nari dacment

Upload: sateesh-tulluri

Post on 09-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 nari dacment

    1/14

    Biometrics history -- looking at biometric technologies from the past to

    the present

    The ancient Egyptians and the Chinese played a large role in

    biometrics' history. Although biometric technology seems to belong in thetwenty-first century, the history of biometrics goes back thousands of years.Today, the focus is on using biometric face recognition and identifyingcharacteristics to stop terrorism and improve security measures. Once anindividual is matched against a template, or sample, in the database, asecurity alert goes out to the authorities. A person's space between the eyes,ears and nose provides most of the identifying data.

    The ACLU and other civil liberties groups are against the widespread use of

    these biometric technologies, although they acknowledge the necessity oftheir presence in airports and after the London bombings. Biometrictechnologies also need to achieve greater standardization and technologicalinnovations to be recognized as a trustworthy identity authenticationsolution.

    A timeline of biometric technology

    European explorer Joao de Barros recorded the first known example offingerprinting, which is a form of biometrics, in China during the 14th

    century. Chinese merchants used ink to take children's fingerprints foridentification purposes.

    In 1890, Alphonse Bertillon, a Parisian police desk studied bodymechanics and measurements to help identify criminals. The policeused his method, the Bertillonage method, until it falsely identifiedsome subjects. The Bertillonage method was quickly abandoned infavor of fingerprinting, brought back into use by Richard EdwardHenry of Scotland Yard.

    Karl Pearson, an applied mathematician studied biometric researchearly in the 20th century at University College of London. He madeimportant discoveries in the field of biometrics through studyingstatistical history and correlation, which he applied to animalevolution. His historical work included the method of moments, the

  • 8/7/2019 nari dacment

    2/14

    Pearson system of curves, correlation and the chi-squared test.

    In the 1960s and '70s, signature biometric authentication procedureswere developed, but the biometric field remained fixed until themilitary and security agencies researched and developed biometrictechnology beyond fingerprinting.

    2001 Super Bowl in Tampa, Florida -- each facial image of the100,000 fans passing through the stadium was recorded via videosecurity cameras and checked electronically against mug shots fromthe Tampa police. No felons were identified and the video surveillanceled many civil liberties advocates to denounce biometric identifyingtechnologies.

    Post 9/11 -- after the attacks, authorities installed biometrictechnologies in airports to ID suspected terrorists, but some airports,like Palm Beach International, never reached full installation statusdue to the costs of the surveillance system.

    July 7th, 2005 London, England -- British law enforcement is usingbiometric face recognition technologies and 360-degree "fish-eye"video cameras to ID terrorists after four bombings on subways and ona double-decker bus. In fact, London has over 200,000 securitycameras and surveillance cameras that have been in use since the1960s.

    Today and looking forward

    Biometrics is a growing and controversial field in which civil liberties groupsexpress concern over privacy and identity issues. Today, biometric laws andregulations are in process and biometric industry standards are being tested.

    Face recognition biometrics has not reached the prevalent level offingerprinting, but with constant technological pushes and with the threat ofterrorism, researchers and biometric developers will hone this securitytechnology

    Biometric face recognition technologies are a new and evolving measure thatgovernments and firms use to identify criminals and protect innocent people.

  • 8/7/2019 nari dacment

    3/14

    However, the makers of this biometric face technology must contend withthe inevitable ethical issues: what if the wrong person is identified or what ifthe technology infringes upon individual rights? Developers and researchersare constantly measuring and testing biometric methods to ensure that theright individual is identified, although the ACLU (American Civil LibertiesUnion) asserts that the technology is, "outpacing our basic privacy rights."

    However, public attitudes are becoming less negative, due in part to 9/11 andthe London bombings, and to the prevalence of DNA testing. Some of theseconcerns have kept face recognition products from reaching their full

    potential, but these concerns will fall by the wayside when governments andfirms acknowledge that face recognition technology is the best passive andnon-intrusive recognition technology available.

    The biometric identification equipment assigns a numerical value to everysubject captured by hi-tech cameras. Biometrics identify spacing between theears, eyes, and nose, as well as allowing for variants such as facial hair andglasses. But biometric technologies are not yet as accurate as fingerprinting.A positive ID can be made with biometrics 95% of the time, as opposed to99% of the time with fingerprinting, but biometrics has the advantagethrough image data volume: there are 1.3 billion photographs of individualson official databases, versus only several hundred million sets of fingerprintson file.

    Biometric market growth and its applications today

    Most of the biometric industrys revenue comes from government securityapplications, with only 20% of the total coming from the health care,financial services and transportation industries. The business is growing asthe technologys performance is improving and non-government firms areusing the biometrics to ensure proper authorization and authentication whenregulating physical access. State and local governments use face recognitiontechnologies by providing first-responders to a crime or accident scene with

    biometric ID cards.

    Facial geometry / Gomtrie du visage

    Many different methods based on geometrical characteristics of the facehave been developped such as "local feature analysis", "Eigenface orPrincipal Component Analysis", ...

  • 8/7/2019 nari dacment

    4/14

  • 8/7/2019 nari dacment

    5/14

    Skin pattern recognition /Structure de la peau

    Developped Visual Skin Print, that uses pattern matching of theface skin

    Visual Skin Print relies on standard hardware - most web-cams andhigher resolution mass-market video cameras, connected to a PC, willwork. Visual Skin Print is based on a simple yet powerful idea:using the details of the skin for authentication.

    What about big brother?

    The ACLU does not support most face recognition technology since it claimsprevious attempts at the technology have failed. This is true: at the 2001Super Bowl in Tampa, the biometric software wrongly identified severalindividuals as wanted persons, and there were failed biometric surveillanceinstallations at several airports. Left unchecked, civil libertarians feel thatface recognition technologies will trample on individual rights and freedomssince there are no new laws that address the use of biometrics. However, theACLU has gone on record to accept the use of biometrics in airports areasand for solving the London bombings.

  • 8/7/2019 nari dacment

    6/14

    Biometric experts also concede that the technology is not foolproof, andwould be very dangerous if someone's photo ID were stolen.

    Looking ahead

    Applying biometrics for an authentication system must be a concerted andcollaborative effort that takes into account several components:

    A person's ID and biometrics Something that person has such as a key or token Something the person knows, such as a PIN or password

    Because the biometric technology of today is slightly inaccurate, otheridentifying tools need to be used alongside of it.

    Flaws in the face recognition technology will be challenged and overcome,because identifying suspects through biometric means will quickly solvecases and will save lives.

    How biometric technology is used in video surveillance

    As the recent July 7th London bombings would reveal, biometric technology

    images from over 200,000 video surveillance cameras are key weaponsagainst the terrorists. What makes these biometric cameras so extraordinaryis that these cameras have a 360-spherical lens, called a fisheye, to followsomeones movements and the cameras computers can be programmed toidentify particular faces from a database.

    The fisheye and other security solutions are manufactured by IpixCorporation, which provides governments and large firms with the latestvideo surveillance technologies. Says Ipix president, Clara Conti, Thesecameras dont have any blind spots. Fixed cameras have blind spots. These

    cameras capture the biometric facial recognition data needed to identifysuspects and solve crimes.

    http://www.ipix.com/http://www.ipix.com/http://www.ipix.com/http://www.ipix.com/
  • 8/7/2019 nari dacment

    7/14

    Video surveillance solution design guide -- part 1: introduction& security camera selection

    Designing a video surveillance solution requires decisions on 7 fundamentalquestions. This tutorial walks the reader through each issue explaining the

    basic options and the rationale for selecting different options.

    This is a survey to help those new to video surveillance (and the first chapterof the "Security Manager's Guide to Video Surveillance" 2nd Edition book).Its goal is to quickly identify the key aspects of video surveillance design,not to examine the many details and edge cases in such designs.

    The 7 fundamental questions are:

    What type of security cameras should I use? How should I connect cameras to video management systems? What type of video management system should I use? What type of storage should I use? What type of video analytics should I use? How should I view my surveillance video? How should I integrate video with my other systems?

    1. Security Camera Selection

    Security cameras are literally the eyes of a video surveillance system.Cameras should be deployed in critical areas to capture relevant video.

    The two basic principles of camera deployment are (1) use chokepoints and(2) cover assets.

    Chokepoints are areas where people or vehicles must pass to enter a certainarea. Examples include doorways, hallways and driveways. Placing camerasat chokepoints is a very cost-effective way to document who entered afacility.

    Assets are the specific objects or areas that need security. Examples of assetsinclude physical objects such as safes and merchandise areas as well as areaswhere important activity occurs such as cash registers, parking spots orlobbies. What is defined as an asset is relative to the needs and priorities ofyour organization.

    http://ipvideomarket.info/book/Security_Manager_Guide_Video_Surveillance_v2_0.pdfhttp://ipvideomarket.info/book/Security_Manager_Guide_Video_Surveillance_v2_0.pdf
  • 8/7/2019 nari dacment

    8/14

    Once you determine what areas you want to cover, there are four cameracharacteristics to decide on:

    1. Fixed vs. PTZ: A camera can be fixed to only look at one specificview or it can be movable through the use of panning, tilting and

    zooming (i.e., moving left and right, up and down, closer and fareraway). Most cameras used in surveillance are fixed. PTZ cameras aregenerally used to cover wider fields of views and should generally beused only if you expect a monitor to actively use the cameras on adaily basis. A key reason fixed cameras are generally used is that theycost 5 to 8 times less than PTZs (fixed cameras average $200 to $500USD whereas PTZ cameras can be over $2,000 USD).

    2. Color vs. Infrared vs. Thermal: In TV, a video can be color or black

    and white. In video surveillance today, the only time producing ablack and white image makes sense is when lighting is very low (e.g.,night time). In those conditions, infrared or thermal cameras produce

    black and white images. Infrared cameras require special lamps(infrared illuminators) that produce clear image in the dark (but aresignificantly more expensive than color cameras - often 2x to 3xmore). Thermal cameras require no lighting but product onlysilhouettes of objects and are very expensive ($5,000 to $20,000 onaverage) In day time or lighted areas, color cameras are the obviouschoice as the premium for color over black and white is trivial.

    3. Standard Definition vs. Megapixel: This choice is similar to that ofTVs. Just like in the consumer world, historically everyone usedstandard definition cameras but now users are shifting into highdefinition cameras. While high definition TV maxes out at 3 MP,surveillance cameras can provide up to 16 MP resolutions. In 2008,megapixel cameras only represent about 4% of total cameras sold butthey are expanding very rapidly. See a demonstration of megapixelcameras to learn more.

    4. IP vs. Analog: The largest trend in video surveillance today is themove from analog cameras to IP cameras. While all surveillancecameras are digitized to view and record on computers, only IPcameras digitize the video inside the camera. While most infrared andthermal cameras are still only available as analog cameras, you can

    http://ipvideomarket.info/report/demonstrating_the_value_of_megapixel_camerashttp://ipvideomarket.info/report/demonstrating_the_value_of_megapixel_camerashttp://ipvideomarket.info/report/demonstrating_the_value_of_megapixel_camerashttp://ipvideomarket.info/report/demonstrating_the_value_of_megapixel_cameras
  • 8/7/2019 nari dacment

    9/14

    only use megapixel resolution in IP cameras. Currently, 20% ofcameras sold are IP and this percentage is increasingly rapidly.

    Most organizations will mix and match a number of different camera types.For instance, an organization may use infrared fixed analog cameras around

    a perimeter with an analog PTZ overlooking the parking lot. On the inside,they may have a fixed megapixel camera covering the warehouse and anumber of fixed IP cameras covering the entrance and hallways.

    What is biometrics?

    Biometrics is a field of technology that uses automated methods foridentifying or verifying a subject based on a physiological or behavioralcharacteristic. Among the features measured are the face, fingerprints, hand

    geometry, handwriting, iris, retinal, and voice. The individualscharacteristics are then compared to other individuals stored on biometrictemplates within a database. If there is correlation between the template andthe subject, a high score would be generated and the authorities alerted.Using biometric technologies to identify the bombers faces is an accurateand cutting-edge solution.

    A4Vision Inc, a 3-D facial imaging products and technology manufacturer,transfers barely-visible infrared light onto a subjects face to determine itsfacial contours from the light pattern. Another manufacturer, Geometrix,

    combines two or more cameras to build a 3-D shape via triangulation. ItsActiveFusion surveillance technology blends 3-D face, 2-D face, andfingerprint biometrics to claim submillimeter accuracy.

    Both of these companies systems need high resolution cameras to achievethe results expected and they work best when the subject is a few feet awayfrom the video cameras. Although a poor image can reduce the effectivenessof the cameras work, a great deal is being done in this technological field tostandardize image quality, and improve the quality and size of the biometrictemplate database.

    How to evaluate these biometric solutions

    Although evaluation techniques for biometric solutions are not standardized,research enterprises and commercial firms are encouraged to take the FaceRecognition Vendor Tests (FRVT). The FRVT will perform tests on all ofthe databases in order to achieve an objective and fair comparison among the

    http://www.a4vision.com/http://www.geometrix.com/http://www.a4vision.com/http://www.geometrix.com/
  • 8/7/2019 nari dacment

    10/14

    vendors. These evaluations will provide the U.S. Government and lawenforcement agencies with information to determining where and how facialidentification technology can best be deployed. In addition, FRVT resultswill help identify future research directions for professionals in the videosurveillance and biometric field. Biometric technologies are the foundationof a new identification solution for video surveillance. As terrorism threatincreases, more businesses and governments are turning to biometrics toquickly resolve security issues to make their employees and citizens safer.

    The future of biometrics -- trends and emerging uses for biometric

    technology

    The future of biometrics holds great promise for law enforcementapplications, as well for private industry uses. By measuring facial geometry,surveillance systems can identify suspects against characteristics stored inthe security system's database. "There is a popular tendency to regard

    biometric products as sci-fi mythology, but the reality is that biometrics isthe future of the security industry and is quickly becoming recognized as themost accurate identification technology in the market," claims Don Mihaewho was recently hired by JAD Communication & Safety Systems (JADCS)to lead its security division.

    Biometrics' future will include e-commerce applications for extra security onthe checkout page, and biometrics will guard against unauthorized access tocars and cell phones. In the future, biometric technology will further develop3-D infrared facial recognition access control, real-time facial recognition

    passive surveillance, and visitor management authentication systems.Already A4Vision, a provider of 3-D facial scanning and identificationsoftware uses specialized algorithms to interpret the traditional 2-D cameraimage and transfer it into a 3-D representation of a registered face. Thismakes it almost impossible to deceive the biometric system with still photosor other images.

    Strengthening existing biometric innovations for future growth

    All of these security innovations will make biometric technology moreaccurate and make its usage more widespread.

    http://www.a4vision.com/http://www.a4vision.com/
  • 8/7/2019 nari dacment

    11/14

    Access control facial recognition -- Biometric technologies willpermit authorized users entry to a property or to specific location in abuilding. Today, A4Vision uses a 3-D infrared facial recognitionsystem to project subdued light onto a subject's face for optimalidentification. But in the future, this biometric technology will bestrengthened so that the subject will not have to be a just few feetaway from the video surveillance cameras.

    Facial recognition passive surveillance -- Hidden surveillancecameras will be set up to monitor an entranceway of any type of

    building to accurately identify a potential suspect or terrorist against adatabase of millions of images in less than one second.Alerts will thentransmitted to security personnel in real time.

    Alert management -- This is a fully customizable command center toguard against potential security breeches. The center uses real-timetechnologies to deliver security alerts to multiple locations throughPDA (personal digital assistant) devices, and other mobiletechnologies.

    As the need increases for government bodies and large firms to deploy hi-tech security systems to solve crimes or protect employees, biometrictechnology will improve, as investor confidence increases. Once theconsumer confidence is evident, biometric research will provide furtherinnovations, which will in turn strengthen future performance, and this cyclewill continue to build in a positive direction.

    But for the biometric technology field to grow, industry standards must existso that there is the greatest compatibility between applications and hardware.The ISO/IEC JTC1 is the governing body of international biometricstandards, but this standardization is still in progress. In the future, fixed

    biometric standards will be in place to guide vendors and developers in theareas of biometric application profiles, interfaces, and system performance.

    With such a young technology, biometric and identification technology haseverything to gain with improved standards and accuracy. In probably a shorttime, biometric developers will surpass the quality of their current product sothat the future of the biometric field will be assured in the hi-techmarketplace.

  • 8/7/2019 nari dacment

    12/14

    HISTORY OF BMTCHIP, THE DEVELOPER OF VIDEO

    SERVILANCE SYSTEMS

    Oct2000Nov2000

    - Biometrix Technology Inc.established- Approval of Korean VentureCompany by SMBA

    2001 Feb 2001- Moving into ChuncheonBioventure Innovation Center

    2002 Jul 2002 - BMT R&D center established

    2003 May 2003- Approval of Korean VentureCompany by KIBO

    2004 Dec 2004

    - Awarded Ministry ofcommerce, Industry andEnergy on 100th- outstanding issues(Biochipmanufacturing technology

    2005 May 2005- Approval of Korean VentureCompany by KIBO

    2007 May 2007

    Jun 2007Jun 2007Jul 2007Nov 2007Dec 2007

    - Exhibition Show at

    BIO2007(USA, Boston)- Approval of INNO-BIZcompany by SMBA- Approval of Korean VentureCompany by KIBO- Exhibition Show at AmericanAssociation of Clinical

  • 8/7/2019 nari dacment

    13/14

    Chemistry (AACC) 2007- Exhibition Show atCompamed 2007(Germany,Dusseldorf)

    - Awarded a prize of KoreanFBA Best Bioventure company

    2008Jul 2008Aug 2008Nov 2008

    - Exhibition Show at AmericanAssociation of ClinicalChemistry (AACC) 2008- Moving into Bio VenturePlaza- Exhibition Show at

    Compamed 2008(Germany,Dusseldorf)

    2009

    Feb 2009Jul 2009

    Oct 2009Nov 2009Nov 2009

    - Approval of Korean VentureCompany by KIBO- Exhibition Show at AmericanAssociation of ClinicalChemistry (AACC) 2005- Approved an ISO

    13485:2003 by TUVSUD(DNA kit & analyzer)- CE Certification for BMTHPV 9G DNA Kit- Exhibition Show at MEDICA2009(Germany, Dusseldorf)

    2010 Jan 2010Feb 2010Apr 2010Apr 2010

    - Approval of specification andtest methods for BMT HPV 9GDNA Kit (KFDA)- Approval of Korean VentureCompany by KIBO- CE Certification for BMTHPV 9G MEMBRANEN DNAKit

  • 8/7/2019 nari dacment

    14/14