biometrics fusion - najis.org · - no physical contact with scanner ... - iris remains unchanged...

40
Biometrics Fusion

Upload: dangthu

Post on 13-Sep-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Biometrics Fusion

What is it?

Biometrics consists of methods for uniquely recognizing or identifying individuals based upon one or more physical or behavior traits.

The next wave of identification is biometric fusion which incorporates a variety of biometrics.

Future systems may integrate photo matching, fingerprint & palm matching, iris matching and voice matching.

Physical Examples

Physical examples include but are not limited to:

- fingerprints

- face recognition

- DNA

- palm prints

- iris recognition

- voice recognition

- ear shape

Status Quo

As this group knows, fingerprints are currently the most common and reliable physiological biometric identifiers.

More recently, many agencies have also started maintaining a database of palmprints.

Fingerprints

No explanation required for this group.

Facial Recognition

Facial Recognition applications convert the facial image into digital code, known as a faceprint.

Algorithms are used to compare one faceprint to another in the existing database.

The Pennsylvania Justice Network (JNET) system also utilizes demographics such as gender and race, hair and eye color and height and weight to help narrow the search.

JNET is in the process of upgrading their facial recognition system to include the capacity for a mobile application and for ability to capture and search an iris database.

Facial Recognition

Facial Identification Scientific Working Group (FISWG)

- mission to develop consensus standards, guidelines and best practices for facial recognition

- working to develop criteria for positive id for court

Facial Recognition Challenges

Facial identification problems/issues

- target camera geometry

- changes in facial expression

- differences in imaging system (cameras and recording devices)

Long range challenge

- linkable/searchable databases

multiple agencies with databases but not necessarily compatible or shareable

quality of images usually poor

- ANSI/NIST standard will improve quality and help data sharing

Iris Recognition

compares unique patterns of the iris

- a digital camera uses both visible and near-infrared light to capture image of iris—like fingerprints no two irisprints are alike.

- compares unique patterns of the iris

- comparing against a database is fast with high level of accuracy

iris scanning

- no physical contact with scanner

- however, iris scan requires agent to be in close proximity of subject

- can be used with glasses and contacts

- iris remains unchanged with age and post surgery

Iris Overview

iris formation

- iris is formed by a process called chaotic morphogenesis

- tearing outwards of the membrane from the center of the eye forming the detail found in the iris

- complete by the time a person is 12-18 months of age and the iris stays the same over the life of an individual

benefits

- speed (fastest vs. other biometrics)

- accuracy (lowest chance of false ID vs. other biometrics)

- scalability (smallest file template size)

- stable (most reliable vs. other biometrics)

- non-invasive/hygenic (no touching of sensors required)

iris recognition is NOT retinal scanning

- older technology, intrusive, not as stable or accurate

Iris Dissected

Collarettes

Ciliary Area

Pupilary Area

Radial furrows

Pigment Frill

Crypts

Biometric Footprints

Metric 10 Fingerprint 2-Iris Advantage

Match Speed (records/server/sec)

2 M 20 MIris is 10x FasterIris requires 10x Less Hardware

Template Size*(per record template)

10 Kbytes 2 Kbytes Iris is 5x smaller

Storage Size***(per record image)

1 Mbytes 7 KbytesIris requires 100x less storage space

* Affects cost of RAM since biometric templates stay in RAM

**Need to store biometric images in standard format in order to allow for future proofing, interoperability, interchangeability and guard against vendor lockup

12

Storage

AFIS Iris

Servers 1600 160

Total RAM 3 Terabytes <1 Terabyte

Total Storage 340 Terabytes 2 Terabytes

Based on throughput of 30K/hr340 Terabytes equivalent to 8 years of HDTV Video

example system hardware 300 million subjects

Iris Technology Devices

handheld enrollment devices- operator or self enrollment

mounted devices for enrollment

mobile devices for enrollment, local, or remote search- up to 500K subjects; iris search times less

than one minute- cellular connection for remote search

future device capabilities- iris on the move- iris at booking (6’ standoff)

Offender Tracking Systems

- integrated search engine and identity management

- used in the incarceration process to identify inmates

- utilize images from existing, legacy systems to reduce duplicate data entry

- event management, booking, release, visitor check, court ID, work release

- download to mobile devices for portable ID

Iris Deployments

corrections centers across the US

- sizes from 150 beds to 4,000+, iris databases of 75,000+ inmates enrolled

regional database

- program running in Missouri with several county jails and PDs cooperating and building a single database

NYPD

- scan irises of everyone who passes through NY Central Booking

- deployed to track suspects as they move through court system

immigration and control

- automatic border entry system operated by Amsterdam PD at Schiphol Airport

Possible Uses for Iris

corrections- inmate movement. medication dispensing, work release verification in the field, sex

offender registration in front offices or other locations outside of booking

investigations- search warrants for documenting suspects, witnesses, and video and audio evidence

- gang investigations documenting gang members and their clothing, tattoos, graffiti or tagging, etc

- crime scenes for documenting suspects, witnesses, and video and audio evidence (statements on the scene, visible fingerprints/footprints/etc)

- field interrogations during ongoing investigations

- verification of identification during arrest warrant service details

Possible Uses for Iris

patrol- verification of identity on car stops or other calls for service

courts- identification of defendants at court, witnesses, persons suspected of intimidation or

other crimes within the courts building

other activities involving biometric registration- child safety, Alzheimer's patients, employee identification

- concealed carry registration

- neighborhood watch activities

- criminal background checks

Challenges

- eyeglasses or sunglasses (remove to enroll)

- clear contact lenses – edge may impede capture

- colored or patterned contact lenses (remove for enroll)

- eyelashes or eyelids obscure iris

- disorders of the eye

Standards/Trends

ISO 19794-6, biometric data interchange formats;

Part 6: iris image data

- establishes iris formats to reduce archived image size

- cropping, and masking non-iris regions, preserves the coding budget

- pixels outside the ROI are fixed to constant values, for normal segmentation

NIST mobile ID device best practices recommendations, V1

- establishes subject acquisition profiles for iris capture on mobile devices

FBI NGI (Next Generation Identification)

- $1billion upgrade to IAFIS adding iris capability in the next three years

Iris Summary

iris biometrics

- highest accuracy biometric: supports scalability to database sizes up to one billion or more

- system footprint lowers total cost of ownership

- flexibility to add fusion with eyes or 10-print, controllable thresholds for different applications

- small template & image size makes iris ideal for consumer verification devices down the line & for mobile communication

- damage in iris is less common than damage in fingerprints

Voice Biometrics - Overview

similar to finger & face

- can be used for both 1:1 verification and 1:N identification

historically a manual process requiring a forensic expert

- improvements in algorithms and processing power now provide automatic functionality

voice has been accepted in courts since 1967

- has passed Frye, Daubert & federal rules of evidence challenges

Voice Biometrics - Process

FaceprintFingerprint

Voiceprint

These parameters are individual to each person, and can provide very useful information about the person’s identity.

Like a fingerprint or faceprint, a voiceprint also has available parameters that provide unique information about a person.

Voice Biometrics - Challenges

channel effects

– microphones (carbon-button, electret, hands-free…)

– acoustic environment (office, car, airport…)

– transmission channel (landline, cellular, VoIP…)

speaker voice variability

– emotional state

– physical condition (drugs, alcohol…)

– illness

amount of speech

- elimination of pauses and non-speech segments

non-challenges- language

- accents

- superficial voice disguise

Voice Biometrics - Benefits

no specialized equipment required for collection

– standard microphones/recorders can be used

availability of data

- passive

voice mail /answering machines

calls for services/support

911

video recordings

- active

phone taps

interrogation

video arraignment

during booking process

mobile ID

Voice Biometrics - Benefits

dual modality

- investigative - automated to include or exclude suspects

- forensic - analysis by expert for court evidence

Voice Biometrics – Use Cases

- domestic abuse

- sex offender registration/authentication

- phone calls in violation of restraining orders

- communications/911

- prank or false emergency calls

- agency radio traffic abuse

- terroristic threats

- inmate call monitoring

- kidnapping

- extortion

- video w/audio where camera operator is unknown

- any investigation where audio is the only lead or evidence

Voice Biometrics – Capabilities

current capabilities for 1:N voice matching

- EER of 1.8% best case scenario

- as little as 3 seconds of audio required but 30 seconds is ideal

- search speeds of up to 10,000 voice prints per second

verification 1:1 matching

- As accurate as any other biometric with enrollment & matching in ―active‖ environment.

Voice Biometrics – Capabilities

additional capabilities of voice

- language recognition

- emotional state

- lie/voice stress detection

- key word search/recognition

- recording device identification

- background sound identification

Voice Use & Emergence

Mexican federal & state deployments

- national system deployed in Mexico with over 600,000 record database projected to grow to over 1.1 million by the end of 2011

- state systems deployed in Mexico already used in solving both kidnapping and extortion cases

NIST

- developing type 11 record for voice biometrics

- yearly evaluations since 1996

Voice Use & Emergence

FBI NGI

“The future of identification systems is currently progressing beyond the dependency of a unimodal (e.g., fingerprint) biometric identifier towards multimodal biometrics (i.e., voice, iris, facial, etc.).”

FBI Biometric Center of Excellence

“A popular choice for remote authentication due to the availability of devices for collecting speech samples (e.g., telephone network and computer microphones) and its ease of integration.”

Voice components showing up in some US AFIS upgrade RFPs.

Voice Biometrics – Summary

Voice technology capabilities have reached the practical implementation stage.

United States is trailing other countries in implementation.

Voice can deliver capabilities to utilize data that is already being collected.

Voice can provide unique capabilities not provided by other biometrics.

Voice can enhance both investigative & forensic processes.

Biometric Quality

Biometric identification is only as good as the initial sample.

The quality of the initial enrollment is crucial.

And like fingerprints, most biometrics are subject to uncertainty.

Although fingerprints have been proven in court to be an acceptable method of identification most other biometrics have not yet reached that level of proof

Emerging Biometrics

The science of biometrics is advancing much faster than the court cases/challenges.

However, the emerging biometrics can be used now as an investigative tool.

Department of Defense

DoD collects, references and analyzes biometric data for identification, verification in support of mission goals

Plans in place to enhance interoperability with systems such as IAFIS and Homeland Security’s Automated Biometric Identification System (IDENT).

Multi-modal

ability to store and analyze multiple biometric modalities simultaneously (multi-modal biometric fusion)

multi-modal storage and matching (fingerprints, palms, irises, faces, etc.)

Future

Biometric identification technologies hold substantial promise for law enforcement.

However, there are always concerns such as:

- compromised data

- costs

- equipment durability

- accuracy

- reliability

- integration with other systems

Future

What works well in a lab may not work as well in real world.

Some systems may work better in some environments than others.

Accuracy and reliability of biometric technologies have to mature before they will be implemented on a large scale.

Contact Information

Harry Giordano

Pennsylvania Justice Network

[email protected]

Luci Stone

Pennsylvania Justice Network

[email protected]