Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,

Slides:



Advertisements
Similar presentations
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
Advertisements

BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Automatic Location and Extraction of Palmprint Contour from Grayscale Image Student Yu Yue Tutor Shi Guangshun.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Overview of Computer Vision CS491E/791E. What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Automatic Fingerprint Identification System Purpose Fingerprinting Process Applications Cost Issues Future National ID Card.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
BIOMETRICS.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometric Technologies
OUTLINE I.Biometrics: What Is It? II.Why Ear Biometrics? III.Ear Biometrics IV.How A Biometric System Works V.Conclusion.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Data and Applications Security Developments and Directions
FACE RECOGNITION TECHNOLOGY
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Example: Recognizing Five Letters
Biometrics.
Biometric technology.
Fingerprint Recognition
Presentation Outlines
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12, 2005

Outline l Guest Lecture l Some Topics in Biometrics

Introduction to Biometrics Guest Lecture Image Feature Extraction and Annotation September 12, 2005

Some Topics in Biometrics l Reference Papers published on the web by researchers at Michigan State University l Overview l Fingerprint Identification l Hand Geometry l Face Location l Multi-Biometrics

Overview l Biometrics is the automatic identification of a person based on his/her physiological and behavioral characteristics l Verification vs. Identification - Am I whom I claim I am? - Who am I? l Applications - Criminal identification, ATMs, Cellular Phones, Smart cards, PCs, E-Commerce, Automobiles (biometrics replacing car keys)

Fingerprint Identification l Finger-print matching - Two categories: Minutiae based, Correlation based l Minutiae-based techniques - First find the minutiae points and then map their relative placement on the finger - Issues: difficult to extract minutiae points if fingerprinting is of low quality l Correlation-based techniques - Spatial correlation of regions - Issues: Affected by Image translation

Fingerprint Identification (Concluded)) l Finger-print classification - Classify the fingerprints so that search time is reduced - Form groups of fingerprints; Classification is obtained by matching with pre-specified types of finger-prints - When a new finger-print arrives try and place it into a group - Classification based data mining/machine learning algorithms such as K-Nearest Neighbor l Fingerprint Image Enhancement - Algorithms to enhance the finger-print - This is expected to facilitate finger-print matching - Makes it less difficult to extract minutiae from fingerprints

Hand Geometry l Uses geometric shape of hand for authenticating user’s identity - Combine various individual features of hand for effective verification l Human hand is not in general unique (not the case with fingerprints) l Reason one may want to use hands instead of finger-prints is to ensure privacy l Some pros and cons - Hand geometry gives better privacy - But hand geometry is not unique; therefore may be used for verification - Not suitable for identification

Face Location and Retrieval l Problem - Given an arbitrary black and white still image, find the location and size of every human face it contains l Applications - First step in automatic face recognition - Image database indexing - Search by content for surveillance systems

Multi-Biometrics l Integrating Faces and Fingerprints for Identification - Single biometric may not be effective - Integrate multiple biometrics such as fingerprints and faces l Fingerprint, Face and Speech - Better to use a third biometric and that is speech l Challenge - What is an effective combination of biometrics?