Download presentation
Presentation is loading. Please wait.
Published byHenry Carroll Modified over 8 years ago
1
What does it mean to us?
2
History Biometrics Defined Modern Day Applications Spoofing Future of Biometrics
3
1858 First use of hand images for identification 1903 NY State Prisons begin using fingerprints 1936 Concept of using the iris for identification is proposed 1960 Face recognition becomes semi automated 1969 FBI pushes to make fingerprint recognition an automated process 1970 Automated biometrics, in general, starts to become more than just a concept (because of computers)
4
1988 First semi-automated facial recognition system is deployed 1994 First iris recognition algorithm is patented 1996 Hand geometry is implemented at the Olympic games 1998 FBI launces CODIS (DNA forensic database)
5
“Bio” = life “Metrics” = to measure
6
What someone has? What someone knows? What someone is? Two Main Categories Physiological Behavioral
7
Sensor: Collect data Signal Processing Algorithms: Develop the Biometric Template Data Storage Component: Holds information that the new template will be compared to Matching Algorithm: Compares new template to the ones in the Data Storage Component Decision Process: Makes system-level decision
8
Advantages: ◦ Easy to Use ◦ Large amount of data to check against ◦ Proven effective in large scale systems Disadvantages: ◦ Privacy perceptions by the public ◦ Requires physical contact
9
Advantages: ◦ Most accurate ◦ No physical contact required Disadvantages: ◦ Most costly
10
Advantages: ◦ Most accurate ◦ No physical contact required Disadvantages: ◦ Most costly ◦ Can be difficult to capture ◦ Lack of existing data to check against
11
Advantages: ◦ No physical contact required ◦ Commonly available sensors (cameras) ◦ Large amount of data to check against Disadvantages: ◦ Face can be easily obstructed ◦ Faces change over time ◦ Frontal pose is usually necessary
12
Advantages: ◦ Easy to capture ◦ Believed to be highly stable pattern Disadvantages: ◦ Not sufficiently distinctive for identification over large databases ◦ System requires a large amount of physical space
13
Advantages: ◦ Most publically accepted ◦ No physical contact required ◦ Commonly available sensors (telephones/microphones) Disadvantages: ◦ Not sufficiently distinctive for identification over large databases
14
Controlling Access to a physical location ◦ Labs / Buildings / etc. Controlling Access to logical information ◦ Computer Accounts / Secure Electronic Docs / etc. Determining if a person is already in a database
15
“US VISIT” program: ◦ Automated entry / exit control system ◦ Currently, inkless fingerprints and digital photos are required
16
Fingerprints are the most commonly spoofed ◦ Fake gummy fingers ◦ Breathing onto sensor ◦ Cutting off someone’s finger How to deal with spoofing?
17
Based on recognition of physiological activities as signs of life Often done by adding additional hardware to a biometrics system
18
Fingerprints: ◦ Hardware addition: Detects temperature Detects pulse ◦ Software Addition: Detects perspiration
19
Face: Head movements Iris: Pupil movement / eye movement Voice: Matching lip movement (video) to the audio
20
Randomizing Verification Data Multiple Biometrics Multi-Factor Authentication
21
Liveness Detection ◦ Palm Scanning Distinctive as fingerprints No physical contact required Hand must be attached in order for live veins to be present
22
Body Odor Detection: ◦ Still in early stages of research Tongue Scanning: ◦ Uses a laser to create a 3D image of a tongue
23
Passive Authentication Convenience ◦ Virtual money ◦ Instant personalization ◦ Touch sensors Apple Patent
24
Thank You
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.