IQA(Image Quality Assessment) for Fake Biometric Detection

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Biometrics.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
THE FINGERPRINT  The reader acquires the fingerprint image.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Presentation of Master’s thesis Gait analysis: Is it possible to learn to walk like someone else? Øyvind Stang.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Image Information and Visual Quality Hamid Rahim Sheikh and Alan C. Bovik IEEE Transactions on Image Processing, Feb Presented by Xiaoli Wang for.
Biometrics II CUBS, University at Buffalo
Introduction to Image Quality Assessment
Fuzzy Commitment Ari Juels RSA Laboratories DIMACS Workshop on Cryptography: Theory Meets Practice 15 October 2004.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
1 Iris Recognition Iris Recognition is sometimes confused with Retinal Scanning which is the biometric often shown in the movies. These are two completely.
IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Debate Session (III) – Why risk management and vulnerability assessment is important? Dr Ted Dunstone, Chair Technical Panel Biometrics Institute, CEO.
CORE ZOO. INTRODUCTION Will biometric characteristics within a zoo menagerie change with the addition of good and bad quality biometric enrollments?
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
MDDSP Literature Survey Presentation Eric Heinen
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Optical Illusions What the Mind Sees.
Biometric Technologies
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Automated Fingertip Detection
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Introduction to Skin and Face Detection
Introduction Intro Problem Materials Hypothesis Procedure Results
Biometrics.
DONE BY S.MURALIRAJAN M.NIRMAL
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometrics.
Interior Camera - A solution to Driver Monitoring Status
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Face Detection Gender Recognition 1 1 (19) 1 (1)
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

IQA(Image Quality Assessment) for Fake Biometric Detection

Vulnerability of Biometric Systems Security introduction hypothesis method results conclusion more Vulnerability of Biometric Systems Security face recognition fingerprint iris

classification of attack & detection methods introduction hypothesis method results conclusion more classification of attack & detection methods

requirement non-invasive user friendly fast low cost performance introduction hypothesis method results conclusion more requirement non-invasive user friendly fast low cost performance

hypothesis entropy(信息熵) introduction hypothesis method results conclusion more hypothesis It is expected that a fake image captured in an attack attempt will have different quality than a real sample acquired in the normal operation scenario for which the sensor was designed. degree of sharpness color and luminance level entropy(信息熵) structural distortion

none of current detection methods is general introduction hypothesis method results conclusion more current problems none of current detection methods is general example: ridge and valley frequency amount of occlusion of eye gummy fingers made out of silicone & gelatin objection providing the method with multi-attack protection capability

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction Main Page hypothesis Topic 1 method Topic 2 results Topic 3 conclusion Topic 4 more Topic 5

introduction hypothesis method results conclusion more

Edge_Based:Sobel operator introduction hypothesis method results conclusion more Edge_Based:Sobel operator

SSIM(Structural Similarity Index Measure) introduction hypothesis method results conclusion more SSIM(Structural Similarity Index Measure) contrast or brghtness changes (nonstructural disortions)

VIF:Visual Information Fidelity introduction hypothesis method results conclusion more VIF:Visual Information Fidelity HVS: human visual system distortion change

JPEG Quality Index introduction hypothesis method results conclusion more JPEG Quality Index

Experiments and Results introduction hypothesis method results conclusion more Experiments and Results FGR:False Genuine Rate FFR:False Fake Rate HTER:HTER=(FGR+FFR)/2 AV TIME i.spoofing attack ii.synthetic sample attack iii.other methods 1.iris 2.fingerprint 3.2-D face

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

conclusion 1.validate the "quality difference" hypothesis introduction hypothesis method results conclusion more conclusion 1.validate the "quality difference" hypothesis 2.show high potential of IQA for secruing biometric systems 3.proposal and validation of a new biometric protectiong method

introduction hypothesis method results conclusion more