Professional Documents
Culture Documents
Introduction To Bio Metrics
Introduction To Bio Metrics
Outline
1.
2. 3.
4.
5.
The Basics Biometric Technologies Multi-model Biometrics Performance Metrics Biometric Applications
What is Biometrics?
The automated use behavioral and physiological characteristics to determine or veiry an identity.
Rapid!
Know
Be
Have
Safety deposit boxes and vaults Bank transaction like ATM withdrawals Access to computers and emails Credit Card purchase Purchase of house, car, clothes or jewellery Getting official documents like birth certificates or passports Obtaining court papers Drivers licence Getting into confidential workplace writing Checks
To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties To prevent fraudulent acts like faking ID badges or licenses. To ensure safety and security, thus decrease crime rates
Captured biometric signatures come from a set of known biometric feature stored in the system.
Types of Biometrics
Fingerprint Face Recognition Session III Hand Geometry Iris Scan Voice Scan Session II Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA
Biometrics
2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics
Fingerprint
Hand Geometry
Captured using a CCD camera, or LED Orthographic Scanning Recognition Systems Crossover = 0.1%
IrisCode
Face
Principal Component Analysis
Desired Properties
Universality Uniqueness Permanence Collectability Performance Users Accpetability Robustness against Circumvention
Comparison
Biometric Type Fingerprint Hand Geometry Voice Retina Iris Signature Face Accuracy High Medium Medium High Medium Medium Low Ease of Use Medium High High Low Medium Medium High User Acceptance Low Medium High Low Medium High High
Multimodal Biometrics
Classifiers
Negotiator
Threshold
Biometrics
Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc
Data Rep.
1D (wav), 2D (bmp, tiff, png)
Feature Vectors
Scores
Enrolment Submission
Training
Accept/ Reject
AND
Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool
Abstraction
Negotiation
Diff. Combination Strategies. e.g. Boosting, Bayesian
Cl-q Ex-q
Basic Operators
Signal Processing, Image Procesing
Data Representation
Biometrics
1D
Voice, signature acoustics
2D
Face, Fingerprint, Iris, Hand Geometry, etc.
3D
Face
Operants 1 1 cWaveObject
Dcision
Identit
Voix
Frquence
Transformation de londelette
Temps
yti snetnI
yti snetnI
001
051
002
052
ela cS ye rG
04
03
02
01
05 -
Extraction
w1
Accepter, Rejeter
Confusion Matrix FAR and FRR Distributed Analysis Threshold Analysis Receiver Operating Curve
A Few Definitions
FAR Total False Acceptence Total False Attempts
Total False Rejection Total True Attempts FRR
Distribution Analysis
Threshold Analysis
Minimum cost
Combined MLP
Section V: Applications
Biometric Applications
Identification or Authentication (Scalability)? Semi-automatic or automatic? Subjects cooperative or not? Storage requirement constraints? User acceptability?
Application by Technologies
Biometrics
Fingerprint
Vendors
Market Share
34%
Applications
Law enforcement; civil government; enterprise security; medical and financial transactions Time and attendance systems, physical access Transaction authentication; picture ID duplication prevention; surveillance Security, V-commerce Banking, access control
90
12
26% 15%
32 1
11% 9%
Commercial Products
The Eye Eye-Dentify IriScan Sensar Iridian The Fingerprint Identix BioMouse The FingerChip Veridicom
The Voice iNTELLiTRAK QVoice VoicePrint Nuance Behavioral BioPassword CyberSign PenOp
Main Reference
[Brunelli et al, 1995] R. Brunelli, and D. Falavigna, "Personal identification using multiple cues," IEEE Trans. on Pattern
Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955-966, 1995
[Bigun, 1997] Bigun, E.S., J. Bigun, Duc, B.: Expert conciliation for multi modal person authentication systems by Bayesian
statistics, In Proc. 1st Int. Conf. On Audio Video-Based Personal Authentication, pp. 327-334, Crans-Montana, Switzerland, 1997
[Dieckmann et al, 1997] Dieckmann, U., Plankensteiner, P., and Wagner, T.: SESAM: A biometric person identification
system using sensor fusion, In Pattern Recognition Letters, Vol. 18, No. 9, pp. 827-833, 1997
[Kittler et al, 1997] Kittler, J., Li, Y., Matas, J. and Sanchez, M. U.: Combining evidence in multi-modal personal identity
recognition systems, In Proc. 1st International Conference On Audio Video-Based Personal Authentication, pp. 327-344, Crans-Montana, Switzerland, 1997
[Maes and Beigi, 1998] S. Maes and H. Beigi, "Open sesame! Speech, password or key to secure your door?", In Proc. 3
Asian Conference on Computer Vision, pp. 531-541, Hong Kong, China, 1998
rd
[Jain et al, 1999] Jain, A., Bolle, R., Pankanti, S.: BIOMETRICS: Personal identification in networked society, 2
Kluwer Academic Publishers (1999)
nd
Printing,
[Gonzalez, 1993] Gonzalez, R., and Woods, R. : "Digital Image Processing", 2nd edition, Addison-Wesley, 1993.