CUBS, University at Buffalo

Slides:



Advertisements
Similar presentations
Speaker Recognition Sharat.S.Chikkerur Center for Unified Biometrics and Sensors
Advertisements

Biometrics.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics and Sensors
Indexing and Binning Large Databases
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Venu Govindaraju University at Buffalo
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Sharat.S.Chikkerur S.Anand Mantravadi Rajeev.K.Srinivasan
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

CUBS, University at Buffalo Biometrics CUBS, University at Buffalo http://www.cubs.buffalo.edu http://www.cedar.buffalo.edu/~govind/CSE717 govind@buffalo.edu

Conventional Security Measures Possession or Token Based Passport, IDs, Keys License ,Smart cards,Swipe cards, Credit Cards Knowledge Based Username/password PIN Combination(P,K) ATM Disadvantages of Conventional Measures Do not authenticate the user Tokens can be lost or misused Passwords can be forgotten Multiple tokens and passwords difficult to manage Repudiation Conventional security systems rely on PINs, passwords and other token or key based methods for authentication and identification of users. Though these systems are easy to use, they are insecure as the tokens can be lost, stolen or used by more than one person. With each service requiring different form and means of identification, the multiplicity of authentication schemes becomes difficult to manage.  

Biometrics Definition Examples Physical Biometrics Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits Examples Physical Biometrics Fingerprint, Hand Geometry,Iris,Face Measurement Biometric Dependent on environment/interaction Behavioral Biometrics Handwriting, Signature, Speech, Gait Performance/Temporal biometric Dependent on state of mind Chemical Biometrics DNA, blood-glucose Biometrics offers a promising solution for reliable and uniform identification and verification of an individual. Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Physical biometrics rely on physiological features such as fingerprints, hand geometry, iris pattern, facial features etc. for identity verification. Behavioral biometrics depends upon behavioral features such as speech patterns, handwriting, signature, walking gait etc. for authentication. These traits are unique to an individual and hence cannot be misused, lost or stolen. Biometrics are based on established scientific principles as a basis for authentication.

Requirements of Biometrics Universality Each person should have the biometric Uniqueness Any two persons should have distinctive characteristics Permanence Characteristic should be invariant over time Collectability Characteristic should be easy to acquire Acceptability Is non-intrusive Non repudiation User cannot deny having accessed the system

General Biometric System Sensor Feature Extraction Database Enrollment ID : 8809 Biometric Sensor Feature Extraction Matching Authentication Result

Types of Authentication Verification Answers the question “Am I whom I claim to be?” Identity of the user is known 1:1 matching Identification Answers the question “Who am I?” Identity of the user is not known 1:N matching Positive Recognition Determines if an individual is in the database Prevents multiple users from assuming same identity Negative Recognition Determines if an individual is NOT in the given database Prevents single user from assuming multiple indentities

Aspects of a Biometric Systems Sensor and devices Types of sensors Electrical and mechanical design Feature representation and matching Enhancement, preprocessing Developing invariant representations Developing matching algorithms Evaluation Testing System Issues Large Scale databases Securing Biometric Systems Ethical, Legal and Privacy Issues

Applications And Scope of Biometrics Technologies Horizontal Applications Key Vertical Markets Fingerprint Civil ID Government Sector Facial Recognition Surveillance and Screening Travel and Transportation Iris Scan PC / Network Access Financial Sector Middleware Retail / ATM / Point of Sale Health Care AFIS Criminal ID Law Enforcement Voice Scan eCommerce / Telephony   Hand Geometry Physical Access / Time and Attendance Signature Verification Keystroke Dynamics

Biometric Modalities Common modalities Iris Fingerprint Face Voice Verification Hand Geometry Signature Other modalities Retinal Scan Odor Gait Keystroke dynamics Ear recognition Lip movement The corrugated surface of the fingerprint is made up of ridges and valleys cover that the entire palmer surface of the hand. The flow pattern of these ridges and valleys are unique to each individual. These patterns that are used for identification and authentication. The image below shows the image of a fingerprint along with the distinguishing features on the print.   The flow of the ridges and patterns has been classified into 5 broad classes. This classification is used to catalog the fingerprints and also in authenticating two prints. Henry systems follow an elaborate classification scheme of cataloging and filing forensic prints. Fig1 shows the different classes of ridge flows. This methods cannot be used to distinguish between two fingerprints. Fig 2 shows the distinguishing features on the fingerprint. These features are discontinuities or anomalies in the normal flow of ridges on the surface of the finger. These features are termed as minutiae (small details). There are eighteen different types of minutiae. Fig1 shows the most commonly encountered ones and their names. Fig 2 shows a thumbprint captured on paper. These are typically the kind of images that forensic AFIS (Automatic Fingerprint Identification Systems) have to deal with. The quality of the print not only deteriorates during capture but also during storage and hence AFIS systems are more sophisticated than their biometric counterparts.

Fingerprint Verification Fingerprints can be classified based on the ridge flow pattern The corrugated surface of the fingerprint is made up of ridges and valleys cover that the entire palmer surface of the hand. The flow pattern of these ridges and valleys are unique to each individual. These patterns that are used for identification and authentication. The image below shows the image of a fingerprint along with the distinguishing features on the print.   The flow of the ridges and patterns has been classified into 5 broad classes. This classification is used to catalog the fingerprints and also in authenticating two prints. Henry systems follow an elaborate classification scheme of cataloging and filing forensic prints. Fig1 shows the different classes of ridge flows. This methods cannot be used to distinguish between two fingerprints. Fig 2 shows the distinguishing features on the fingerprint. These features are discontinuities or anomalies in the normal flow of ridges on the surface of the finger. These features are termed as minutiae (small details). There are eighteen different types of minutiae. Fig1 shows the most commonly encountered ones and their names. Fig 2 shows a thumbprint captured on paper. These are typically the kind of images that forensic AFIS (Automatic Fingerprint Identification Systems) have to deal with. The quality of the print not only deteriorates during capture but also during storage and hence AFIS systems are more sophisticated than their biometric counterparts. Fingerprints can be distinguished based on the ridge characteristics

Feature Extraction X Y θ T 106 26 320 R 153 50 335 255 81 215 B

Matching T(ΔX, ΔY , Δθ)? X Y θ T X Y θ T Rotation Scaling Translation Elastic distortion X Y θ T 106 26 320 R 153 50 335 255 81 215 B X Y θ T 215 08 120 R 213 20 145 372 46 109 B T(ΔX, ΔY , Δθ)?

Face Recognition:Eigen faces approach Face detection and localization Eigen faces Normalization

Face Feature Representations Facial Parameters Eigen faces Semantic model

Speaker Identification Speaker Recognition Speaker Recognition Speaker Identification Speaker Verification Speaker Detection Text Dependent Independent Speech Codecs IVR Computer Access Transactions over phone Forensics Caller identification

Cepstral feature approach Silence Removal Cepstrum Coefficients Cepstral Normalization Long time average Polynomial Function Expansion Dynamic Time Warping Distance Computation Reference Template Preprocessing Feature Extraction Speaker model Matching

Smoothened Signal Spectrum Vocal Tract modeling Speech signal Signal Spectrum Smoothened Signal Spectrum

Speaker Model F1 = [a1…a10,b1…b10] F2 = [a1…a10,b1…b10] ……………. FN = [a1…a10,b1…b10] …………….

Signature Verification Online Signature verification Off line Signature Verification

Matching – Similarity Measure Simple Regression Model Y = (y1 , y2 , …, yn) X = (x1 , x2 , …, xn) Similarity by R2 : 91% R2= Similarity by R2 : 31%

Dynamic Alignment Dynamic alignment ( y2 is matched x2, x3, so we extend it to be two points in Y sequence.) Dynamic alignment Similarity = R2 Where (x1i, y1i, v1i) are points in the sequence And a, b, c are the weights, e.g., 0.5, 0.5, 0.25 DTW warping path in a n-by-m matrix is the path which has min cumulative cost. The unmarked area is the constrain that path is allowed to go.

Iris Recognition Sharbat Gula:The Afghan Girl Iriscode used to verify the match

Iris Recognition Iris Image Choosing the bits Gabor Kernel

Collage

Hand Geometry

Evaluation of Biometric Systems Technology Evaluation Compare competing algorithms All algorithms evaluated on a single database Repeatable FVC2002, FRVT2002, SVC2004 etc. Scenario Evaluation Overall performance Each system has its own device but same subjects Models real world environment Operational Evaluation Not easily repeatable Each system is tested against its own population

System Errors FAR/FMR(False Acceptance Ratio) FRR/FNMR(False Reject Ratio) FTE(Failure to Enroll) FTA(Failure to Authenticate) Genuine (w1) Impostor (w2) Genuine No error False Reject False Accept Confusion matrix

Performance Curves: Score Distribution

Performance curves: FAR/FRR

Performance curves: ROC

State of the art Biometrics State of the art Research Problems Fingerprint 0.15% FRR at 1% FAR (FVC 2002) Fingerprint Enhancement Partial fingerprint matching Face Recognition 10% FRR at 1% FAR (FRVT 2002) Improving accuracy Face alignment variation Handling lighting variations Hand Geometry 4% FRR at 0% FAR (Transport Security Administration Tests) Developing reliable models Identification problem Signature Verification 1.5%(IBM Israel) Developing offline verification systems Handling skillful forgeries Voice Verification <1% FRR (Current Research) Handling channel normalization User habituation Text and language independence Chemical Biometrics No open testing done yet Development of sensors Materials research

Thank You ssc5@cedar.buffalo.edu