Www.bioenabletech.com Multimodal Biometric Security 1.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
1 Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems Web Computing Laboratory Computer Science and Information Engineering Department.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Biometrics.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
® Norman Poh Hoon Thian What is Biometric Authentication? A process of verifying an identity claim using a person’s behavioral and physiological characteristics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Mulitmodal Biometric Systems Munir Bandukwala Rajesh Subramanian.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Presented by Tienwei Tsai July, 2005
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
BIOMETRICS THE MAN MACHINE INTERFACE
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Challenge/Response Authentication
Improving the Performance of Fingerprint Classification
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Fusing Binary Templates for Multi-biometric Cryptosystems
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Multimodal Biometric Security 1

Introduction  An application of modern statistical methods to the measurements of biological objects 2  Identification of an individual on the basis of “Who you are?” rather than  “What do you know?” Knowledge-based security, e.g. a password, a PIN..  “What do you have?” Token-based security, e.g. passport, driver’s license, ID card.. Know Have Be

Introduction 3 Test Working of a biometric system

An example of multibiometric system 4 SensorsExtractors Image- and signal- pro. algo. Classifiers Biometrics Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc Data Rep. 1D (wav), 2D (bmp, tiff, png) Feature Vectors Negotiator Scores EnrolmentTraining Submission Threshold Introduction

 Increase security  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!  Replace hard-to-remember passwords  Prevent unauthorized use of lost, stolen or "borrowed" ID cards 5 Need for Multimodal Biometrics  Noise in sensed data results in a significant reduction in accuracy  For voice and signature, circumvention by spoofed attacks Introduction Limitations

 The use of signature verification is a time-consuming process for the user in real time situations  User-involvement at image acquisition stage reduces the time efficiency of the identification process and causes delay  Mostly PCA and LDA based global features are used for feature extraction and superiority of LDA over PCA has been affirmed many times so far, therefore a newer approach for feature extraction is required that can outperform the existing methods e.g. Discrete Cosine Transform (DCT) because of its energy compaction property 6 Problem Statement

 Moreover, security concerns have been increased because of the following drawbacks of unimodal biometric systems:  Noise in sensed data results in a significant reduction in accuracy  Non-universality leads to Failure To Enroll error (FTE)  Lack of Individuality or Uniqueness increases False Accept Rate (FAR)  Openness to circumvention by spoofed attacks commonly for voice and signature 7 Problem Statement

 A multibiometric system can be used based on feature Level fusion and feature vector optimization through genetic algorithm.  Multibiometric system can be implemented so that it can reduce error rate caused by unibiometric systems, e.g., 8 Solution Non-Universality If a person cannot be enrolled in a finger print system due to worn-out ridge details, he can still be identified using other biometric traits like face or iris Noisy data If the biometric sample obtained from one of the sources is not of sufficient quality during a particular acquisition, the samples from other sources may still provide sufficient discriminatory information to enable reliable decision-making.

 Discrete Cosine Transform (DCT) can be employed along with the old techniques of feature extraction like PCA and LDA  DCT has been selected as it offers many benefits:  Provides good compromise between energy packing ability and computational complexity  The energy packing property of DCT is superior to that of any other unitary transform  Transforms that redistribute or pack the most information into the fewest coefficients  Provides the best sub-image approximations and, consequently, the smallest reconstruction errors 9 Solution

 A multimodal biometric system can be introduced that reduces user involvement at the image acquisition stage  Discrete Cosine Transform (DCT) can be employed along with the old techniques of feature extraction like PCA and LDA  Normalization of feature vector can be performed using z-score  Normalized feature vectors can be fused to form multibiometric system, fusion being done by product, sum and min rules  Genetic Algorithm (GA) can be used for feature vector optimization after feature level fusion  Selected features can then be incorporated into a Bayesian Classifier for calculating the accuracy of the proposed system 10 Solution

11 Feature level Fusion Optimization using Genetic Algorithm Bayesian Classifier Proposed Solution Feature Vector Normalization Face, Iris, and Ear Features Face image Face PreprocessingEar PreprocessingIris Preprocessing Face, Iris, and Ear Features DCT System LDA System PCA System Iris image Ear image Feature Vector Normalization

 In the field of Multibiometrics, there is still a lot of work requied to reduce the effects of noisy data and to increase template security  The work presented in this thesis can be extended:  By implementing different variation of PCA and LDA like Multilinear PCA, kernel PCA, Independent Discriminant Analysis, etc  By using the energy compaction property of DCT on a feature extraction method of LDA, and PCA. In this way the feature vector of LDA and PCA systems would be optimized by DCT  By employing various fusion techniques in parallel and concatenating the resultant vectors.  The different levels of fusion can be evaluated for making a comparison on the multibiometric system 12 Future Work

13 Thank you