biometrics lecture slides 1 - university at buffalo · (transport security administration tests)...
TRANSCRIPT
BiometricsIntroduction
1882
Soft Biometrics
Bertillon took measurements of certain bony portions of the body,among them the skull width, foot
length, cubit, trunk and left middle finger. These measurements, along
with hair color, eye color and front and side view photographs, were recorded
on cardboard forms.
By dividing each of the measurements into small, medium and large
groupings, Bertillon could place the dimensions of any single person into
one of 243 distinct categories. Further subdivision by eye and hair color
provided for 1,701 separate groupings.
Biometrics ModalitiesBiometrics is the science of verifying
and establishing the identity of an individual through physiological features or behavioral traits
� Physical Biometrics� Fingerprint� Hand Geometry� Iris patterns
� Behavioral Biometrics� Handwriting� Signature� Speech� Gait
� Chemical/Biological Biometrics
� Perspiration� Skin composition
CUBS MODALITIES
FingerprintsHand Geometry
Signature
Face
?Odor
Voice
Biometric (Pattern Recognition) System
ID: 8809Authentication
ID : 8809
Matching
S(T1,T2)
Database
BiometricSensor
Feature Extraction
BiometricSensor
Feature Extraction
Enrollment
B1=f(ID1) T1
B2=f(ID2) T2
S>T? YES NO
Paradigm Shift
Password on Your Fingertips
Pay by Touch Border Crossing
Bio PasswordsForensics
� Fewer feature points� Absence of singular points� Unknown orientation� Noisy (crime scenes)
Pervasive Computing
Privacy Personalization
Authentication
Passwords?
Biometrics?
Biometric Solutions
� Reliable authentication and authorization� Common measures authenticate the token/password -not the user � Repudiation problems can be resolved� Can provide negative identifications� Stop ID theft
� Biometrics cannot be lost, forgotten or stolen� Streamline use of multiple tokens and passwords
� Positive Verification (1:1)� Claim is made (username)
� Large Scale Identification (1:N)� No claim is made � Claim is not trusted� Prevent duplicate accounts
� Screening � Matching against a watch list
Comparison of Authentication Protocols
Cannot be shared
Non-Repudiable
Cannot be lost
Fingerprint
Face
Iris ..
Biometrics
(B)
Can be shared
Can be forgotten
Can be guessed
Password, PIN,
Personal knowledge
What you know
(K)
Can be shared
Can be duplicatedCan be lost/stolen
User IDs, accounts, cards, badges, keys
What you have
(P)
PropertiesExamplesMethod
Applications And Scope of BiometricsTechnologies Horizontal Applications Key Vertical Markets
Fingerprint Civil ID Government Sector
Facial Recognition Surveillance and Screening Travel and Transportation
Iris Scan PC / Network Access Financial Sector
Middleware Retail / ATM / Point of Sale Health Care
AFIS Criminal ID Law Enforcement
Voice Scan eCommerce / Telephony
Hand Geometry Physical Access / Time and Attendance
Signature Verification
Keystroke Dynamics
State of the Art
�Handling channel normalization�User habituation�Text and language independence
<1% FRR (Current Research)
Voice Verification
�Development of sensors�Materials research
No open testing done yetChemical Biometrics
�Developing offline verification systems�Handling skillful forgeries
1.5%(IBM Israel)Signature Verification
�Developing reliable models�Identification problem
4% FRR at 0% FAR(Transport Security Administration Tests)
Hand Geometry
�Improving accuracy�Face alignment variation�Handling lighting variations
10% FRR at 1% FAR(FRVT 2002)
Face Recognition
�Fingerprint Enhancement�Partial fingerprint matching
0.15% FRR at 1% FAR(FVC 2002)
Fingerprint
Research ProblemsState of the artBiometrics