Fighting Identity Theft with Advances in Fingerprint Recognition Dick Mathekga.

Slides:



Advertisements
Similar presentations
Classification & Your Intranet: From Chaos to Control Susan Stearns Inmagic, Inc. E-Libraries E204 May, 2003.
Advertisements

CrowdER - Crowdsourcing Entity Resolution
BIOMETRIC VOTING SYSTEM
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Face Recognition & Biometric Systems Support Vector Machines (part 2)
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Structural bioinformatics
Introduction to Fingerprint Biometrics By Tamar Bar.
Biometrics II CUBS, University at Buffalo
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Time Series Report - Basic 1.Introduction 2.Long term trend 3.Seasonal Component 4.Residual Component 5.Predictions 6.Conclusion (Refer to “Stats enquiry.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
A PCA-based feature extraction method for face recognition — Adaptively weighted sub-pattern PCA (Aw-SpPCA) Group members: Keren Tan Weiming Chen Rong.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Aspera License Management –
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
A Neural Network Classifier for Junk Ian Stuart, Sung-Hyuk Cha, and Charles Tappert CSIS Student/Faculty Research Day May 7, 2004.
Feasibility Study.
A Survey of Patent Search Engine Software Jennifer Lewis April 24, 2007 CSE 8337.
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
 Text Representation & Text Classification for Intelligent Information Retrieval Ning Yu School of Library and Information Science Indiana University.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
CORE ZOO. INTRODUCTION Will biometric characteristics within a zoo menagerie change with the addition of good and bad quality biometric enrollments?
1 Challenge the future High accuracy machines on factory floors Anthonie Boogaard.
Visual Inspection Product reliability is of maximum importance in most mass-production facilities.  100% inspection of all parts, subassemblies, and.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 Pattern Recognition: Statistical and Neural Lonnie C. Ludeman Lecture 24 Nov 2, 2005 Nanjing University of Science & Technology.
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
FINGERPRINT-BASED STAFF ATTENDANCE PROPOSAL PRESENTATION.
WELCOME.
1 Machine Vision. 2 VISION the most powerful sense.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Jean-Yves Le Meur - CERN Geneva Switzerland - GL'99 Conference 1.
Fingerprint Classification Maor Sharf. A fingerprint can be used by many organizations for many purposes: Fingerprints Police Biometric ID Security.
Facial Recognition By Lisa Tomko.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Civil Registration Process: Place, Time, Cost, Late Registration
Biometrics.
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
A maximum likelihood estimation and training on the fly approach
POWER CHALLENGES Several Ways To Solve 7 CHALLENGES.
Alternative Classification
Presentation transcript:

Fighting Identity Theft with Advances in Fingerprint Recognition Dick Mathekga

Outline  Identity theft is …  Made possible by … and …  Can be solved through …  Biometric recognition against a central database is such a method  Adoption of technology is slow  Software description  Software performance

Identity theft is … … when person a assumes the identity of person b, using identifying information of person b; usually to: gain access to privileges available to person b commit a crime and not have it linked back to them.

Made possible by … Full Names National ID Number Telephone Number

… and …

Can be solved through … … a more reliable method of confirming identity.

Biometric recognition against a central database is such a method Use of a biometric to automatically determine or confirm an identity

Adoption of technology is slow Hardware + Software

Software description Software library with functions needed to perform biometric recognition using fingerprints; including the following core functions:  fingerprint feature extraction  fingerprint feature comparison  fingerprint classification

Software description ( cont … )

There are 5 different types of fingerprint patterns and thus 5 fingerprint classes.

Software performance Feature extraction  fingerprint features can be extracted from quality fingerprints.  not all features are always extracted or extracted correctly.  overall performance is below that of most commercial software and were making improvements.

Software performance ( cont … ) Feature comparison  matching features from different fingerprints can be identified  performance of our similarity score formula compare favourably with those in the published literature  overall performance still below that of best commercial products

Software performance ( cont … ) Fingerprint classification  we have obtained classification accuracies of over 90% classifying fingerprints in Database 1 of the 2002 and 2004 fingerprint verification competitions  accurate location of singular point remains a challenge; especially for poor quality fingerprints

Summary  Identity theft was defined and one of its many consequences mentioned  The reasons why identity theft is possible were presented.  A solution to the problem of identity theft was discussed.  A hindrance to the realisation of the solution was presented.  CSIR’s contribution to the realisation of the solution is discussed.

Thank you