User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

16
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha
  • date post

    22-Dec-2015
  • Category

    Documents

  • view

    224
  • download

    2

Transcript of User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Page 1: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

User Verification System

by

William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe

Client

Dr.Cha

Page 2: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Aim:

To improve confidence level by hybridizing multiple biometrics such as Face, Finger print, Handwriting, Hand geometry, Iris and Voice.

Confidence Level: Percentage of correct answers, valid user accepted and invalid user rejected.

To reduce false positive and false negative errors :- valid user rejected - invalid user accepted

Page 3: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Types of Biometrics decided for this project experiment:

• Face

• Handwriting

• Voice

• Finger print

Page 4: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

biomouse Fingerprint

scanner

DigitalCamera

LCD Pentablet Microphone

Multi-modality Biometric AuthenticationMulti-modality Biometric Authentication

Embeded & Hybrid User Verification

system

System that requires user verification

Page 5: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Hand Writing features:

• Width• Height• Drag count• Total stroke time • Total stroke distance• Stroke direction sequence string• Acceleration

Tools used:

LCD Pen Tablet for data collection

Java application for feature extraction

Page 6: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Each person writes differently.

Page 7: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Face Recognition:

• Photos collected have to be properly sized and also be gray scale.

• Eigen face technology is used to calculate the mean face/value

• Recognition is done using Nearest Neighbor method.

Tools Used:

• Digital Camera for data collection

• Mathworks’ Matlab for training and recognition

Page 8: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Each person has different faces.

Page 9: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

?Query

Face DB

Face Recognition SystemFace Recognition System

Page 10: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

width, length

User 1

User 2

User1 s1 = ( 12 , 16 )

User1 s2 = ( 11 , 20 )

User2 s1 = ( 9 , 8 )

User2 s2 = ( 10 , 7 )

Truth features

MeasurementsMeasurements

Page 11: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

slant

width

user1

user2

= user1?

Nearest Neighbor ClassifierNearest Neighbor Classifier

too slow for users to wait for the output.

Page 12: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Data Acquisition

Feature Extraction

Training an ANN

Classification System

Handwriting Done Done - -

Face Done ** ** **

Voice Done - - -

Finger print - - - -

Modality

Steps

Project Status

** - Eigen face and nearest neighbor methods used.

Page 13: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Advantages:

• Higher accuracy of determining an individual

• Reliable by having multiple recognition techniques or biometrics

• Increased security in companies

• Reduced amount of time to identify a suspect or criminal for law enforcement

• Difficult to challenge the system by forging names and mimicking voices making it virtually impossible to pass as someone else

• Possible use in a court of law to prove criminal cases

• Low maintenance software

Page 14: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Future Plan:

Handwriting training and classification.

Voice feature extraction methods

Finger print data collection

Page 15: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Demonstration

Handwriting

Face Recognition

Page 16: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Sub-classing with Java1. Data Collection Module

VoiceCollector.c lass HandW ritingCollector.c lass FaceCollector.c lass

DataCollector.c lassABST RACT

2. Feature Exctration Module

VoiceExtractor.c lass HandW ritingExtractor.c lass FaceExtractor.c lass

FeatureExtractor.classABST RACT