Large Scale Applications Dr. Pushkin Kachroo TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.

Slides:



Advertisements
Similar presentations
Matroids from Lossless Expander Graphs
Advertisements

Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Creating and Maintaining Databases Dr. Pushkin Kachroo.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Lectures on Discrete Differential Geometry – Weeks 5 & 7 Etienne Vouga March 5, 2014 TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Biometrics.
The double-dimer model and skew Young diagrams Richard W. Kenyon David B. Wilson Brown University Microsoft Research TexPoint fonts used in EMF. Read the.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Biometric Authentication : using fingerprints and evaluating fingerprint readers M. Ndlangisa Supervised by: Prof P. Wentworth and J. Ebden.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Support Vector Machines Joseph Gonzalez TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AA A AA.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Model-Based Stereo with Occlusions
Indexing and Binning Large Databases
Biometrics II CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 13 Biometrics What you are
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
1 BENCHMARKING FINGERPRINT ALGORITHMS Dr. Jim Wayman, Director US National Biometric Test Center San Jose State University
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Goals Gauge level of public understanding about non-visible light Can public draw conclusions about the state of an object using visible and non- visible.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Automatic Fingerprint Identification System Purpose Fingerprinting Process Applications Cost Issues Future National ID Card.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
Large Scale USA PATRIOT Act Biometric Testing C. L. Wilson Image Group IAD-ITL.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A AA A A A A A A A A  Justin Solomon,
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Selective Block Minimization for Faster Convergence of Limited Memory Large-scale Linear Models Kai-Wei Chang and Dan Roth Experiment Settings Block Minimization.
CS176 Capstone Project TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AA In Deo Speramus Brown.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
WELCOME.
SUBMITTED BY ATHIRA BALAKRISHNAN
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
ФОРЕНЗИКА У КРИМИНАЛИСТИЦИ
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Acceptable forms of identification
LINEAR & QUADRATIC GRAPHS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Large Scale Applications Dr. Pushkin Kachroo TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Large Scale Applications To reduce # of matches needed –Filtering: using non-bio like sex, age etc. –Binning: using additional biometric

Size Small: 1000 (approx. stored samples) Medium: 10K Large: 100K Very Large: 1M Extremely Large: 10M

Examples Voter Registration Enrollment Authentication National ID Enrollment Authentication

Fingerprint FAR(1)FRR 1 Finger Fingers

Enrollment False Positives Quadratic ~ [m x FAR(1)] x m For one finger…10^8 gives 10^11 Two finger it gives 10^6

Enrollment False Negatives FNR ~ 10 -3

Authentication Accuracy False Rejects: FRR x m = 10 5 for 10 8 size False Accepts: 10 -5

Matcher Sizing m(t): Database size J(t): Match throughput; #matches needed/time E(t): Enrollment Rate A(t): Authentication Rate

Matcher Throughput

Matcher Throughput-2 National ID Voter Registration/Election

Total # of Matches Verification on Election Day Enrollment

Cost Incremental Cost : Sampling, printing ID, etc.; Linear Exception Handling : Cost of Resolving False Positives; quadratic

Total Cost Even for i = 0 we get:

Cost-Plot Cost(m) m