Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd. 2003.

Slides:



Advertisements
Similar presentations
April, 2003IKTA-88/2001 Institute of Graphology, Hexium, BMF NIK Development of an Autonomous, Reliable, High Quality Signature Verification Device Institute.
Advertisements

Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Iris Recognition Under Various Degradation Models Hans Christian Sagbakken.
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS Presented By Rickie Jackson.  Outline –Introduction –Biometrics techniques –Strengths, and weaknesses –FAR/FRR –Major Players –Summary.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
CM-707 Standalone Fingerprint Access Control System CM -707 is biometrics fingerprint recognition standalone access control system.It can store up to 800,1500.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
KBA 1 Korea’s Advances in Biometrics Market & Technology Alex H. Choi Korea Biometric Association.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Voice Recognition
Marjie Rodrigues
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Speech Technology Center Solutions for Mobile Phones.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
VOICE USER INTERFACE BY R.SELVI K.PRIYA I-MCA. INTRODUCTION voice portal can be defined as “speech  enabled access to Web based information”. In other.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Global Biometrics Market Size, Share, Global Trends, Analysis, Research Report and Forecast, Market Research Store.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Multimodal Biometric Security 1.
Biometrics Technologies Market to Global Analysis and Forecasts by Technology and Application No of Pages: 150 Publishing Date: Feb 2017 Single.
Biometrics Technologies Market to Global Analysis and Forecasts by Technology and Application No of Pages: 150 Publishing Date: Feb 2017 Single.
Access control techniques
A Seminar Report On Face Recognition Technology
Multimodal Biometric Security
Speech Technology Center Solutions
FACE RECOGNITION TECHNOLOGY
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
Seminar Presentation on Biometrics
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
TECHNOLOGICAL PROGRESS
BY: Michael Etse and Maverick Fermill
Ones Technology Products & Solutions
Presentation transcript:

Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd. 2003

Table of Contents Introducing Hexium Ltd. The problem Access control Biometrics Voice-print properties Innovation Preliminary market analysis Summary

HEXIUM Technical Development Co., Ltd. Research, development, production (hardware, software) Security control, image processing, industrial measurement, signal processing and automation

The problem Communication network TriMedia Terminal Server RS485 1.Physical access/time control 2.Inexpensive, reliable, fast, user-friendly

Issues with ownership based access control What to identify? a card? a keyword? a PIN code? … and NOT the PERSON! Gives rise to abuse..

Biometrics Identification of human subjects based on Physical parameters Behavioral parameters Examples: Fingerprint, iris, face, ear, hand Signature, voice

Comparision of biometrics MethodRecognitionUser acceptance User friendliness Difficulty/ method of abuse Fingerprint*********Sensor dependent Signature******* Learning Face*****^Masks Retina/iris**** Hand*********Sensor dependent Voice***^**** Sensor and system dependent

But.. Issues with biometrics Expensive sensors Poor acceptance by users due to.. Uncomfortable use Mistrust Precision, reliability Recall Slow processing

Properties of voice Identitity verification: Speaker dependent features (speaker verificaton) Message verification: Message dependent features (speech recognition) Properties Speaker independent but content dependent Speaker dependent, independent of the message

Voice-print properties The figures show the spectogram of a sentence spoken twice by the same person Both the rhythm (a behavioral property) and the spectral distribution of identical sounds (physical parameters) stay remarkably constant. People are generally good at copying behavioral patterns (a behavioral property), but is is impossible for them to copy the physical “layout” of sounds. Speech of different people show vastly different rythmic and spectral patterns.

Issues with speaker verification Noisy environment People staying close Takes time (dialogue) Goal: scaleable, multi-layer system FAR 0.01% % FRR small (below 1%) FAR: false acceptance rate FRR: false reject rate

Innovation Advanced noise filtering “Liveness” verification using array microphones Optimized implementations Robust dialogue design minimizing the error rate Multi-model user interface Open system architecture

Preliminary market analysis IDC Access control, 2002: USD 4.2M Biometrics, only banks, 2004: USD 1,800M We are here..

Summary Advanced, autonomous voice based access control terminals Competitive technology Better acceptance than that of competing biometrics technologies Growing market demand

Contact HEXIUM Technical Development Co., Ltd. H-1134 Budapest, Váci út 51/b, HUNGARY Phone: (+36 1) Fax: (+36 1) Honlap: