Introduction to Biometric lectures... Prepared by Dr.Abbas

43
Assistant Prof. Assistant Prof. Dr.Abbas H. Alasadi Dr.Abbas H. Alasadi Email : [email protected] Email : [email protected]

Transcript of Introduction to Biometric lectures... Prepared by Dr.Abbas

Page 1: Introduction to Biometric lectures... Prepared by Dr.Abbas

Assistant Prof. Dr.Abbas H. Assistant Prof. Dr.Abbas H. AlasadiAlasadi

Email : [email protected] : [email protected]

Page 2: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 22

Course SyllabusCourse Syllabus

1. Introduction to Biometrics

2. Fingerprint Recognition

3. Face Recognition

4. Iris Recognition

5. Hand Geometry Recognition

6. Gait Recognition

7. The Ear as a Biometric

Page 3: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 33

Course SyllabusCourse Syllabus

8. Voice Biometrics

9. A Palmprint Authentication System

10.On-Line Signature Verification

11.Hand Vascular Pattern Technology

12.Introduction to Multibiometrics

13.Biometric System Security

14.Biometrics databases

Page 4: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 44

Introduction to BiometricsIntroduction to Biometrics

The term “biometrics” is derived from the

Greek words “bio” (life) and “metrics” (to

measure). Automated biometric systems have

only become available over the last few

decades, due to significant advances in the

field of computer processing.

Many of these new automated techniques,

however, are based on ideas that were

originally conceived hundreds, even

thousands of years ago.

Page 5: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 55

Introduction to BiometricsIntroduction to Biometrics

One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face.

Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals.

This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities.

Page 6: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 66

Introduction to BiometricsIntroduction to Biometrics

The concept of human recognition is also

seen in behavioral-predominant biometrics

such as speaker and gait recognition.

Individuals use these characteristics,

somewhat unconsciously, to recognize known

individuals on a day-to-day basis.

Other characteristics have also been used

throughout the history of civilization as a

more formal means of recognition.

Page 7: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 77

Introduction to BiometricsIntroduction to Biometrics Some examples are:

• In a cave estimated to be at least 31,000

years old, the walls are decorated with

paintings believed to be created by

prehistoric men who lived there. Surrounding

these paintings are numerous handprints that

are felt to “have…acted as an un-forgeable

signature” of its originator.

Page 8: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 88

Introduction to BiometricsIntroduction to Biometrics

• There is also evidence that fingerprints were used as a person’s mark as early as 500 B.C. “Babylonian business transactions are recorded in clay tablets that include fingerprints.”

• Joao de Barros, a Spanish explorer and writer, wrote that early Chinese merchants used fingerprints to settle business transactions. Chinese parents also used fingerprints and footprints to differentiate children from one another.

Page 9: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 99

Introduction to BiometricsIntroduction to Biometrics

• In early Egyptian history, traders were

identified by their physical descriptors to

differentiate between trusted traders of

known reputation and previous successful

transactions, and those new to the market.

Page 10: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1010

History of BiometricsHistory of Biometrics

By the mid-1800s, with the rapid growth of

cities due to the industrial revolution and

more productive farming, there was a

formally recognized need to identify people.

Merchants and authorities were faced with

increasingly larger and more mobile

populations and could no longer rely solely

on their own experiences and local

knowledge.

Page 11: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1111

History of BiometricsHistory of Biometrics

Influenced by the writings of Jeremy Betham

and other Utilitarian thinkers, the courts of

this period began to codify concepts of justice

that endure with us to this day. Most notably,

justice systems sought to treat first time

offenders more leniently and repeat offenders

more harshly.

Page 12: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1212

History of BiometricsHistory of Biometrics

This created a need for a formal system that

recorded offenses along with measured identity

traits of the offender. The first of two

approaches was the Bertillon system of

measuring various body dimensions, which

originated in France. These measurements were

written on cards that could be sorted by height,

arm length or any other parameter. This field

was called anthropometrics.

Page 13: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1313

History of BiometricsHistory of Biometrics

The other approach was the formal use of

fingerprints by police departments. This

process emerged in South America, Asia, and

Europe.

By the late 1800s a method was developed to

index fingerprints that provided the ability to

retrieve records as Bertillon’s method did but

that was based on a more individualized

metric – fingerprint patterns and ridges.

Page 14: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1414

History of BiometricsHistory of Biometrics

The first such robust system for indexing

fingerprints was developed in India by Azizul

Haque for Edward Henry, Inspector General

of Police, Bengal, India. This system, called

the Henry System, and variations on it are

still in use for classifying fingerprints.

Page 15: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1515

History of BiometricsHistory of Biometrics

True biometric systems began to emerge in

the latter half of the twentieth century,

coinciding with the emergence of computer

systems.

The nascent field experienced an explosion of

activity in the 1990s and began to surface in

everyday applications in the early 2000s.

Page 16: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1616

Overview of BiometricsOverview of Biometrics

“Biometrics” is a general term used alternatively to describe a characteristic or a process.As a characteristic:1. A measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition.As a process:1.Automated methods of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics.

Page 17: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1717

Overview of BiometricsOverview of Biometrics

Biometric systems have been researched and

tested for a few decades, but have only

recently entered into the public consciousness

because of high profile applications, usage in

entertainment media (though often not

realistically) and increased usage by the public

in day-to-day activities.

Page 18: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1818

Overview of BiometricsOverview of Biometrics

Example

deployments within the United States

Government include the FBI’s Integrated

Automated Fingerprint Identification System

(IAFIS), the US-VISIT program, the Transportation

Workers Identification Credentials (TWIC)

program, and the Registered Traveler (RT)

program

Page 19: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 1919

Overview of BiometricsOverview of Biometrics

Many companies are also implementing

biometric technologies to secure areas,

maintain time records, and enhance user

convenience.

For example, for many years Disney World has

employed biometric devices for season ticket

holders to accelerate and simplify the process

of entering its parks, while ensuring that the

ticket is used only by the individual to whom it

was issued.

Page 20: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 2020

Overview of BiometricsOverview of Biometrics

A typical biometric system is comprised of five

integrated components:

1.A sensor is used to collect the data and convert

the information to a digital format.

2.Signal processing algorithms perform quality

control activities and develop the biometric

template.

3.A data storage component keeps information

that new biometric templates will be compared

to.

Page 21: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 2121

Overview of BiometricsOverview of Biometrics

4.A matching algorithm compares the new

biometric template to one or more templates

kept in data storage.

5.Finally, a decision process uses the results

from the matching component to make a

system-level decision.

Page 22: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 2222

SensorsSensors

Recording & converting biometric traits to computer usable data ,sensors sensors are needed. e.g.. Fingerprint verification.

Page 23: Introduction to Biometric lectures... Prepared by Dr.Abbas

Lecture 1 Lecture 1 Pages Pages 2323

Biometric ModalitiesBiometric Modalities Commonly implemented or studied biometric

modalities include fingerprint, face, iris, voice, signature and hand geometry... etc. Many other modalities are in various stages of development and assessment.

There is not one biometric modality that is best for all implementations.

Many factors must be taken into account when implementing a biometric device including location, security risks, task (identification or verification), expected number of users, user circumstances, existing data, etc.

Page 24: Introduction to Biometric lectures... Prepared by Dr.Abbas

Characteristics of Biometrics

1. Universality Universality: Every person should possess this

characteristic In practice, this may not be the case Otherwise, population of nonuniversality must be

small < 1%

Lecture 1 Pages Lecture 1 Pages 2424

Page 25: Introduction to Biometric lectures... Prepared by Dr.Abbas

Characteristics of Biometrics

2. Uniqueness Uniqueness: No two individuals possess the same

characteristic. Genotypical – Genetically linked (e.g. identical twins

will have same biometric) Phenotypical – Non-genetically linked, different

perhaps even on same individual Establishing uniqueness is difficult to prove analytically May be unique, but “uniqueness” must be

distinguishable

Lecture 1 Pages Lecture 1 Pages 2525

Page 26: Introduction to Biometric lectures... Prepared by Dr.Abbas

Characteristics of Biometrics

3. Permanence Permanence: The characteristic does not change in

time, that is, it is time invariant At best this is an approximation Degree of permanence has a major impact on the

system design and long term operation of biometrics. (e.g. enrollment, adaptive matching design, etc.)

Long vs. short-term stability

Lecture 1 Pages Lecture 1 Pages 2626

Page 27: Introduction to Biometric lectures... Prepared by Dr.Abbas

Characteristics of Biometrics

4. Collectability Collectability: The characteristic can be quantitatively

measured. In practice, the biometric collection must be:

Non-intrusive Reliable and robust Cost effective for a given application

Lecture 1 Pages Lecture 1 Pages 2727

Page 28: Introduction to Biometric lectures... Prepared by Dr.Abbas

Biometrics TodayBiometrics Today

VoiceInfrared Facial and Hand Vein ThermogramsFingerprintsFaceIrisEarGaitKeystroke DynamicsDNASignatureOdorRetinal ScanHand and Finger Geometry

Lecture 1 Lecture 1 Pages Pages 2828

Page 29: Introduction to Biometric lectures... Prepared by Dr.Abbas

IDENTIFICATIONIDENTIFICATION

Search a sample against a database of templates.

Typical application: identifying fingerprints

?

Lecture 1 Lecture 1 Pages Pages 2929

Page 30: Introduction to Biometric lectures... Prepared by Dr.Abbas

VERIFICATIONVERIFICATION

Compare a sample against a single stored template

Typical application: voice lock

?

Lecture 1 Lecture 1 Pages Pages 3030

Page 31: Introduction to Biometric lectures... Prepared by Dr.Abbas

Practical ApplicationsPractical Applications

FACE RECOGNITION HAND-GEOMETRY

FINGER-PRINT

IRIS RECOGNITION

Lecture 1 Lecture 1 Pages Pages 3131

Page 32: Introduction to Biometric lectures... Prepared by Dr.Abbas

APPLICATIONSAPPLICATIONS

Physical access control of, for example, an airport. Here the airport infrastructure, or travel infrastructure in general, is the application.

Logical access control of, for example, a bank account; i.e., the application is the access to and the handling of money.

Ensuring uniqueness of individuals. Here the focus is typically on preventing double enrollment in some application, for example, a social benefits program.

Security– authentication Forensic sciences– individualization

Lecture 1 Lecture 1 Pages Pages 3232

Page 33: Introduction to Biometric lectures... Prepared by Dr.Abbas

APPLICATIONSAPPLICATIONS

Lecture 1 Lecture 1 Pages Pages 3333

Page 34: Introduction to Biometric lectures... Prepared by Dr.Abbas

Finger-scanFinger-scan

A live acquisition of a person’s fingerprint.

Image Acquisition Image Processing Template Creation Template Matching

Acquisition Devices: Glass plate Electronic Ultrasound

Lecture 1 Lecture 1 Pages Pages 3434

Page 35: Introduction to Biometric lectures... Prepared by Dr.Abbas

FEATURESFEATURES

Strengths: don’t change over time Unique Weaknesses: Scars

Attacks: Finger Decapitation “Gummy fingers” Corruption of the database Surgery to alter

Lecture 1 Lecture 1 Pages Pages 3535

Page 36: Introduction to Biometric lectures... Prepared by Dr.Abbas

Iris ScanIris Scan

Image Acquisition Image Processing Template Creation Template Matching

Uses to date: Physical access

control Computer

authentication

Lecture 1 Lecture 1 Pages Pages 3636

Page 37: Introduction to Biometric lectures... Prepared by Dr.Abbas

FEATURESFEATURES

Strengths: 300+ characteristics; 200 required for

match Weaknesses:

Fear Discomfort Algorithms may not work on all individuals No large databases

Attacks: Surgery (Minority Report )

Lecture 1 Lecture 1 Pages Pages 3737

Page 38: Introduction to Biometric lectures... Prepared by Dr.Abbas

Hand ScanHand Scan

Typical systems measure 90 different features: Overall hand and finger

width Distance between joints Bone structure

Strengths: Reasonably robust systems

Weaknesses: Accuracy is limited; Bulky scanner

Lecture 1 Lecture 1 Pages Pages 3838

Page 39: Introduction to Biometric lectures... Prepared by Dr.Abbas

DNA IDENTIFICATIONDNA IDENTIFICATION

Widely accepted for crime scenes

Twin problem

Lecture 1 Lecture 1 Pages Pages 3939

Page 40: Introduction to Biometric lectures... Prepared by Dr.Abbas

Template SizeTemplate Size

BiometricBiometric Appr. Template SizeAppr. Template Size

VoiceVoice 70k – 80k70k – 80k

FaceFace 84 bytes – 2k84 bytes – 2k

SignatureSignature 500 – 1000 bytes500 – 1000 bytes

FingerprintFingerprint 256 bytes – 1.2k256 bytes – 1.2k

Hand GeometryHand Geometry 9 bytes9 bytes

IrisIris 256 – 512 bytes256 – 512 bytes

RetinaRetina 96 bytes96 bytes

Lecture 1 Lecture 1 Pages Pages 4040

Page 41: Introduction to Biometric lectures... Prepared by Dr.Abbas

2003 comparative share2003 comparative share

Fi nger Scan52. 1%

Keystroke Scan0. 3%

Faci al Scan11. 4% Hand Scan

10. 0%

Mi ddl eware12. 4%

I ri s Scan7. 3%

Voi ce Scan4. 1%

Si gnature Scan2. 4%

Lecture 1 Lecture 1 Pages Pages 4141

Page 42: Introduction to Biometric lectures... Prepared by Dr.Abbas

CONCLUSIONCONCLUSION

Trust in these electronic transactions is essential to the healthy growth of the global economy.

Finger scan, voice authentication and signature verification are the three fastest-growing segments .Imagine a secure world without passwords.

Lecture 1 Lecture 1 Pages Pages 4242

Page 43: Introduction to Biometric lectures... Prepared by Dr.Abbas

Thank you

Lecture 1 Lecture 1 Pages Pages 4343