Introduction to Biometric lectures... Prepared by Dr.Abbas
-
Upload
abbas-hassin -
Category
Education
-
view
1.261 -
download
2
Transcript of Introduction to Biometric lectures... Prepared by Dr.Abbas
Assistant Prof. Dr.Abbas H. Assistant Prof. Dr.Abbas H. AlasadiAlasadi
Email : [email protected] : [email protected]
Lecture 1 Lecture 1 Pages Pages 22
Course SyllabusCourse Syllabus
1. Introduction to Biometrics
2. Fingerprint Recognition
3. Face Recognition
4. Iris Recognition
5. Hand Geometry Recognition
6. Gait Recognition
7. The Ear as a Biometric
Lecture 1 Lecture 1 Pages Pages 33
Course SyllabusCourse Syllabus
8. Voice Biometrics
9. A Palmprint Authentication System
10.On-Line Signature Verification
11.Hand Vascular Pattern Technology
12.Introduction to Multibiometrics
13.Biometric System Security
14.Biometrics databases
Lecture 1 Lecture 1 Pages Pages 44
Introduction to BiometricsIntroduction to Biometrics
The term “biometrics” is derived from the
Greek words “bio” (life) and “metrics” (to
measure). Automated biometric systems have
only become available over the last few
decades, due to significant advances in the
field of computer processing.
Many of these new automated techniques,
however, are based on ideas that were
originally conceived hundreds, even
thousands of years ago.
Lecture 1 Lecture 1 Pages Pages 55
Introduction to BiometricsIntroduction to Biometrics
One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face.
Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals.
This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities.
Lecture 1 Lecture 1 Pages Pages 66
Introduction to BiometricsIntroduction to Biometrics
The concept of human recognition is also
seen in behavioral-predominant biometrics
such as speaker and gait recognition.
Individuals use these characteristics,
somewhat unconsciously, to recognize known
individuals on a day-to-day basis.
Other characteristics have also been used
throughout the history of civilization as a
more formal means of recognition.
Lecture 1 Lecture 1 Pages Pages 77
Introduction to BiometricsIntroduction to Biometrics Some examples are:
• In a cave estimated to be at least 31,000
years old, the walls are decorated with
paintings believed to be created by
prehistoric men who lived there. Surrounding
these paintings are numerous handprints that
are felt to “have…acted as an un-forgeable
signature” of its originator.
Lecture 1 Lecture 1 Pages Pages 88
Introduction to BiometricsIntroduction to Biometrics
• There is also evidence that fingerprints were used as a person’s mark as early as 500 B.C. “Babylonian business transactions are recorded in clay tablets that include fingerprints.”
• Joao de Barros, a Spanish explorer and writer, wrote that early Chinese merchants used fingerprints to settle business transactions. Chinese parents also used fingerprints and footprints to differentiate children from one another.
Lecture 1 Lecture 1 Pages Pages 99
Introduction to BiometricsIntroduction to Biometrics
• In early Egyptian history, traders were
identified by their physical descriptors to
differentiate between trusted traders of
known reputation and previous successful
transactions, and those new to the market.
Lecture 1 Lecture 1 Pages Pages 1010
History of BiometricsHistory of Biometrics
By the mid-1800s, with the rapid growth of
cities due to the industrial revolution and
more productive farming, there was a
formally recognized need to identify people.
Merchants and authorities were faced with
increasingly larger and more mobile
populations and could no longer rely solely
on their own experiences and local
knowledge.
Lecture 1 Lecture 1 Pages Pages 1111
History of BiometricsHistory of Biometrics
Influenced by the writings of Jeremy Betham
and other Utilitarian thinkers, the courts of
this period began to codify concepts of justice
that endure with us to this day. Most notably,
justice systems sought to treat first time
offenders more leniently and repeat offenders
more harshly.
Lecture 1 Lecture 1 Pages Pages 1212
History of BiometricsHistory of Biometrics
This created a need for a formal system that
recorded offenses along with measured identity
traits of the offender. The first of two
approaches was the Bertillon system of
measuring various body dimensions, which
originated in France. These measurements were
written on cards that could be sorted by height,
arm length or any other parameter. This field
was called anthropometrics.
Lecture 1 Lecture 1 Pages Pages 1313
History of BiometricsHistory of Biometrics
The other approach was the formal use of
fingerprints by police departments. This
process emerged in South America, Asia, and
Europe.
By the late 1800s a method was developed to
index fingerprints that provided the ability to
retrieve records as Bertillon’s method did but
that was based on a more individualized
metric – fingerprint patterns and ridges.
Lecture 1 Lecture 1 Pages Pages 1414
History of BiometricsHistory of Biometrics
The first such robust system for indexing
fingerprints was developed in India by Azizul
Haque for Edward Henry, Inspector General
of Police, Bengal, India. This system, called
the Henry System, and variations on it are
still in use for classifying fingerprints.
Lecture 1 Lecture 1 Pages Pages 1515
History of BiometricsHistory of Biometrics
True biometric systems began to emerge in
the latter half of the twentieth century,
coinciding with the emergence of computer
systems.
The nascent field experienced an explosion of
activity in the 1990s and began to surface in
everyday applications in the early 2000s.
Lecture 1 Lecture 1 Pages Pages 1616
Overview of BiometricsOverview of Biometrics
“Biometrics” is a general term used alternatively to describe a characteristic or a process.As a characteristic:1. A measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition.As a process:1.Automated methods of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics.
Lecture 1 Lecture 1 Pages Pages 1717
Overview of BiometricsOverview of Biometrics
Biometric systems have been researched and
tested for a few decades, but have only
recently entered into the public consciousness
because of high profile applications, usage in
entertainment media (though often not
realistically) and increased usage by the public
in day-to-day activities.
Lecture 1 Lecture 1 Pages Pages 1818
Overview of BiometricsOverview of Biometrics
Example
deployments within the United States
Government include the FBI’s Integrated
Automated Fingerprint Identification System
(IAFIS), the US-VISIT program, the Transportation
Workers Identification Credentials (TWIC)
program, and the Registered Traveler (RT)
program
Lecture 1 Lecture 1 Pages Pages 1919
Overview of BiometricsOverview of Biometrics
Many companies are also implementing
biometric technologies to secure areas,
maintain time records, and enhance user
convenience.
For example, for many years Disney World has
employed biometric devices for season ticket
holders to accelerate and simplify the process
of entering its parks, while ensuring that the
ticket is used only by the individual to whom it
was issued.
Lecture 1 Lecture 1 Pages Pages 2020
Overview of BiometricsOverview of Biometrics
A typical biometric system is comprised of five
integrated components:
1.A sensor is used to collect the data and convert
the information to a digital format.
2.Signal processing algorithms perform quality
control activities and develop the biometric
template.
3.A data storage component keeps information
that new biometric templates will be compared
to.
Lecture 1 Lecture 1 Pages Pages 2121
Overview of BiometricsOverview of Biometrics
4.A matching algorithm compares the new
biometric template to one or more templates
kept in data storage.
5.Finally, a decision process uses the results
from the matching component to make a
system-level decision.
Lecture 1 Lecture 1 Pages Pages 2222
SensorsSensors
Recording & converting biometric traits to computer usable data ,sensors sensors are needed. e.g.. Fingerprint verification.
Lecture 1 Lecture 1 Pages Pages 2323
Biometric ModalitiesBiometric Modalities Commonly implemented or studied biometric
modalities include fingerprint, face, iris, voice, signature and hand geometry... etc. Many other modalities are in various stages of development and assessment.
There is not one biometric modality that is best for all implementations.
Many factors must be taken into account when implementing a biometric device including location, security risks, task (identification or verification), expected number of users, user circumstances, existing data, etc.
Characteristics of Biometrics
1. Universality Universality: Every person should possess this
characteristic In practice, this may not be the case Otherwise, population of nonuniversality must be
small < 1%
Lecture 1 Pages Lecture 1 Pages 2424
Characteristics of Biometrics
2. Uniqueness Uniqueness: No two individuals possess the same
characteristic. Genotypical – Genetically linked (e.g. identical twins
will have same biometric) Phenotypical – Non-genetically linked, different
perhaps even on same individual Establishing uniqueness is difficult to prove analytically May be unique, but “uniqueness” must be
distinguishable
Lecture 1 Pages Lecture 1 Pages 2525
Characteristics of Biometrics
3. Permanence Permanence: The characteristic does not change in
time, that is, it is time invariant At best this is an approximation Degree of permanence has a major impact on the
system design and long term operation of biometrics. (e.g. enrollment, adaptive matching design, etc.)
Long vs. short-term stability
Lecture 1 Pages Lecture 1 Pages 2626
Characteristics of Biometrics
4. Collectability Collectability: The characteristic can be quantitatively
measured. In practice, the biometric collection must be:
Non-intrusive Reliable and robust Cost effective for a given application
Lecture 1 Pages Lecture 1 Pages 2727
Biometrics TodayBiometrics Today
VoiceInfrared Facial and Hand Vein ThermogramsFingerprintsFaceIrisEarGaitKeystroke DynamicsDNASignatureOdorRetinal ScanHand and Finger Geometry
Lecture 1 Lecture 1 Pages Pages 2828
IDENTIFICATIONIDENTIFICATION
Search a sample against a database of templates.
Typical application: identifying fingerprints
?
Lecture 1 Lecture 1 Pages Pages 2929
VERIFICATIONVERIFICATION
Compare a sample against a single stored template
Typical application: voice lock
?
Lecture 1 Lecture 1 Pages Pages 3030
Practical ApplicationsPractical Applications
FACE RECOGNITION HAND-GEOMETRY
FINGER-PRINT
IRIS RECOGNITION
Lecture 1 Lecture 1 Pages Pages 3131
APPLICATIONSAPPLICATIONS
Physical access control of, for example, an airport. Here the airport infrastructure, or travel infrastructure in general, is the application.
Logical access control of, for example, a bank account; i.e., the application is the access to and the handling of money.
Ensuring uniqueness of individuals. Here the focus is typically on preventing double enrollment in some application, for example, a social benefits program.
Security– authentication Forensic sciences– individualization
Lecture 1 Lecture 1 Pages Pages 3232
APPLICATIONSAPPLICATIONS
Lecture 1 Lecture 1 Pages Pages 3333
Finger-scanFinger-scan
A live acquisition of a person’s fingerprint.
Image Acquisition Image Processing Template Creation Template Matching
Acquisition Devices: Glass plate Electronic Ultrasound
Lecture 1 Lecture 1 Pages Pages 3434
FEATURESFEATURES
Strengths: don’t change over time Unique Weaknesses: Scars
Attacks: Finger Decapitation “Gummy fingers” Corruption of the database Surgery to alter
Lecture 1 Lecture 1 Pages Pages 3535
Iris ScanIris Scan
Image Acquisition Image Processing Template Creation Template Matching
Uses to date: Physical access
control Computer
authentication
Lecture 1 Lecture 1 Pages Pages 3636
FEATURESFEATURES
Strengths: 300+ characteristics; 200 required for
match Weaknesses:
Fear Discomfort Algorithms may not work on all individuals No large databases
Attacks: Surgery (Minority Report )
Lecture 1 Lecture 1 Pages Pages 3737
Hand ScanHand Scan
Typical systems measure 90 different features: Overall hand and finger
width Distance between joints Bone structure
Strengths: Reasonably robust systems
Weaknesses: Accuracy is limited; Bulky scanner
Lecture 1 Lecture 1 Pages Pages 3838
DNA IDENTIFICATIONDNA IDENTIFICATION
Widely accepted for crime scenes
Twin problem
Lecture 1 Lecture 1 Pages Pages 3939
Template SizeTemplate Size
BiometricBiometric Appr. Template SizeAppr. Template Size
VoiceVoice 70k – 80k70k – 80k
FaceFace 84 bytes – 2k84 bytes – 2k
SignatureSignature 500 – 1000 bytes500 – 1000 bytes
FingerprintFingerprint 256 bytes – 1.2k256 bytes – 1.2k
Hand GeometryHand Geometry 9 bytes9 bytes
IrisIris 256 – 512 bytes256 – 512 bytes
RetinaRetina 96 bytes96 bytes
Lecture 1 Lecture 1 Pages Pages 4040
2003 comparative share2003 comparative share
Fi nger Scan52. 1%
Keystroke Scan0. 3%
Faci al Scan11. 4% Hand Scan
10. 0%
Mi ddl eware12. 4%
I ri s Scan7. 3%
Voi ce Scan4. 1%
Si gnature Scan2. 4%
Lecture 1 Lecture 1 Pages Pages 4141
CONCLUSIONCONCLUSION
Trust in these electronic transactions is essential to the healthy growth of the global economy.
Finger scan, voice authentication and signature verification are the three fastest-growing segments .Imagine a secure world without passwords.
Lecture 1 Lecture 1 Pages Pages 4242
Thank you
Lecture 1 Lecture 1 Pages Pages 4343