ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
A Seminar Report On Face Recognition Technology
Face Recognition 1.
BIOMETRICS Presented By Sapin.M.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics , Computer & Network Security 1
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel Carlos Reyes Abbas Zaidi Pritesh Patel

Biometrics

What is … Automatic recognition of a person using distinguishing traits Measurable: quantifying traits Robustness: extent to which trait changes over time Distinctiveness: measure of variations among patterns over a population any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual. Biometric technologies may seem exotic, but their use is becoming increasingly common, and in 2001 MIT Technology Review named biometrics as one of the “top ten emerging technologies that will change the world.” Measurable means that the characteristic or trait can be easily presented to a sensor, located by it, and converted into a quantifiable, digital format. This measurability allows for matching to occur in a matter of seconds and makes it an automated process. The robustness of a biometric refers to the extent to which the characteristic or trait is subject to significant changes over time. These changes can occur as a result of age, injury, illness, occupational use, or chemical exposure. A highly robust biometric does not change significantly over time while a less robust biometric will change. Distinctiveness is a measure of the variations or differences in the biometric pattern among the general population. The higher the degree of distinctiveness, the more individual is the identifier. A low degree of distinctiveness indicates a biometric pattern found frequently in the general population. The iris and the retina have higher degrees of distinctiveness than hand or finger geometry.

Biometrics as Authentication… Something you are – Biometric Increasing level of security Increasing convenience Something you know – PIN, password Relating Biometric to authentication. order of least secure and least convenient to most secure and most convenient. Something you have – card, token

Definition (contd.) Identification Verification Who is Who? “one-to-many” search (1:N) Used in identifying criminals Verification Is this Him/Her? “one-to-one” search (1:1) Used for physical or computer access Biometrics are used for human recognition which consists of identification and verification. With identification, the biometric system asks and attempts to answer the question, “Who is Who?” In an identification application, the biometric device reads a sample and compares that sample against every record or template in the database. This type of comparison is called a “one-to-many” search (1:N). Identification applications are common when the goal is to identify criminals and terrorists. Verification occurs when the biometric system asks and attempts to answer the question, “Is this Him?” after the user claims to be X. In a verification application, the biometric system requires input from the user, at which time the user claims his identity via a password, token, or user name. This user input points the system to a template in the database. The system also requires a biometric sample from the user. It then compares the sample to or against the user-defined template. This is called a “one-to-one” search (1:1). The system will either find or fail to find a match between the two. Verification is commonly used for physical or computer access.

Biometric Technologies… Fingerprint Fingerprint pattern read & matched electronically Iris Recognition Measurement of the Iris pattern of the eye Facial Recognition Recording spatial geometry of distinguishing features Speaker/Voice Recognition Voice or speaker recognition uses vocal characteristics for identification FINGERPRINT: The biometric device involves users placing their finger on a platen for the print to be electronically read. The minutiae are then extracted by the vendor’s algorithm, which also makes a fingerprint pattern analysis. IRIS SCAN: Measures the iris pattern in the colored part of the eye. Iris patterns are formed randomly. As a result, the iris patterns in a person’s left and right eyes differ. FACIAL RECOGNITION: records the spatial geometry of distinguishing features of the face. Different vendors use different methods of facial recognition, however, all focus on measures of key features of the face. Because a person’s face can be captured by a camera from some distance away, facial recognition has a clandestine or covert capability. Speaker / Voice Recognition: Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase.

Facial Recognition Based on ability to recognize faces Nodal points 80 nodal points on the face E.g.: Distance between eyes, width of nose, Cheekbones, Chin etc “Face-Print” – code of the face Numerical Code String of numbers Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself, and then measure the various features of each face. If you look in the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. These landmarks are known as nodal points. There are about 80 nodal points on a human face. Distance between eyes Width of nose Depth of eye sockets Cheekbones Jaw line Chin These nodal points are measured to create a numerical code, a string of numbers, that represents the face in a database. This code is called a faceprint. Only 14 to 22 nodal points are needed for a lot of “face recognition software” to complete the recognition process.

Facial Recognition (contd.) Algorithm 1) Capture Image 2) Find Face on the image 3) Extract Features (to generate template) 4) Compare Templates 5) Declare Matches Show Example

Fingerprint Formation of a unique signature Combination of Environmental and Genetic Factors : Position of foetus, density of amniotic fluid, DNA’s impact on each ridge The lowest mis-identification rate after Iris recognition Three main methods of capturing finger print : Thermal Imaging Capacitance Scanner Optical Reader

Thermal Imaging Sensor The sensor uses the heat patterns of the finger to create slices of a person's fingerprint Each slice is then lined up using centering techniques

Capacitance and Optical Capacitance Sensing : The plates act as capacitors Finger acts as third plate Capacitance under ridge higher Capacitance under valley lower Optical Sensing : Uses Charged Coupled Devices (CCD). An Array of photosites which allow a current to flow through when hit by photons. Darker areas are valleys and lighter areas are ridges. Capacitance will be higher under ridge than valley

Analysis of the Prints Typica : Minutiae Placement of ridges and valleys 2) Bifurcations Splitting of lines into two and their recombining

Iris Recognition Background Identifying persons without physical contact Used by the U.S. government, correctional facilities, nuclear utilities, banks, etc. The iris is the externally visible, colorful, donut-shaped organ surrounding the pupil of the eye.

Iris Recognition cont’d…(2) Uniqueness of the Iris The iris is unique because of the morphogenesis of that organ. Stability of the Iris An iris is not normally contaminated with foreign material (eyeglasses or contact lenses.) It is not subject to deleterious effects of aging. The features of the iris remain stable and fixed from about one year of age until death.

Iris Recognition cont’d…(3) Hamming Distance Calculation

Iris Recognition cont’d…(4) Recognition Speed Determined by the speed of the processor and size of the database (normally less than two seconds). Sunglasses and colored contact lenses pose no impediment to recognition. Biggest Advantages Accuracy with an order of magnitude greater than other biometric systems.

Voice Recognition Automated process of identifying a specific individual's voice Sound signal is digitized Result is a simple yes/no decision Deployed in such areas as banking, account access, home PC and network access

Voice Recognition (cont…) Advantages Easy to use and require no special training No need to periodically manage/change passwords Relatively inexpensive compared to other biometrics

Questions?