceptability To which extent are people willing to accept the use of a specific biometric

Characteristic – Circumvention Reflects how easy it is to fool the system False Match Rate (FMR)

Application Environments Overt vs. covert Habituated vs. non-habituated Attended vs. non-attended Standard vs. non-standard Public vs. private Open vs. closed

Overt vs. covert Overt: User is aware that the biometric feature is being measured (e.g. finger on a fingerprint reader) Covert: User is unaware that the biometric feature is being measured (e.g. face recognition)

Habituated vs. non-habituated Habituated: System is used on a daily basis (e.g. to have access to the PC at work) Non-habituated: System is used irregularly (e.g. to access a personal safe in a bank)

Attended vs. non-attended Attended: Use is observed and guided by system management (e.g. access to a building) Non-attended: No observation or (regular) help is provided (e.g. access to PC)

Standard vs. non-standard Standard: System is in a static environment with controlled conditions (e.g. fixed lightning and background for face recognition) Non-standard: System in a dynamic environment (e.g. background noise for voice recognition)

Public vs. private Public: “Anybody” can use the system (e.g. voice recognition for bank transfers via phone) Private: Only employees can use the system (e.g. access to a factory or office building)

Open vs. closed Open: System can interact with other (biometric) system (e.g. biometric passport) Closed: System is stand-alone and no information is shared (e.g. systems to access classified information)

Biometrical Systems A biometrical systems consists of 2 modules: Enrollment module Template created and stored in database Authentication module Checked against stored template

Biometrical Systems

Errors False Non-Match Rate (FNMR) False Match Rate (FMR) False Rejection Rate (FRR) (used wrongly in literature). USE (FNMR) instead False Acceptance Rate (FAR) used wrongly in literature. USE (FMR) instead Failure to Enroll Rate (FER) Failure to Capture Rate (FCR)

Hypotheses and decisions H 0 : input biometric does not belong to the same person as the template biometric H 1 : input biometric does belong to the same person as the template biometric D 0 : Person is not who he claims to be D 1 : Person is who he claims to be

False Match Rate (FMR) Probability that a false claimed identity is not recognized as false Also called Type I Error Probability that D 1 is decided, given that H 0 is true: Prob( D 1 | H 0 ) Depends on a threshold t

False Non-Match Rate (FNMR) Probability that a correctly claimed identity is not recognized as true Also called Type II Error Probability that D 0 is decided, given that H 1 is true: Prob( D 0 | H 1 ) Depends on a threshold t

Failure to Enroll Rate (FER) Probability that a person cannot enroll in the biometric system Person doesn’t have biometric feature Person has poor quality biometric feature Trade-off between FMR/FNMR and FER

Failure to Capture Rate (FCR) Probability of failure to capture the biometric feature when trying to authenticate Bad capturing conditions Too dark for face recognition Dirty fingerprint reader Background noise for voice recognition

Equal Error Rate (EER) EER is the point where FMR and FNMR are equal

Distance metrics - 1 In biometrics we need to compare extracted features that will differ a bit every time they are measured Need a way to compare extracted features ”Inter person” distance must be large ”Intra person” distance must be small

Distance metrics - 2 We want to know how far 2 sequences x and y are apart or how close together they are. Let x = (x 1,x 2,…,x n ) Let y = (y 1,y 2,…,y n ) Assume x can be compared to y

Absolute Distance Sum the absolute differences between each of the components of x and y d 1 (x,y) = Σ | x i -y i | Extremely easy to calculate

Euclidean Distance Sum the squares of the differences between each of the components of x and y d 2 (x,y) = √ [ Σ ( x i -y i ) 2 ] Also easy to calculate

Maximum Difference Distance The distance between x and y is defined as the maximum absolute difference of its components d 3 (x,y) = max | x i -y i | Extremely easy to calculate

More distance metrics? Many more distance metrics possible Sometimes first a mathematical transformation of the data is needed Not all parts of the data need to be taken into account

Threshold Features are extracted from biometric characteristic Features are compared to template Distance metric gives distance d Use of threshold t d≤t: authentication OK d>t: authentication NOT OK

Example - Distance scores

Example – FNMR/FMR If t=0.256 we see that (FNMR,FMR) = ( 0/5, 3/20 ) If t=0.213 we see that (FNMR,FMR) = ( 1/5, 1/20 ) If t=0.212 we see that (FNMR,FMR) = ( 2/5, 1/20 ) If t=0.207 we see that (FNMR,FMR) = ( 2/5, 0/20 )

ROC Curve ROC: Receiver Operating Characteristic