biometrics cubs, university at buffalo govind/cse717 [email protected]

of 31 /31
Biometrics CUBS, University at Buffalo http://www.cubs.buffalo.edu http://www.cedar.buffalo.edu/~govind/CSE717 [email protected]

Post on 20-Dec-2015

216 views

Category:

Documents


3 download

Embed Size (px)

TRANSCRIPT

  • Slide 1
  • Biometrics CUBS, University at Buffalo http://www.cubs.buffalo.edu http://www.cedar.buffalo.edu/~govind/CSE717 [email protected]
  • Slide 2
  • Conventional Security Measures Possession or Token Based Passport, IDs, Keys License,Smart cards,Swipe cards, Credit Cards Knowledge Based Username/password PIN Combination(P,K) ATM Disadvantages of Conventional Measures Do not authenticate the user Tokens can be lost or misused Passwords can be forgotten Multiple tokens and passwords difficult to manage Repudiation
  • Slide 3
  • Biometrics Definition Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits Examples Physical Biometrics Fingerprint, Hand Geometry,Iris,Face Measurement Biometric Dependent on environment/interaction Behavioral Biometrics Handwriting, Signature, Speech, Gait Performance/Temporal biometric Dependent on state of mind Chemical Biometrics DNA, blood-glucose
  • Slide 4
  • Requirements of Biometrics Universality Each person should have the biometric Uniqueness Any two persons should have distinctive characteristics Permanence Characteristic should be invariant over time Collectability Characteristic should be easy to acquire Acceptability Is non-intrusive Non repudiation User cannot deny having accessed the system
  • Slide 5
  • General Biometric System Database Biometric Sensor Feature Extraction Biometric Sensor Feature Extraction Matching ID : 8809 Authentication Enrollment Result
  • Slide 6
  • Types of Authentication Verification Answers the question Am I whom I claim to be? Identity of the user is known 1:1 matching Identification Answers the question Who am I? Identity of the user is not known 1:N matching Positive Recognition Determines if an individual is in the database Prevents multiple users from assuming same identity Negative Recognition Determines if an individual is NOT in the given database Prevents single user from assuming multiple indentities
  • Slide 7
  • Aspects of a Biometric Systems Sensor and devices Types of sensors Electrical and mechanical design Feature representation and matching Enhancement, preprocessing Developing invariant representations Developing matching algorithms Evaluation Testing System Issues Large Scale databases Securing Biometric Systems Ethical, Legal and Privacy Issues
  • Slide 8
  • Applications And Scope of Biometrics TechnologiesHorizontal ApplicationsKey Vertical Markets FingerprintCivil IDGovernment Sector Facial RecognitionSurveillance and ScreeningTravel and Transportation Iris ScanPC / Network AccessFinancial Sector MiddlewareRetail / ATM / Point of SaleHealth Care AFISCriminal IDLaw Enforcement Voice ScaneCommerce / Telephony Hand GeometryPhysical Access / Time and Attendance Signature Verification Keystroke Dynamics
  • Slide 9
  • Biometric Modalities Common modalities Iris Fingerprint Face Voice Verification Hand Geometry Signature Other modalities Retinal Scan Odor Gait Keystroke dynamics Ear recognition Lip movement
  • Slide 10
  • Fingerprint Verification Fingerprints can be classified based on the ridge flow pattern Fingerprints can be distinguished based on the ridge characteristics
  • Slide 11
  • Feature Extraction XYT 10626320R 15350335R 25581215B
  • Slide 12
  • Matching XYT 10626320R 15350335R 25581215B XYT 08120R 21320145R 37246109B T(X, Y, )? Rotation Scaling Translation Elastic distortion
  • Slide 13
  • Face Recognition:Eigen faces approach Eigen facesNormalization Face detection and localization
  • Slide 14
  • Face Feature Representations Facial Parameters Semantic modelEigen faces
  • Slide 15
  • Speaker Recognition Speaker IdentificationSpeaker VerificationSpeaker Detection Text Dependent Text Independent Text Dependent Text Independent Forensics Caller identification Speech Codecs IVR Computer Access Transactions over phone
  • Slide 16
  • Cepstral feature approach Silence Removal Cepstrum Coefficients Cepstral NormalizationLong time average Polynomial Function Expansion Dynamic Time Warping Distance Computation Reference Template Preprocessing Feature Extraction Speaker model Matching
  • Slide 17
  • Vocal Tract modeling Signal SpectrumSmoothened Signal SpectrumSpeech signal
  • Slide 18
  • Speaker Model F 1 = [a1a10,b1b10] F 2 = [a1a10,b1b10] F N = [a1a10,b1b10] .
  • Slide 19
  • Signature Verification Off line Signature Verification Online Signature verification
  • Slide 20
  • Simple Regression Model Similarity by R 2 : 91% R2=R2= Y = (y 1, y 2, , y n ) X = (x 1, x 2, , x n ) Matching Similarity Measure Similarity by R 2 : 31%
  • Slide 21
  • DTW warping path in a n-by-m matrix is the path which has min cumulative cost. The unmarked area is the constrain that path is allowed to go. ( y 2 is matched x 2, x 3, so we extend it to be two points in Y sequence.) Similarity = R 2 Dynamic Alignment Where (x 1i, y 1i, v 1i ) are points in the sequence And a, b, c are the weights, e.g., 0.5, 0.5, 0.25 Dynamic alignment
  • Slide 22
  • Iris Recognition Sharbat Gula:The Afghan GirlIriscode used to verify the match
  • Slide 23
  • Iris Recognition Choosing the bits Gabor Kernel Iris Image
  • Slide 24
  • Collage
  • Slide 25
  • Hand Geometry
  • Slide 26
  • Evaluation of Biometric Systems Technology Evaluation Compare competing algorithms All algorithms evaluated on a single database Repeatable FVC2002, FRVT2002, SVC2004 etc. Scenario Evaluation Overall performance Each system has its own device but same subjects Models real world environment Operational Evaluation Not easily repeatable Each system is tested against its own population
  • Slide 27
  • System Errors FAR/FMR(False Acceptance Ratio) FRR/FNMR(False Reject Ratio) FTE(Failure to Enroll) FTA(Failure to Authenticate) Genuine (w1) Impostor (w2) GenuineNo errorFalse Reject ImpostorFalse Accept No error Confusion matrix
  • Slide 28
  • Performance Curves: Score Distribution
  • Slide 29
  • Performance curves: FAR/FRR
  • Slide 30
  • Performance curves: ROC
  • Slide 31
  • State of the art BiometricsState of the artResearch Problems Fingerprint 0.15% FRR at 1% FAR (FVC 2002) Fingerprint Enhancement Partial fingerprint matching Face Recognition 10% FRR at 1% FAR (FRVT 2002) Improving accuracy Face alignment variation Handling lighting variations Hand Geometry 4% FRR at 0% FAR (Transport Security Administration Tests) Developing reliable models Identification problem Signature Verification 1.5%(IBM Israel) Developing offline verification systems Handling skillful forgeries Voice Verification