Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.

Slides:



Advertisements
Similar presentations
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Advertisements

Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Creating and Maintaining Databases Dr. Pushkin Kachroo.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Today’s Session Introduction Overview of Biometrics Dr. Charles C
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
ROC Curves Receiver Operating Characteristic (ROC) curves are used to determine the appropriate operating point of a system, the tradeoff between False.
Presentation transcript:

Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University

Sources Some images and material contained here are from: Guide to Biometrics Bolle, Connell, Pankanti, Ratha, and Senior, Springer 2004 and our conference/journal/book publications

What is Biometrics? Definition from Bolle, et al. – the science of identifying, or verifying the identity of, a person based on physiological or behavioral characteristics Note: biometric systems employ pattern recognition technology

Traditional Modes of Person Authentication Possessions – what you have Keys, passports, smartcards, etc. Knowledge – what you know Secret information: passwords, etc. Biometrics – what you are/do Characteristics of the human body and human actions that differentiate people from each other

Authentication Methods: Examples and Properties most widely used

Most Common & Other Biometrics

Universality every person has the biometric characteristic Uniqueness no two persons have the same biometric characteristic Permanence biometric characteristic invariant over time Collectability measurable with a sensing device Acceptability user population and public in general should have no strong objections to measuring/collecting the biometric Attributes Necessary to Make a Biometric Practical

System accuracy Computational speed (DNA slow) Exception handling System cost (high for DNA) Security – can system be compromised Privacy – data confidentiality System Performance and Design Issues

Identification versus Verification Identification 1-of-n Verification accept/reject

Identification versus Verification Identification 1-of-n Verification accept/reject

Acquisition Single 2D image Video sequence 3D image via stereo imaging, etc. Michigan State University – Anil Jain nilJain_FaceRecognition_KU10.pdf nilJain_FaceRecognition_KU10.pdf Face Biometric

Acquisition Inked finger impressions, scanners, etc. Problem – elastic distortion Features Fingerprint Biometric

Acquisition Offline (static information) – scanned images Online (static and dynamic info) – digitizers Categories of forger sophistication Zero-effort, home-improved, over-the-shoulder, professional Signature Biometric

Acquisition Microphone – inexpensive, ubiquitous Features from segmented “My name is” Speech Biometrics Speaker Verification – Voiceprint

Basic Authentication System Matching Errors FAR FRR w = within class (same person), b = between class (different people)

acceptreject FAR = False Accept Rate, FRR = False Reject Rate Basic Authentication System Matching Errors

Receiver Operating Characteristic (ROC) Curve  Low Security/High Convenience (liberal) can be too open  Low Convenience/High Security (conservative) can be too restrictive  FAR = False Accept Rate  Requires imposter testing  FRR = False Reject Rate  EER = Equal Error Rate

Biometric System Evaluation Types Technical Evaluation Simulation tests – usual for academic studies Scenario Evaluation Testing facility that simulates the actual installation Operational Evaluation Actual installation testing – most realistic

Typical Error Rates

Biometric Zoo Sheep Dominant group, systems perform well for them Goats Weak distinctive traits, produce many False Rejects Lambs Easy to imitate, cause “passive” False Accepts Wolves Good at imitating, cause “active” False Accepts Chameleons Easy to imitate and good at imitating others

biometrics_database/ biometrics_database/ Many Databases Available for Common Biometrics