Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, Ronald C. Tantiado Computer Engineer.

Similar presentations


Presentation on theme: "INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, Ronald C. Tantiado Computer Engineer."— Presentation transcript:

1 INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, 2019 1200-1330 Ronald C. Tantiado Computer Engineer

2 OUTLINE 1. The Basics 2. Biometric Technologies 3. Multi-model Biometrics 4. Biometric Applications 5. Constraints 6. Research

3 SECTION I: THE BASICS Why Biometric Authentication? Frauds in industry Identification vs. Authentication

4 WHAT IS BIOMETRICS? The automated use behavioral and physiological characteristics to determine or veiry an identity. Know HaveBe Rapid!

5 FRAUDS IN INDUSTRY HAPPENS IN THE FOLLOWING SITUATIONS: Safety deposit boxes and vaults Bank transaction like ATM withdrawals Access to computers and emails Credit Card purchase Purchase of house, car, clothes or jewellery Getting official documents like birth certificates or passports Obtaining court papers Drivers licence Getting into confidential workplace writing Checks

6 WHY BIOMETRIC APPLICATION? To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties To prevent fraudulent acts like faking ID badges or licenses. To ensure safety and security, thus decrease crime rates

7 IDENTIFICATION VS. AUTHENTICATION IdentificationAuthentication It determines the identity of the person. It determines whether the person is indeed who he claims to be. No identity claim Many-to-one mapping. Cost of computation  number of record of users. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users. Captured biometric signatures come from a set of known biometric feature stored in the system. Captured biometric signatures may be unknown to the system.

8 SECTION II: BIOMETRIC TECHNOLOGIES Several Biometric Technologies Desired Properties of Biometrics Comparisons

9 TYPES OF BIOMETRICS Fingerprint Face Recognition  Session III Hand Geometry Iris Scan Voice Scan  Session II Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA

10 FINGER PRINT RECOGNITION Minutiae Pattern Matching Problems: sometimes unusable

11 VASCULAR PATTERN MATCHING LED infrared light Fingers and back of hand Not completely viable

12 IRIS RECOGNITION Uses infrared light Converts Images to vectors Needs further development

13 FACIAL RECOGNITION Location and position of facial features Dependent on background and lighting conditions

14 VOICE VERIFICATION Factors: pitch, intensity, quality and duration Text dependent Text independent Problems: include background noise

15 HAND GEOMETRY Scan both sides of hand Primarily used for verification Not as accurate as other methods

16 DYNAMIC SIGNATURE Factors: velocity, acceleration and speed Mainly used for verification Problems: forgers could reproduce

17 RETINA RECOGNITION One of the most secure means of biometrics Unique to each person Unique to each eye Problems: require effort on the part of subjects

18 OTHER TYPES Keystroke Gait DNA Odor

19 DESIRED PROPERTIES Universality Uniqueness Permanence Collectability Performance User’s Accpetability Robustness against Circumvention

20 COMPARISON Biometric TypeAccuracyEase of UseUser Acceptance FingerprintHighMediumLow Hand GeometryMediumHighMedium VoiceMediumHigh RetinaHighLow IrisMedium SignatureMedium High FaceLowHigh

21 SECTION III: A MULTI-MODEL BIOMETRICS Multi-modal Biometrics Pattern Recognition Concept A Prototype

22 MULTIMODAL BIOMETRICS

23 PATTERN RECOGNITION CONCEPT SensorsExtractors Image- and signal- pro. algo. Classifiers Biometrics Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc Data Rep. 1D (wav), 2D (bmp, tiff, png) Feature Vectors Negotiator Scores Decision: Match, Non-match, Inconclusive EnrolmentTraining Submission Threshold

24 AN EXAMPLE: A MULTI-MODEL SYSTEM SensorsExtractorsClassifiersNegotiator Accept/ Reject 1D (wav) 2D (bmp) ID Face Extractor Voice Extractor Face Feature Voice Feature Face MLP Voice MLP AND Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool

25 Basic Operators 3D2D1D Data Representation Ex-qVoice ExFace Ex Extractors Cl-qVoice MLPFace MLP Learning-based Classifiers … … Signal Processing, Image Procesing Different Kernels (static or dynamic) NN, SVM, Negotiation Logical AND Diff. Combination Strategies. e.g. Boosting, Bayesian {LPC, FFT, Wavelets, data processing} {Fitlers, Histogram Equalisation, Clustering, Convolution, Moments} Biometrics Voice, signature acoustics Face, Fingerprint, Iris, Hand Geometry, etc. Face ABSTRACTION

26 cWaveProcessing fWaveProcessing cWaveOperator cWaveStackcFFTcFFiltercWaveletcLPCcDataProcessing cWaveObject 1 1111 Output data Input data Operators Operants 1 1 1 1 * cPeripherique Audio 1 AN EXTRACTOR EXAMPLE: WAVE PROCESSING CLASS

27 LSIIT, CNRS-ULP, Groupe de Recherche en Intelligence Artificielle Pour plus de renseignements : Pr J. Korczak, Mr N. Poh @dpt-info.u-strasbg.fr Identité Accepter, Rejeter w1 w2 Effacer les silences Transformation de l’ondelette C 0 C 1 C 2 C 3 C 4 C 5 C 6 C 7 C 9 C 10 C 11 C 12 C 13 C 14 C 15 Fréquence Temps Normalisation + Codage Réseau des neurones Apprentissage et Reconnaissance Détection des yeux Trouver X Trouver Y Filtre de base Inondation + Convolution Extraction Normalisation + Codage Moment Vert Bleu Hue Saturation Intensité Réseau des neurones Apprentissage et Reconnaissance Visage Voix Base des données Décision SYSTEM ARCHITECTURE IN DETAILS

28 SECTION V: APPLICATIONS Authentication Applications Identification Applications Application by Technologies Commercial Products

29 COMMERCIAL APPLICATIONS Computer login Electronic Payment ATMs Record Protection

30 GOVERNMENT APPLICATIONS Passport control Border control Access Control

31 FORENSIC APPLICATIONS Missing Persons Corpse identification Criminal investigations

32 APPLICATION BY TECHNOLOGIES Biometrics Vendors Market Share Applications Fingerprint9034%Law enforcement; civil government; enterprise security; medical and financial transactions Hand Geometry-26%Time and attendance systems, physical access Face Recognition1215%Transaction authentication; picture ID duplication prevention; surveillance Voice Authentication 3211%Security, V-commerce Iris Recognition19%Banking, access control

33 TYPE OF AUTHENTICATION Authentication 1:1 Verification 1:N

34 CONSTRAINTS ON BIOMETRICS Typical “Constrained” Image Constraints: Lighting Distance Pose Expression Time Lapse Occlusion

35 CONSTRAINTS ON BIOMETRICS “Unconstrained” Image

36 BIOMETRICS RESEARCH Aging Research

37 BIOMETRICS RESEARCH Demographics Older vs. Younger Males vs. Females Geographic origin of algorithms

38 BIOMETRICS RESEARCH Periocular Region Recognition Texture, color, eye shape Overcome facial occlusion

39 BIOMETRICS RESEARCH Ear Recognition Not affected by aging or expression Covert collection of images Little research performed

40 CONCLUSION Questions?

41 Thank You…


Download ppt "INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, Ronald C. Tantiado Computer Engineer."

Similar presentations


Ads by Google