An Introduction to Biometrics Julian Ashbourn. In the Beginning  Did ancient civilisations use biometrics?  “Nechutes, son of Asos, aged forty, of middle.

Slides:



Advertisements
Similar presentations
A Journey Through Biometrics Julian Ashbourn BCS Nov 17 th 2010.
Advertisements

Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Secure Communication Architectures.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Forensic History Fingerprints Forensic History Fingerprints.
History of Fingerprinting. There are records of fingerprints being taken many centuries ago, although they weren't nearly as sophisticated as they are.
Unit 3: Fingerprints 23. Unit 2 Notebook Check 24. Introduction to Fingerprints 25. CSI Video Guide 26. Fingerprint Notes due tomorrow! 27. Fingerprint.
1 CPSC Historical Perspective M.L. Gavrilova.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Introduction to Fingerprint Biometrics By Tamar Bar.
Biochips Using Biochips as an Alternative to Current Biometric Identification Techniques December 16, 2006 Team 2 Members John Casarella Dave Fronckowiak.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Hassle Free Fitness Monitoring David Jea, Jason Liu, Thomas Schmid, Mani Srivastava.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
1 Human resources management in NSOs Training workshop for SADC member states. Luanda, 2-6 Dec 2006 Olav Ljones, Deputy Director General, Statistics Norway.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
National Smartcard Project Work Package 8 – Security Issues Report.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Information ITIL Technology Infrastructure Library ITIL.
Chapter 1 Warm-Up: Which is the correct penny? NOTE: You cannot look at a real penny!
Fingerprinting Introduction Today’s Lesson Question: How do scientists characterize fingerprints?
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
By: Ada van Krimpen Director International Statistical Institute (ISI) 8 October 2014.
How science and civil law came together.
Introduction to Forensic Science The Science Behind Catching Criminals.
Math 5 Professor Barnett Timothy G. McManus Anthony P. Pastoors.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
1 of 27 How to invest in Information for Development An Introduction Introduction This question is the focus of our examination of the information management.
Unit 4: Fingerprints 4.1 History. Kendall/Hunt Publishing Company 2 Dactyloscopy The study of fingerprints Historically  William Herschel—required Indians.
Introduction to Earth Science Section 2 Section 2: Science as a Process Preview Key Ideas Behavior of Natural Systems Scientific Methods Scientific Measurements.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Bertillon and Anthropometry. Anthropometry Anthropometry refers to the measurement of the human individual for the purposes of understanding human physical.
Thinking like a Scientist
C82MST Statistical Methods 2 - Lecture 1 1 Overview of Course Lecturers Dr Peter Bibby Prof Eamonn Ferguson Course Part I - Anova and related methods (Semester.
Biometric for Network Security. Finger Biometrics.
Chapter 17. A. Once upon a time years ago... --Chinese artisans and scribes marked their work by leaving fingerprint in clay.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
The Psychologist as Detective, 4e by Smith/Davis © 2007 Pearson Education Chapter One: The Science of Psychology.
 In 1891, Henry was appointed to the office of the Inspector General of the Bengal Police.  In 1892 the police force adopted the anthropometric measuring.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
Information ITIL Technology Infrastructure Library ITIL.
Athina Antoniou and Lilian Mitrou
Biometrics : From Yesterday to Tomorrow
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Introduction to Forensic Science & to the Law
Secure and Privacy-Preserving User Authentication Using Biometrics
Ridge Characteristics
The History of Forensic Science
An Introduction to Forensic Science
The development of Forensic Science
The History of Forensic Science
Information Handling Research Student Induction Day
Hybrid Finger print recognition
Introduction to Forensic Science
INTRODUCTION TO FORENSIC SCIENCE
Presentation transcript:

An Introduction to Biometrics Julian Ashbourn

In the Beginning  Did ancient civilisations use biometrics?  “Nechutes, son of Asos, aged forty, of middle size, sallow complexion, cheerful countenance, long face with straight nose and a scar upon the middle of his forehead…”

Afterwards  Alphonse Bertillon  A fascination with anatomical measurement within the context of criminology  Bertillon developed a complex system of measurements and photography which came to be widely used ~ Anthropometry  A pioneer of the criminal mug-shot

The Fascination Continues  Francis Galton  Explorer, anthropologist, cousin of Charles Darwin, developed the concept of eugenics  Amassed over 8000 sets of fingerprints and developed a classification system based upon minutiae  Placed the study of fingerprints on a sound scientific basis Biometrics and Eugenics  Karl Pearson, statistician and protégé of Galton formed a biometric laboratory at the University of London in 1907  The journal ‘Biometrika’ becomes influential (particularly in the USA) as the concept of eugenics becomes political  The Carnegie Institution create the Centre for Genetic Research and in 1910 the Eugenics Record Office founded at Cold Spring Harbor in the USA where ‘intelligence tests’ are initiated  US psychologist Henry Goddard submits an influential study on the ‘Inheritance of Feeblemindedness’  By 1931, 27 US states had enacted sterilisation laws  By 1941, 36,000 individuals in America had been sterilised under these laws  Germany and Switzerland pick up the thread of ‘eugenics’…..

And Evolves  Juan Vucetich  Developed a system of fingerprint classification based upon Galton’s ideas, for the Argentine police  First positive identification by fingerprints in a criminal case (Francisca Rojas)  System widely adopted by police forces in many countries  Galton-Henry system adopted by Scotland Yard

Interim Conclusion  The idea of using a biometric for identity verification purposes is hardly new  What has changed is the prospect of automation within the information age

Modern Principles of Operation  How does it all work?  Determine features to be matched  Extract features and create biometric reference  Extract features from live sample and match against reference creating a ‘statement of likeness’  Determine a match or non-match according to the alignment of the statement of likeness against a pre-defined threshold  Thresholds may be adjustable in order to manipulate realised performance

In Simple Terms  Registration  Live Operation 011%0$11%100$0%1%0 Capture Sample Extract Features Create Reference Biometric Code Store Reference 011%0$11%100$0%1%0 010%0$10%100$0%1%0 Score 85 Threshold 80 Result Match Capture Sample Extract Features & Create Code Retrieve Stored Code & Compare Generate Likeness Score Align with Threshold

Probability of Errors False Match False Non-Match Equal Error Rate Definable Threshold Error Rate %

Environmental Factors  Operational environment  Temperature, humidity, available light, noise levels, cleanliness, signage  Technical environment  Network availability, noise, power stability, component performance  User psychology  Habituated or non-habituated user, sympathetic or not to concept, disabilities, confidence, general understanding of technology

Real Performance

Equivalence of Performance Who installed the system?  Who installed the system?  Who set the threshold?  Against what criteria?  Who is maintaining the system?  How often is it checked?

Maintaining Equivalence

Interim Conclusion  Biometric matching is not an exact science  System implementation may be complex  Understanding performance is important  True systems integration is potentially complex

Working with Biometrics  Some fundamentals  Under what situations might it be pertinent to undertake a biometric identity verification check?  Who does the biometric belong to?  Who should decide how it is used?  Who has access to data aligned with a biometric?  Can a biometric match be repudiated?  Should a biometric be used covertly?  What assumptions are made around the results of a biometric identity verification transaction?

Information Alignment  How accurate is the information associated with a particular biometric

Supporting Biometrics  Reduced help desk calls?  Managing templates and directories  Enrolment procedures  Establishing an identity  Template quality  User instruction  Exception handling  Repudiation  Biometric forensics

Biometrics in the Cloud  Federated identities  Implications for the registration process  Who owns them? who services them?  Who maintains the directory of biometrics?  Alignment with profiles, privileges, location, device and other factors (context based)  Virtualised environments and identity management  A Pandora’s Box of biometrics

A Brave New World  William Shakespeare O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world!  Or…. Aldus Huxley George Orwell H.G. Wells

Final Conclusion  The time has come to take a fresh look at what we might achieve with this technology  A re-statement of relevance  Best practices around systems integration  Clarity around privacy, ownership and data protection (on an international scale)  Clarity of purpose with respect to large scale public sector applications (and communication)  A Biometric Constitution?  See

Thank You Julian Ashbourn Guide to Biometrics for Large-Scale Systems ISBN Published by Springer