Introduction: What we know and don’t know about biometrics.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Office of Science and Technology NCITS Technical Committee M1 Biometrics Standards Chris Miles Senior Program Manager Crime Prevention.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Libraries have begun to see the value of biometrics M. G
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Presentation transcript:

Introduction: What we know and don’t know about biometrics

Lecture Outline 1.Biometrics – Reality and Myths 2.Biometrics in Real Life 3.Basic Biometric Definitions

Hollywood Face Recognition Common misconceptions – 100% match to any image at any angle – Instantly recognize any person – Tied into a “super database” that knows who everyone is –Available to and in use by law enforcement Movie scene (Pubic domain)

Hollywood DNA Misconceptions – Access to a super database that has everyone’s DNA –Automatically and rapidly processes a sample Movie scene (Pubic domain)

Hollywood Fingerprints Screenshot from “Man in black” movie (Pubic domain)

Hollywood – information theft Parody on “Mission Impossible” scene (anonymous)

Face Recognition Today Today’s Reality –Affected by lighting, angle, quality of captured image –Requires a “high-end” computer for real-time face capture/processing –Many are stand-alone systems –Being evaluated, not deployed Ft. Lauderdale Airport, Florida

Face Recognition Today Today’s Reality –Varying confidence of match depending on application –Multiple unique and proprietary image formats make sharing hard –Intelligence images not available to local law enforcement or corrections –Data sharing across jurisdictions is a problem 100 known images in the database

Face Recognition Today Face Recognition Vendor Test 2002 and 2006 provides independent government evaluations of commercially available and mature prototype face recognition systems. Results available at ace/face.html FRVT 2002 and 2006 evaluated performance on: High resolution still imagery (5 to 6 mega-pixels) 3D facial scans Multi-sample still facial imagery Pre-processing algorithms that compensate for pose and illumination

FpVTE Fingerprint Vendor Technology Evaluation The Fingerprint Vendor Technology Evaluation (FpVTE) 2003 is an independently administered technology evaluation of fingerprint matching, identification, and verification systems. Assessed the capability of 18 vendors fingerprint systems to meet requirements for large-scale and small-scale real applications. Consists of multiple tests performed with combinations of fingers and different types and qualities of operational fingerprints Conducted by the National Institute of Standards & Technology (NIST) between October and November 2003 on behalf of U.S. Department of Justice. Report made public in June 2004 at

FpVTE Fingerprint Vendor Technology Evaluation Some of the Results Systems that performed most accurately were developed by NEC, SAGEM, and Cogent The most accurate systems are highly accurate. Given a false accept rate of 0.01% the results for NEC Large Scale Test system showed a false rejection rate of 0.4% The variables that had the largest effect on system accuracy were the number of fingers used and fingerprint quality. Different systems were distinguished by how they performed across the spectrum from good to bad (performance separation was really on “bad” quality).

Applications: Biometrics in Schools Eleven, Single-Eye LG Electronics IrisAccess 2200 Iris Recognition Cameras were Evaluated – 6 cameras within closed areas in 3 schools – 5 cameras were located outdoors with fabricated protective closures Unsuccessful attempts mostly due to camera capture errors (16%) and access attempts by unknown users (5.8%) Issues remaining include: –Tailgating (accepted users holding door open for others) – Ability to Capture Iris Outdoors (lighting) National News Reports Interior System exterior System

Applications: Biometrics in Correction Facilities Demonstration and Assessment of Facial Recognition Technology at Prince George’s County Correctional Facility Visionics (now Identix) system installed based on results of FRVT 2000 Required re-work of room lighting, addition of camera lights, and training of staff and system users. Interfaced with Staff and Volunteer Access Control System to verify identity of staff and volunteers upon entry and exit from the facility Augments manned access control station

When you walk into a building from a parking lot? When you shop at your favorite store? Go to your bank? Applications: Video surveillance

When you buy gas for your car? Pay at a toll booth? Video surveillance is a daily fact of life. Current motivation is mostly to avoid theft in commerce. Applications: Video surveillance

The ideal surveillance technology would be –non-contact –at a distance –non-cooperative also fast, cheap, and highly accurate. Face recognition has appeal because –it is non-contact –works at a “distance” –seems to not require cooperation –is potentially fast and cheap –claims high accuracy in research. Applications: Video surveillance

Biometric Technology Biometric Technology is concerned with representation, storage, matching, synthesis and visualization of biometric information. Tremendous advance has been achieved over the last few years in both fundamental theoretical development, matching and synthesis, as well as biometric hardware and software products.

Individual matchers Course discusses traditional and emerging technologies for fingerprint matching, face reconstruction, emotion animation, iris synthesis, voice recognition, signature and ear matching, and biometric fusion.

Identification People are identified by three basic means: ––Something they have (identity document or token) ––Something they know (password, PIN) ––Something they are (human body, character)

Traditional identification Traditional means of automatic identification: ––Possession-based(credit card, smart card) Use “something that you have” ––Knowledge-based (password, PIN) Use “something that you know” ––Biometrics-based (biometric identifier) Use something that relies on “what you are”

Problems with traditional biometrics Tokens may be lost, stolen or forgotten Passwords or PINs may be forgotten or guessed by the imposters ––25% of people seem to write their PIN on their ATM card Estimates of annual identity fraud damages: ––$1 billion in credit card transactions ––$1 billion in fraudulent cellular phone use ––$3 billion in ATM withdrawals The traditional approaches are unable to differentiate between an authorized person and an impostor (person pretending to be somebody he/she is not)

What is biometrics Biometrics–science, which deals with the automated recognition of individuals based on biological and behavioral characteristics ––Scientific follow-on to Bertillon’s body measurements of the late 1800s Biometry–mathematical and statistical aspects of biology Biometric system–essentially an automatic pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric) possessed by that person

Verification Verification –recognizes a person by comparing the captured biometric characteristic with person’s biometric template (model) pre-stored in the system for THIS PERSON “Am I who I claim to be?” One to one match

Identification Identification –recognizes a person by searching the entire template database for a match “Who am I?” One to many matches

Uses of biometrics Physical access control (airport, office). Logical access control (bank account). Ensuring uniqueness of individuals (preventing double enrollment in some application, i.e. a social benefits program).

References and Links University of Calgary BT Lab web site Course text books Signal Processing Institute, Swiss Federal Institute of Technology web site Biometric Systems Lab, University of Bologna