bio metrics overview

Upload: ripon-ahmed

Post on 06-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Bio Metrics Overview

    1/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 1 of 10

    Introduction

    Biometrics is a general term used alternatively to describe acharacteristic or a process.

    As a characteristic:

    1. A measurable biological (anatomical and physiological)and behavioral characteristic that can be used forautomated recognition.

    As a process:

    2. Automated methods of recognizing an individual basedon measurable biological (anatomical and physiological)and behavioral characteristics.

    Biometric systems have been researched and tested for a fewdecades, but have only recently entered into the publicconsciousness because of high profile applications, usage inentertainment media (though often not realistically) andincreased usage by the public in day-to-day activities. Exampledeployments within the United States Government include theFBIs Integrated Automated Fingerprint Identification System(IAFIS), the US-VISIT program, the Transportation WorkersIdentification Credentials (TWIC) program, and the RegisteredTraveler (RT) program. Many companies are also implementing

    biometric technologies to secure areas, maintain time records,and enhance user convenience. For example, for many yearsDisney World has employed biometric devices for season ticketholders to expedite and simplify the process of entering its parks,while ensuring that the ticket is used only by the individual towhom it was issued.

    A typical biometric system is comprised of five integratedcomponents: A sensor is used to collect the data and convert theinformation to a digital format. Signal processing algorithmsperform quality control activities and develop the biometrictemplate. A data storage component keeps information that new

    biometric templates will be compared to. A matching algorithmcompares the new biometric template to one or more templateskept in data storage. Finally, a decision process (eitherautomated or human-assisted) uses the results from the matchingcomponent to make a system-level decision.

    http://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.dhs.gov/dhspublic/display?theme=91&content=3768http://www.tsa.gov/public/interapp/editorial/editorial_multi_image_with_table_0218.xmlhttp://www.tsa.gov/public/interapp/editorial/editorial_multi_image_with_table_0218.xmlhttp://www.tsa.gov/public/display?theme=8&content=09000519800b4dddhttp://www.tsa.gov/public/display?theme=8&content=09000519800b4dddhttp://www.tsa.gov/public/display?theme=8&content=09000519800b4dddhttp://www.tsa.gov/public/display?theme=8&content=09000519800b4dddhttp://www.tsa.gov/public/interapp/editorial/editorial_multi_image_with_table_0218.xmlhttp://www.tsa.gov/public/interapp/editorial/editorial_multi_image_with_table_0218.xmlhttp://www.dhs.gov/dhspublic/display?theme=91&content=3768http://www.fbi.gov/hq/cjisd/iafis.htmhttp://www.fbi.gov/hq/cjisd/iafis.htm
  • 8/3/2019 Bio Metrics Overview

    2/10

    Biometrics Overview

    Biometric Modalities

    Commonly implemented or studied biometric modalities includefingerprint, face, iris, voice, signature and hand geometry. Many

    other modalities are in various stages of development andassessment. There is not one biometric modality that is best forall implementations. Many factors must be taken into accountwhen implementing a biometric device including location,security risks, task (identification or verification), expectednumber of users, user circumstances, existing data, etc. It is alsoimportant to note that biometric modalities are in varying stagesof maturity.

    Fingerprint Recognition

    Manual comparison of fingerprints for recognition has been in use

    for many years, and has become an automated biometricidentification technique over the past two decades. Fingerprintshave an uneven surface of ridges and valleys that form a uniquepattern for each individual. For most applications, the primaryinterest is in the ridge patterns on the top joint of the finger.

    Figure 1: Fingerprint Recognition1

    An important distinction to make is the difference between theFBIs IAFIS2 system and the commercial fingerprint systems usedfor verification purposes. The FBI IAFIS system was developed to

    compare submitted fingerprint information against a database ofseveral million fingerprints to determine if the individual haspreviously submitted fingerprints, and thus has a potentialcriminal history. IAFIS systems require information from all tenfingers, either ink-based or electronic, and preferably rolledimpressions. Submitted fingerprints are compared against thefingerprints on file and are verified by 0, 1, or 2 fingerprintexaminers. The process usually takes about two hours.

    This Document Last Updated: 27 March 2006 Page 2 of 10

  • 8/3/2019 Bio Metrics Overview

    3/10

    Biometrics Overview

    Commercial fingerprint systems that are used for verificationpurposes usually require only one finger to compare thefingerprint to the one on file to confirm the individuals claimedidentity. This process is completely automated and usually takes

    less than a second. The two types of systems are not connectedat all.

    Face Recognition

    Humans recognize familiar faces with considerable ease, but theyare not good at recognizing unfamiliar individuals. Since the1960s, machine vision researchers have been developingautomated methods for recognizing individuals via their facialcharacteristics. Despite the volumes of research, there are noagreed-upon methods for automated face recognition as there arefor fingerprints. Multiple approaches have existed for several

    years using low resolution 2D images. Recent work in highresolution 2D and 3D shows the potential to greatly improve facerecognition accuracy.

    Iris Recognition

    The iris is the colored portion of an individuals eye. The conceptof using the iris for recognition purposes dates back to 1936.3 Thenext major advancement appeared in the late 1980s, with apatent being issued in 1994 for the algorithms that can performiris recognition automatically. To obtain a good image of the iris,identification systems typically illuminate the iris with near-infrared light, which can be observed by most cameras yet is notdetectable by, nor can itcause injury to, humans.A commonmisconception is thatiris recognition shines alaser on the eye toscan it. This isincorrect untrue. Irisrecognition simply takesan illuminated pictureof the iris withoutcausing any discomfortto the individual. Figure 2: Iris Recognition.4

    Hand/Finger Geometry

    One of the first successful commercial biometric products was ahand geometry system. Typically, a user enters a PIN code toclaim an identity, and then places his/her hand on the system,

    This Document Last Updated: 27 March 2006 Page 3 of 10

  • 8/3/2019 Bio Metrics Overview

    4/10

    Biometrics Overview

    which takes a picture of the hand. Using mirrors, the pictureshows the view of the hand from the top and side. Measurementsare then taken on the digits of the hand and compared to thosecollected at enrollment.

    Figure 3: Hand Geometry.5,6

    Other Biometric Identification Systems

    Many other identification methods are in various stages ofdevelopment and/or commercialization. Following are someexamples.

    This Document Last Updated: 27 March 2006 Page 4 of 10

    Speaker recognition uses an individuals speech, afeature influenced by both the physical structure of anindividuals vocal tract and the behavioralcharacteristics of the individual, for recognitionpurposes.

    Dynamic Signature measures the speed and pressureone uses when signing his or her name (not what thesignature looks like).

    Keystroke dynamics measures the typing patterns of anindividual.

    Retina recognition takes an image of the back of theeye and compares blood vessels with existing data.

    Gait/Body recognition measures how someone appearsas he or she walks. As in face recognition, this

    technique is one that humans intuitively use torecognize someone.7

    Facial Thermography measures how heat dissipates offthe face of an individual.

  • 8/3/2019 Bio Metrics Overview

    5/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 5 of 10

    Testing and Statistics

    The accuracy of a biometric system is determined through a seriesof tests, beginning with an assessment of matching algorithm

    accuracy (technology evaluation), then assessing performance in amock environment (scenario evaluation), followed by live testingon site (operational evaluation) before full operations begin.Each evaluation serves a different purpose and involves differenttypes of analyses.

    Biometric terms, such as recognition, verification andidentification, are sometimes used randomly. This is not onlyconfusing, but incorrect as each term has a different meaning.

    Recognition is a generic term and does not necessarilyimply either verification or identification. All biometric

    systems perform recognition to again know aperson who has been previously enrolled.2

    Verification is a task where the biometric systemattempts to confirm an individuals claimed identity bycomparing a submitted sample to one or morepreviously enrolled templates.

    Identification is a task where the biometric systemattempts to determine the identity of an individual. Abiometric is collected and compared to all thetemplates in a database. Identification is closed-set

    if the person is known to exist in the database. Inopen-set identification, sometimes referred to as awatchlist, the person is not guaranteed to exist in thedatabase. The system must determine if the person isin the database.

    Because of these variances, different statistics must be used foreach task.

    Verification

    False Acceptance Rate (FAR)

    The percentage of times a system produces a false accept,which occurs when an individual is incorrectly matched toanother individuals existing biometric. Example: Frankclaims to be John and the system verifies the claim.

    Verification Rate

    The rate at which legitimate end-users are correctlyverified.

  • 8/3/2019 Bio Metrics Overview

    6/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 6 of 10

    Open-Set Identification (Watchlist)

    False Alarm Rate

    The percentage of times an alarm is incorrectly sounded on

    an individual who is not in the biometric systems database(the system alarms on Frank when Frank is not in thedatabase), or an alarm is sounded but the wrong person isidentified (the system alarms on John when John is in thedatabase, but the system thinks John is Steve).

    Detection and Identification Rate

    The rate at which individuals who are in a database cause asystem alarm and are properly identified in an open-setidentification (watchlist) application.

    Closed-set Identification

    Identification Rate

    The rate at which an individual in a database is correctlyidentified.

    Standards

    Standards help users deploy and maintain their systems in aneasier manner, while also promoting longevity and enablinginteroperability. There are numerous national and international

    efforts developing standards for:technical interfaces

    data interchange formats

    testing and reporting

    societal issues

    Conclusion

    The NSTC Subcommittee on Biometrics developed this

    introductory material in order to better communicate both withinthe government and with other interested parties. Stating factsand discussing related issues in a consistent, understandablemanner, will enable smoother integration of privacy-protectivebiometric solutions. Federal agencies are working to ensure thattheir outreach activities are consistent with, and occasionallyreference, this suite of documents so that the public, press andCongress are able to easily understand their plans and discuss

  • 8/3/2019 Bio Metrics Overview

    7/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 7 of 10

    them productively. The Subcommittee encourages other entitieto also use and reference this material.

    This document serves as a general introd

    s

    uction to the field of.biometrics; other documents describe key items in more detail

    These include:

    Biometrics Frequently Asked Questions

    Biometrics Glossary

    Biometrics History

    Biometrics Overview

    Biometrics StandardsDynamic Signature

    Face Recognition

    itionFingerprint Recogn

    Hand GeometryIris Recognition

    nitionPalm Print Recog

    Speaker Recognitiond StatisticsBiometrics Testing an

    Vascular Pattern RecognitionThese chttp://www e

    The Privacy of Biometricsdo uments are available at:

    .biometricscatalog.org/NSTCSubcommitte .

    ocument ReferencesD

    1 International Biometric Group.

    2

    Orlans, and Peter T. Higgins,John D. Woodward, Jr., Nicholas M.Biometrics (New York: McGraw Hill Osborne, 2003).

    3 Nalini Ratha and Ruud Bolle, Automatic Fingerprint RecognitionSystems (Springer: New York, 2004).

    4 James Wayman et al, Biometric Systems Technology, Design andPerformance Evaluation (London: Springer, 2005).

  • 8/3/2019 Bio Metrics Overview

    8/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 8 of 10

    5 Maltoni, Davide, Maio, Jain, and Prabhakar, Handbook ofFingerprint Recognition (Springer: New York, 2005).

    6 Secugen Biometrics Solutions.

    7 Biometrics: Department of Def

    .

    8 Manfred Bromba, Bioidentification: Frequently AskedQuestions.

    9 Anil K. Jain, Ruud Bolle, and Sharath Pankanti, PersonalIdentification in a Networked Society (Kluwer Academic

    nd Technology Council

    Publishing: Massachusetts, 1999).

    About the National Science a

    The National Science and Technology Council (NSTC) wasestablished by Executive Order on November 23, 1993. This

    ecutivee

    Cabinet

    ars in a

    the

    der

    ion is

    Cabinet-level Council is the principal means within the exbranch to coordinate science and technology policy across thdiverse entities that make up the Federal research anddevelopment enterprise. Chaired by the President, the

    membership of the NSTC is made up of the Vice President, theDirector of the Office of Science and Technology Policy,Secretaries and Agency Heads with significant science andtechnology responsibilities, and other White House officials.

    A primary objective of the NSTC is the establishment of clenational goals for Federal science and technology investmentbroad array of areas spanning virtually all the mission areas ofexecutive branch. The Council prepares research anddevelopment strategies that are coordinated across Federalagencies to form investment packages aimed at accomplishingmultiple national goals. The work of the NSTC is organized un

    four primary committees; Science, Technology, Environment andNatural Resources and Homeland and National Security. Each ofthese committees oversees a number of sub-committees andinteragency working groups focused on different aspects ofscience and technology and working to coordinate the variousagencies across the federal government. Additional informatavailable at http://ostp.gov/nstc.

    http://www.secugen.com/images/faq02.gifhttp://www.bromba.com/faq/fpfaqe.htm#Fingerprint-Sensorenhttp://www.bromba.com/faq/fpfaqe.htm#Fingerprint-Sensorenhttp://ostp.gov/nstchttp://ostp.gov/nstchttp://www.bromba.com/faq/fpfaqe.htm#Fingerprint-Sensorenhttp://www.bromba.com/faq/fpfaqe.htm#Fingerprint-Sensorenhttp://www.secugen.com/images/faq02.gif
  • 8/3/2019 Bio Metrics Overview

    9/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 9 of 10

    About the Subcommittee on Biometrics

    Biometrics is a technology that is rapidly becoming a usefule Federal

    Government. Although the Federal Government is using theandocy

    es

    security, cost-savings and convenience tool for th

    technology for many applications now, further developmentassessment is required to improve the technologys utility. Taddress these issues, the Office of Science & Technology Poli(OSTP) created the NSTC Subcommittee on Biometrics, reportingto the National Science & Technology Council (NSTC) Committeon Technology and Homeland & National Security. Additionalinformation is available athttp://www.biometricscatalog.org/NSTCSubcommittee.

    Subcommittee on Biometrics

    Co-chair: Duane Blackburn (OSTP)

    epard (FBI Contractor)

    Co-chair: Chris Miles (DOJ)

    Co-chair: Brad Wing (DHS)

    Executive Secretary: Kim Sh

    Department Leads

    Mr. Jon Atkins (DOS)F)

    (EOP)

    C)

    Ms. Usha Karne (SSA)Dr. Michael King (IC)

    SA)

    Dr. Sankar Basu (NS

    Mr. Duane Blackburn

    Ms. Zaida Candelario(Treasury)

    Dr. Joseph Guzman (DoD)

    Dr. Martin Herman (DO

    Mr. Chris Miles (DOJ)

    Mr. David Temoshok (G

    Mr. Brad Wing (DHS)

    Mr. Jim Zok (DOT)

    http://www.biometricscatalog.org/NSTCSubcommitteehttp://www.biometricscatalog.org/NSTCSubcommittee
  • 8/3/2019 Bio Metrics Overview

    10/10

    Biometrics Overview

    This Document Last Updated: 27 March 2006 Page 10 of 10

    Communications ICP Team

    Champion: Duane Blackburn (OSTP)

    Members & Support Staff:

    Mr. Richard Bailey (NSAContractor)

    Mr. Jeffrey Dunn (NSA)

    Ms. Valerie Lively (DHS S&T)

    Mr. John Mayer-Splain (DHSUS-VISIT Contractor)

    Ms. Susan Sexton (FAA)

    Ms. Kim Shepard (FBIContractor)

    Mr. Scott Swann (FBI)

    Ms. Kimberly Weissman (DHSUS-VISIT)

    Mr. Brad Wing (DHS US-VISIT)

    Mr. David Young (FAA)

    Mr. Jim Zok (DOT)

    Document Source

    This document, and others developed by the NSTC Subcommitteeon Biometrics, can be found athttp://www.biometricscatalog.org/NSTCSubcommittee.

    http://www.biometricscatalog.org/NSTCSubcommitteehttp://www.biometricscatalog.org/NSTCSubcommittee