Biometric Measures for Human Identification

Slides:



Advertisements
Similar presentations
Iris Recognition Device Usability as Observed in Comparative Testing The International Workshop on Usability and Biometrics 24 June 2008 Michael Thieme.
Advertisements

International Workshop on Usability and Biometrics: NIST Welcome
BIOMETRICS CONSORTIUM CONFERENCE BALTIMORE, MARYLAND September 19 – 21, 2006 Bill Wipprecht EVP/Chief Security Officer Corporate Security Wells Fargo &
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Biometrics.
ACT-IAC Igniting Innovation 2014 February 6, 2014.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
By: Monika Achury and Shuchita Singh
Information Fusion in Multibiometric Systems
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Indexing and Binning Large Databases
Biometrics II CUBS, University at Buffalo
Mulitmodal Biometric Systems Munir Bandukwala Rajesh Subramanian.
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
PALM VEIN TECHNOLOGY.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometrics and Authentication Shivani Kirubanandan.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Collecting Multimodal Biometric Data Ross J. Micheals Image Group, Charlie Wilson, Manager Information Access Division, Martin Herman, Chief National Institute.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
FBI Science & Technology Branch MISSION To facilitate the application of innovative scientific, engineering, and technical solutions in support.
Fault Tolerant Sensor Network for Border Activity Detection B. Cukic, V. Kulathumani, A. Ross Lane Department of CSEE West Virginia University NC-BSI,
Large Scale USA PATRIOT Act Biometric Testing C. L. Wilson Image Group IAD-ITL.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
1 The National Research Center for Border Security and Immigration (BSI)
Human Identification From a Distance D. Adjeroh, B. Cukic, M. Gautam, L. Hornak, A. Ross Lane Department of CSEE West Virginia University NC-BSI, December.
Larry Hornak Co-Director, CITeR, West Virginia University NSF I/UCRC 2003 Annual Meeting Washington, DC, January Research in Emerging Areas: Defense.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
1 ISO/IEC JTC1/SC37 Standards A presentation of the family of biometric standards October 2008.
EXAMINING INTRA-VISIT IRIS STABILITY (VISIT 1) Bo Brown, Jing Guan, Vince Sipocz, Aidan Chamberlain, Brandon Cox, Preston Flint, Eric Hollensbe, Brandon.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Multimodal Biometric Security
Biometric Identity Misrepresentation Risk in Transactional Processes
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Fusing Binary Templates for Multi-biometric Cryptosystems
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Biometrics and Standards ITU-T Technology Watch Report December 2009.
Presentation transcript:

Biometric Measures for Human Identification D. Adjeroh, B. Cukic, L. Hornak, A. Ross Lane Department of CSEE West Virginia University NC-BSI, December 2008

Problem Statement Current biometric systems at the US borders rely on fingerprint and face recognition (US-VISIT). We will analyze the use of other biometric modalities (iris, palm, face, voice) and their combinations for border security. Methodology Lab and field experiments to study the maturity, reliability, cost, performance, and feasibility of new biometric modalities in the context of border security. NC – BSI 2008

Systems Approach: Port of Entry Modality, FMR, vulnerability, exceptions, throughput? Traveler Queues Watch Lists / Identity DB Legend =Required Signal =Optional Signal = Movement Public Key Directory Secondary Inspection / Detainment Border Access =Optional Movement Inspection Stations (w/ biometric ) Acceptance,modality, quality? Local, distributed, or central? Modality, quality, scalability, update, access ? False Match Rate, Inconvenience acceptance? Risk function False Non Match Rate NC – BSI 2008 after Cukic et al.

Error Rates Test Test Parameter False Reject Rate False Accept Rate Fingerprint FVC [2004] Exaggerated distortion 2% FpVTE [2003] US govt. operational data 0.1% 1% Face FRVT [2002] Varied lighting, outdoor/indoor 10% FRGC [2006] Time lapse, varied lighting/expression, outdoor/indoor Iris ITIRT [2005] Indoor environment, multiple visits 0.99% 0.94% Voice NIST Text independent, multi-lingual 5-10% 2-5% NC – BSI 2008

NIST FRVT 2006 Results NC – BSI 2008

Sensor Interoperability A. Ross and R. Nadgir, "A Calibration Model for Fingerprint Sensor Interoperability", Proc. of SPIE Conference on Biometric Technology for Human Identification III, (Orlando, USA), April 2006. NC – BSI 2008

Multimodal Biometric Systems Multiple sources of biometric information are integrated to enhance matching performance Increases population coverage by reducing failure to enroll rate Anti-spoofing; difficult to spoof multiple traits simultaneously Fingerprint Face Hand geometry Iris NC – BSI 2008

Deployment Problems Sensor Interoperability Missing information from some modalities Non-ideal capture Non-cooperative subjects or capture problems surveillance scenarios, i.e., identifying risk early Varying risk tolerance Maximizing identification rates while minimizing inconvenience and disruption of border crossing flow. NC – BSI 2008

Leverage The Center for Identification Technology Research (NSF I/UCRC) Biometrics: Performance, Security and Social Impact, (NSF and DHS – Human Factors) Performance analysis, multimodal biometric database collections, familiarity with port of entry applications. WVU is academic partner with the FBI Center of Excellence in Biometrics Large scale data collection for the New Generation Identification project. NC – BSI 2008

Deliverables Year 1: Years 2-5: Analysis of existing performance studies, Defining specific border application scenarios and their requirements, Definition of lab experiments Definition of field experiments. Years 2-5: Experimental results Modality recommendations Multi-modal fusion, System aspects and recommendations. NC – BSI 2008