Professional Documents
Culture Documents
Biometrics: Dr. Sheryl Brahnam Cis Department Missouri State University
Biometrics: Dr. Sheryl Brahnam Cis Department Missouri State University
Something
Automatic Identification
Possession based
Knowledge-based
Biometric-based
Business Costs
The average adult working in a
large business has 12 passwords to remember And spends nearly a week in every year logging into systems.
Business Costs
The average cost to a large company for every password lost is $16.
industry (see The Hacker Economy, InformationWeek, February 12, 2007) While theft goes up, use goes down
10.2 10 9.8 9.6 9.4 9.2 9 8.8 8.6 8.4 8.2 2003 2005 2006 2005 9.3 million $54.4 billion total loss $5,885 average loss 2003 10.1 million $53.2 billion total loss $5,249 average loss
2006 8.9 million $56.6 billion total loss $6,383 average loss
compromised in last 3 years But use of identities is going down Identity information is being stock-piled-bought and sold as an asset on the Internet Your identity today is the same 5 years from now
number, address, social security number, home address, and birth date
Data from Trend Micro
Why Biometrics?
Why Biometrics?
Biometrics
analysis of biological data Biometric system a pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric)
Biometrics Systems
Enrollment
Enrollment
Verification
Verification: Am I who I claim to be? One to one comparison
Identification
Identification: Who am I?
Determine if identity claim is true Identify: Determine if the person is already enrolled in the system Vulnerability: Susceptibility of the machine to being tricked:
Possible Biometrics
Biological traces
DNA (DeoxyriboNucleic Acid), blood, saliva, etc. Biological (physiological) characteristics fingerprints, eye irises and retinas, hand palms and geometry, and facial geometry
Possible Biometrics
Behavioral characteristics
Behavioral
Dynamic Signature
Fingerprints
Babylon, fingerprints were used on clay tablets for business transactions. 300 B.C. - Emperors of China used personalized clay seals 220 A.D. - The first time ink prints were used was in china
of the Hooghly district in Jungipoor, India, first used fingerprints on native contracts. 1880 - Dr. Henry Faulds published an article in the Scientific Journal, "Nautre" (nature) discussed:
fingerprints as a means of personal identification, use of printers ink as a way of obtaining them.
"Fingerprints
Establish the individuality and permanence of fingerprints. Included the first classification system for fingerprints.
Fingerprints (Uses)
Fingerprint Systems
Thermic Systems (heat) Capacitive Systems (electrical charge)
Fingerprint Features
Hand Shape
Palm
Iris
Iris Code
Comparing Irises
Different IrisCodes are
Retina
Every eye has its own totally unique pattern of blood vessels
Face Recognition
Other Problems
M. A. Turk and A. P. Pentland, "Face recognition using eigenfaces," presented at IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Silver Spring, Md, 1991.
A. J. O'Toole, H. Abdi, K. A. Deffenbacher, and J. C. Bartlett, "Classifying faces by race and sex using an autoassociative memory trained for recognition," presented at Proceedings of the 13th Annual Conference on Cognitive Science, 1991.
Age
D. Valentin, H. Abdi, A. J. O'Toole, and G. W. Cottrell, "Connectionist models of face processing: A survey," Pattern Recognition, vol. 27, pp. 1209-30, 1994.
G. W. Cottrell and J. Metcalfe, "EMPATH: Face, emotion, and gender recognition using holons," in Advances in neural information processing systems, D. Touretzky, Ed. San Mateo: Morgan & Kaufman, 1991, pp. 564-71.
PCA Process
Original Images
Eigenvectors
PCA Process
Eigenvectors (they are face like)
a multidimensional space
space and find the closes point (face) to it. If it is close enough, call it a match
- 5% cannot provide good Fingerprint Cost - Cheaper than Iris Detection (movement)
Intra-class variability
Inter-class similarity
Identical Twins
Temporal Variations
Noisy Images
More Problems
Different types of fraud Loopholes: illegitimate access not envisaged
by the designers
More Problems
Inherent in the means and mechanisms of
Collusion; misuse of super operator status Coercion; forcibly extract biometric from a user Denial; user denies access after gaining the access Covert Acquisition; video snooping
Biometric Applications
Applications
Access Control
Lisbon won the technology innovation award for developing a payment system in which gasoline-station customers can settle their bills simply by pressing a thumb against a glass pad. Scanning technology identifies the thumbprint and sends the customer's identification information into Galp's backoffices system for payment authorization.
THE WALL STREET JOURNAL, November 15, 2004
New Passports
Application Characteristics
Overt vs Covert Attended vs Unattended Cooperative vs Non-cooperative
Scalable vs Non-scalable
Private vs Public Reduce vs Eliminate fraud
(Ethical) Questions?
Biometrics and BI
International Biometric Group