U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
Biometrics.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
By: Monika Achury and Shuchita Singh
1 CPSC Historical Perspective M.L. Gavrilova.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometric Systems Adapted from B. Cukic
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
BIOMETRICS THE MAN MACHINE INTERFACE
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometric Systems Adapted from B. Cukic
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Hand Geometry Recognition
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 2 #2 DNA DNA (DeoxyriboNucleic Acid) is the 1D ultimate unique code for one’s individuality. Identification for forensic applications only. Three factors limit the utility of this biometric for other applications –Contamination and sensitivity –Automatic real-time identification issues –Privacy issues

U of HCOSC 6397 – Lecture 2 #3 Signature and Acoustic Emissions The way a person signs her name is known to be a characteristic of that individual. A related technology is authentication of an identity based on the characteristics of the acoustic emissions emitted during a signature scribble. Pros –Acceptable practice in many transactions Cons –They require contact and effort –They evolve over time and are influenced by physical and emotional conditions of the signatories. –Professional forgers can reproduce signatures to fool the unskilled eye.

U of HCOSC 6397 – Lecture 2 #4 Odor It is known that each object exudes an odor that is characteristic of its chemical composition and could be used for distinguishing various objects. Methodology –A whiff of air surrounding an object is blown over an array of chemical sensors, each sensitive to a certain group of aromatic compounds. –The feature vector consists of the signature comprising of the normalized measurements from each sensor. –After each act of sensing, the sensors need to be initialized by a flux of clean air.

U of HCOSC 6397 – Lecture 2 #5 Retinal Scan The retinal vasculature is rich in structure and is supposed to be characteristic of each individual and each eye. Pros –It is supposed to be the most secure biometric since it is not easy to change or replicate the retinal vasculature. Cons –The image acquisition involves cooperation of the subject, entails contact with the eyepiece, and requires a conscious effort on the part of the user.

U of HCOSC 6397 – Lecture 2 #6 Hand and Finger Geometry Some features related to a human hand, e.g., length of fingers, are relatively invariant and peculiar (although, not unique) to each individual. Finger geometry is a variant of hand geometry and is a relatively new technology, which relies only on geometrical invariants of fingers (index and middle). Pros –The representational requirements of the hand are very small (9 bytes). Cons –Suitable for verification only. –It requires cooperation from the subject. The registration of the palm is accomplished by requiring the subject’s fingers to be aligned with a system of pegs on the panel, which is not convenient for subjects suffering from arthritis.

U of HCOSC 6397 – Lecture 2 #7 Biometrics Technologies: A Comparison In the context of biometrics-based identification (authentication) systems, an application is characterized by the following properties: –Does the application need identification or authentication? –Is it attended (semi-automatic) or unattended (completely automatic)? –Are the users habituated (or willing to be habituated) in the given biometric? –Is the application overt or covert? –Are the subjects cooperative or non-cooperative? –What are the storage requirement constraints? –How stringent are the performance requirement constraints? –What types of biometrics are acceptable to the users?

U of HCOSC 6397 – Lecture 2 #8 Research Issues - Design Design of a biometrics-based identification system could essentially be reduced to the design of a pattern recognition system. The following design issues need to be addressed: –How to acquire the input data/measurements (biometrics)? –What internal representation (features) of the input data is invariant and amenable for an automatic feature extraction process? –Given the input data, how to extract the internal representation from it? –Given two input samples in the selected internal representation, how to define a matching metric that translates the intuition of “similarity” among the patterns? –How to implement the matching metric? –Organization of a number of (representations) input samples into a database. –Effective methods of searching a given input sample representation in the database.

U of HCOSC 6397 – Lecture 2 #9 Acquisition Issues: –Quality assessment; automatically assessing the suitability of the input data for automatic processing. –Segmentation; separation of the input data into foreground (object of interest) and background (irrelevant information). A lot of research is needed to systematize: –Rigorous and realistic models of the input measurements. –Metrics for assessment of quality of a measurement.