A review of biometric technology along with trends and prospects

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Multimodal Biometric Security 1.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
Multimodal Biometric Security
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

A review of biometric technology along with trends and prospects J.A.Unar, Woo Chaw Seng, Almas Abbasi Adviser:Frank. Yeong-Sung Lin Present by Limin Zheng

Agenda Introduction Biometric systems Biometric modalities Multi-modal biometrics Biometrics prospects Conclusion

Introdution

Introdution The ever increasing criminal and terrorist acts in public places, government/private properties resulted in chaotic scenarios thereby making the existing surveillance systems questionable – “How effective is the surveillance system to prevent unlawful activities?” “Does the system guarantee the required level of security?” “Does the system distinguish an unauthorized user from an impostor reliably?” “Is the system user friendly?”.

Introdution In early stages, the identity manage- ment systems relied on cryptographic methods requiring the users to remember a secret text (password) or keep something with them (token, card) or a combination of both to prove their identity. Access control, computer logins, e-mail checking, making bank transactions, border control, welfare disbursements etc. However, the users challenged the efficacy of such systems.

Introdution As an answer, the research community proposed the idea of human identification based on physiological or behavioral attributes of individuals very often termed as “Biometrics”. Although biometrics is not the perfect solution but it offers several advantages over knowledge and possession based approaches in the way that there is no need to remember anything, biometric attributes can not be lost, transferred or stolen, offer better security due to fact that these attributes are very difficult to forge and require the presence of genuine user while granting access to particular resources.

Introdution Any physiological or behavioral attribute can qualify for being a biometric trait unless it satisfies the criteria such as Universality Distinctiveness Invariance Collectability Performance Acceptability Circumvention

Introdution The paper provides details about each biometric modality along with prominent recognition techniques and public data sets available to the researchers. The article contains a rough quantitative analysis of individual techniques in terms of accuracy. The paper discusses multi-modal biometrics in detail which has not been well covered in other review articles on the subject. The paper contains current market statistics along with future prospects for biometric based identification and authentication.

Biometric systems

Biometric systems A biometric system is a pattern recognition system which matches the salient or discriminatory features of acquired image (probe image) with the features of pre-stored images (gallery image). For doing so, every biometric system comprises of Image acquisition module Feature extraction module Matcher module Database module

Biometric systems 2.1. Modes of operation 2.1.1.Verification (positive recognition) The user after submitting the biometric signature to the system claims a parti- cular identity through a PIN, login name, etc. Recognition system validates or voids user's claim by making a 1:1 (one-to-one) comparison between the submitted biometric signa- ture and enrolled biometric signature associated with that parti- cular identity.

Biometric systems 2.1. Modes of operation 2.1.2.Identification (negative recognition) Recognition system tries to recognize the user by comparing the submitted biometric signature to all the enrolled signatures in the database by making 1:N (one-to-many) comparisons without specific identity claim from the user.

Biometric systems 2.1. Modes of operation 2.1.3. Screening This is an extension to identification where the biometric system assures that a particular individual does not belong to a watch list of identities by performing 1:N (one-to-many) comparisons throughout the database.

Biometric systems 2.1. Modes of operation Application Verification Computer logins, ATMs, e-commerce, access control and user authentication on mobile devices [2]. Identification Issuance of ID cards, passports, riving licenses, border crossing and welfare disbursements [1,2]. Screening Airport security, surveillance activities, public place and public events security etc. [4]

Biometric systems 2.2. Performance measurements The performance or accuracy of a biometric system is data dependent usually influenced by environmental and performance factors. Environmental Factors: Temperature, humidity and illumination conditions Performance Factors: Capturing good quality images, composition of target user population, time interval between the enrollment and verification phases and robustness of recognition algorithms [2].

Biometric systems 2.2. Performance measurements 2.2.1. Sample acquisition errors Environmental conditions surrounding the system give rise to acquisition errors. Failure to enroll error Failure to capture error

Biometric systems 2.2. Performance measurements 2.2.2. Performance errors These errors are used to measure the accuracy of biometric systems in real environment. A brief description is given below: False match rate (FMR) or false accept rate (FAR) Falsenon – match rate(FNMR)orfalserejectrate(FRR) Equal error rate (EER)

Biometric modalities

Thissectionprovidesanin-depthoverviewofdifferentbiometric modalitiesaspertheclassificationprovidedin Fig. 1 above.

Biometric modalities 3.1. Hand region modalities Fingerprints(BEST) Palmprint Hand geometry Finger knuckle print Finger nail bed Hand vein pattern

Biometric modalities 3.1. Hand region modalities

Biometric modalities 3.1. Hand region modalities Image acquisition methods: Optical Thermal Silicon Ultrasonic imaging Exceptions: Hand geometry → use a camera to acquire 3D image Hand vein → beneath the skin thereby exposing hand to near infrared light

Biometric modalities 3.1. Hand region modalities Advantage: low cost imaging sensors small template size Disadvantage: artificial gummy fingers → Recent trend : vein technology

Biometric modalities 3.2. Facial region modalities Face Ear shape Teeth Tongue print

Biometric modalities 3.2. Facial region modalities 3D:However, due to the challenges stated above as well as medium level of distinctiveness, facial recognition systems are very much prone to recognition errors. The potential advantages associated with tongue print include protection from external environment and its squirm which proves the liveliness of the subject. The conformity of tongue print as biometric attribute requires large scale studies. 牙齒部分主要用在法醫界~ 作者認為超出範圍,故不進一步探討

Biometric modalities 3.2. Facial region modalities Image acquisition methods: 2D 3D Facial thermograph localization and segmentation

Biometric modalities 3.2. Facial region modalities Advantage: The most nature non-intrusive contactless Disadvantage: cosmetics plastic surgery person's face may change or be changed over time expensive imaging hardware illumination conditions, pose variations , ageing conditions poor recognition accuracy higher public acceptance

Biometric modalities 3.3. Ocular region modalities Iris Retina Sclera possesses most accurate,highly reliable,well protected,stable and almost impossible to forge biometric signatures,

Biometric modalities 3.3. Ocular region modalities

Biometric modalities 3.3. Ocular region modalities Image acquisition methods: infra-red light(retina, sclera ) illuminating human eye with near infra-red light or in visible wavelength light(iris) position and bifurcations of blood vessels measuring the area of reference (fovea, optic disk) (Sclera)Consequently, the conformity requires large scale studies. IRIS相較非侵入 獲勝!!! retinal scan systems 只用在軍事目的

Biometric modalities 3.3. Ocular region modalities Advantage: Highly accurate (higher uniqueness) Highly reliable Well protected Stable Almost impossible to forge Disadvantage: synthetic iris images (need iris codes ) intrusive (retina)

Biometric modalities 3.4. Medico-chemical biometrics Body odor → not realized yet Deoxyribonucleic Acid(DNA) Heart sound Electrocardiogram (ECG) (body odor) albeit some commercial products are already available in the market known as e-noses which can recognize the particular odor such as gases and vapors

Biometric modalities 3.4. Medico-chemical biometrics Image acquisition methods: Specialized medical/chemical sensors Samples from blood, hair, ear wax, dental floss and finger nail clippings(DNA) Different organic compounds(body odor)

Biometric modalities 3.4. Medico-chemical biometrics Advantage: The Most accurate (DNA) Disadvantage: Intrusive Privacy issues Physical contact with sensors Requirement of skilled operators Full cooperation from the subjects Dependence over human medical and emotional states these of the restrictions towards large scale deployment of such systems.

Biometric modalities 3.5. Behavioral biometrics Keystroke Dynamics Voice Signature Gait based on the analysis of the way humans do the things.

Biometric modalities 3.5. Behavioral biometrics Voice fixed vocabulary constraints (Gait) Recently, user authenti- cation based on gait analysis has been applied on mobile devices which in turn produced another research arena in gait biometrics. (Gait)用在手機上,手機必須有加速度計 這些方法已經開發許久,作者認為其也有不錯的準確度 但有人認為 這些作法無法提供充足的獨特性,因為人的習慣及健康狀態與飲食習慣還有老化程度都會影響行為。 還有像是背景噪音之類的。肌肉受損也會簽的跟原先不同。此外,步態因為是動態的,也有著很高的誤判綠。 無庸置疑的是,人類的行為模式相較之下容易模仿,有些更是十分專業。 因此也只能用來做認證用而已

Biometric modalities 3.5. Behavioral biometrics Acquisition methods: Video Sound Recording Electronic whiteboard

Biometric modalities 3.5. Behavioral biometrics Advantage: Easily for acquisition Disadvantage: Dynamics Mimicking

Biometric modalities 3.6. Soft biometrics Gender Ethnicity Height Weight Skin color Eye color Hair color SMT(scars, marks and tattoos) 雖然這些Soft的生物辨識特徵,無法提供有效率的鑑別去完成辨識任務。 但它們可以用於分類,能縮減辨識所花的時間。 紋身辨識在法醫領域也一度很夯,許多非法組織會紋身。也很多人用紋身來表明自己的信仰。 所以紋身的資料庫其實也有機構在蒐集。 一個非常典型的例子就是,辨別911恐怖攻擊與南亞大海嘯的受害者。 因為刺青是很深的烙印,有時就算皮膚被烤焦也無法使其完全消失。 作者也有做過紋身辨識系統,但依照先前說的生物辨識要素李,紋身並不符合普遍性。 此外,很多研究申稱結合Soft biometric能提高Hard biometric的準確度

Biometric modalities 3.7. Application perspectives The recentyearswitnessedmassdeploymentofbiometric technologiesforreliablehumanidentification inpublicaswell as privatesector.Nevertheless,theapplicationenvironmentsfor each technologyaresummarizedinthefollowingtable Table6. A closerlookrevealsthatmostofthetechniquesinorderto establish theidentityrequireclosecontactofthesubjectwiththe imaging sensor.However,facerecognitionandrecognitionbased on gaithasthepotentialtoidentifyhumansatadistance.Asa result,facerecognitionandgaitrecognitionsuitsmorethevideo surveillanceactivitiessuchassuspectidentification atairportsas wellascrowdmonitoringandhumanactivityrecognitionatpublic places whichisnotpossiblewithotherbiometrictechniquessuch as fingerprint,irisrecognitionwhichrequirededicatedarrange- ments forimagingaswellassufficient usercooperation.

Multi-modal biometrics

Multi-modal biometrics Instead of the tremendous advances in biometric technology, the recognition systems based on the measurement of single modality can not guarantee 100% accuracy. This is due to influence of several factors. Noisy data Intra-class variations Distinctiveness Non-universality Spoof attacks mono-modal VS Multi-modal

Multi-modal biometrics 4.1. Sources of information According to the nature of information sources, a multi-modal biometric system can be classified into following categories: [23,275,276] 4.1.1. Multi-sensor systems 4.1.2. Multi-algorithm systems 4.1.3. Multi-instance systems 4.1.4. Multi-sample systems 4.1.5. Multi-modal systems mono-modal VS Multi-modal

Multi-modal biometrics 4.2. Modes of operations A multi-modal biometric system functions in two modes: Serial/cascaded mode Parallel mode mono-modal VS Multi-modal

Multi-modal biometrics 4.3. Fusion levels The multiple biometric evidences acquired from different sources can be combined together at different levels: Sensor level Feature level Matching score level Decision level mono-modal VS Multi-modal

Multi-modal biometrics 4.3. Fusion levels mono-modal VS Multi-modal

Multi-modal biometrics 4.3. Fusion levels mono-modal VS Multi-modal

Multi-modal biometrics 4.3. Fusion levels mono-modal VS Multi-modal

Biometrics prospects

Biometrics prospects The increasing interest from the government and private stakeholders to adopt biometric based identity management systems prove the efficacy of such systems over the knowledge and possession based systems.

Biometrics prospects

Biometrics prospects

Biometrics prospects

Conclusion

Conclusion Reliable Identification is a crucial requirement in a wide variety of systems & different scenarios. Traditional cryptographic methods do not offer practical identification capabilities. As an alternative, reliable identification, very often referred as “biometrics” provide better solutions to high security demands of the present day. A wide variety of biometric characteristics have been discovered and tested in recent decades.

Conclusion In this paper, we provided an overview of the existing biometric technologies along with their composition, classification and performance evaluation indicators. This paper also provides an in- depth overview followed by detailed discussion over different biometric attributes along with their potential advantages and challenges. In terms of multiple attributes, careful selection is the key point to success since selecting the modalities belonging to one region may not be a good choice

Conclusion Furthermore, we also stress the importance of reliable template protection strategies since the development of artificial gummy fingers and synthetic irises may lead to questions regarding the reliability of the most secure biometric signatures so far.

Conclusion Despite the challenges, the market trend presented in the paper portrays a keen interest in biometric solutions to a number of identity management tasks. The large deployment of such systems in private as well as the stringent security environments is evident from the exemplary evidences produced here. Conclusively, the increasing trend of interest from government and private stake- holders promises a bright future to the science of biometrics.

Thank you for Listening