biometrics introduction

52
Biometrics Introduction By Hafez Barghouthi

Upload: melvin-higgins

Post on 03-Jan-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Biometrics Introduction. By Hafez Barghouthi. Definition. ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristic. Definition Explaining. Automated - PowerPoint PPT Presentation

TRANSCRIPT

Security IS A Need Not For Fun

Biometrics IntroductionByHafez BarghouthiDefinitionBiometric Technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristic

Definition ExplainingAutomatedDifferent from human identification

Living personSingle persons, no groupsAlive not dead (just JOKING)

Definition ExplainingPhysiological biometricsFingerprint, Iris, Face, Hand

Behavioural biometricsSignature, Gait, Voice

History - 1Dates back to ancient EgyptAnthropometry (bodily measurements):Adolphe Quetelet (1871), Belgian mathematicianAlphonse Bertillon (1880s), French policemanFingerprints and palmprintsUsed already by Babylonian kingsJan Evangelista Purkinje, Czech studying sweat glandsJuan Vucetich, Argentinian policeman, first to take fingerprints in inkFrancis Galton, Edward Henry: Galton-Henry system for classification

History - 2Fingerprints and facials, 1880s, Henry Faulds, William Herschel and Francis Galton fingerprint recognition on current form, 1960sHand geometry, 1970sRetinal, signature and face verification, 1980sIris recognition, 1990sNewer and newer: gait, keystroke dynamics, mouse movement, cardiac sounds, brain waves

Positive / NegativePositive recognitionTo prevent multiple people from using the same identityNegative recognitionTo prevent one person from using multiple identities

Physiological / BehaviouralPhysiological:Physical features unchangeably attached to a personE.g. fingerprint, DNA, and faceBehavioural:Behaviour that is very specific to a personE.g. signature, gait, and voice

Examples - EarShape of ear can be used for authentication

Examples - FaceUsed by humansMany different techniques available

Examples - ThermogramsFacial, hand, hand vein

Examples - Fingerprint Global featuresLocal features

Examples - Gait"Great Juno comes; I know her by her gait" from "The Tempest by Shakespeare

Examples - GeometryHand and finger geometry

Examples - IrisRemains unchanged after 2 yearsIris code.

Examples - KeystrokeTypical way of typingCombinations of keysSpeed, force and press-down

Examples - OdorUsed by humansMany problems

Examples Retinal ScanSupposed to be the most secure biometricNot user friendly

Characteristics - overviewUniversalityDistinctivenessPermanenceCollectabilityPerformanceAcceptabilityCircumvention

Characteristic - UniversalityEach person should have the characteristicFailure to Enroll Rate (FER)

DistinctivenessDifferent persons should have different biometric propertiesFalse Match Rate (FMR)Characteristic PermanenceThe characteristic should be sufficiently invariant over a period of timeFalse Non-Match Rate (FNMR)

Characteristic CollectabilityThe biometric property should be easy to collect (electronically) and to quantify

Characteristic PerformanceThis refers to the achievable recognition accuracy and speedFalse Non Match Rate (FNMR)Failure to Capture Rate (FCR)Characteristic AcceptabilityTo which extent are people willing to accept the use of a specific biometric

Characteristic CircumventionReflects how easy it is to fool the systemFalse Match Rate (FMR)Application EnvironmentsOvert vs. covertHabituated vs. non-habituatedAttended vs. non-attendedStandard vs. non-standardPublic vs. privateOpen vs. closed

Overt vs. covertOvert:User is aware that the biometric feature is being measured (e.g. finger on a fingerprint reader)Covert:User is unaware that the biometric feature is being measured (e.g. face recognition)

Habituated vs. non-habituatedHabituated:System is used on a daily basis (e.g. to have access to the PC at work)Non-habituated:System is used irregularly (e.g. to access a personal safe in a bank)

Attended vs. non-attendedAttended:Use is observed and guided by system management (e.g. access to a building)Non-attended:No observation or (regular) help is provided (e.g. access to PC)Standard vs. non-standardStandard:System is in a static environment with controlled conditions (e.g. fixed lightning and background for face recognition)Non-standard:System in a dynamic environment (e.g. background noise for voice recognition)

Public vs. privatePublic:Anybody can use the system (e.g. voice recognition for bank transfers via phone)Private:Only employees can use the system (e.g. access to a factory or office building)

Open vs. closedOpen:System can interact with other (biometric) system (e.g. biometric passport)Closed:System is stand-alone and no information is shared (e.g. systems to access classified information)

Biometrical SystemsA biometrical systems consists of 2 modules:Enrollment moduleTemplate created and stored in databaseAuthentication moduleChecked against stored template

Biometrical Systems

ErrorsFalse Non-Match Rate (FNMR)False Match Rate (FMR)False Rejection Rate (FRR) (used wrongly in literature). USE (FNMR) insteadFalse Acceptance Rate (FAR) used wrongly in literature. USE (FMR) insteadFailure to Enroll Rate (FER)Failure to Capture Rate (FCR)

Hypotheses and decisionsH0 : input biometric does not belong to the same person as the template biometricH1 : input biometric does belong to the same person as the template biometric D0 : Person is not who he claims to beD1 : Person is who he claims to be

False Match Rate (FMR)Probability that a false claimed identity is not recognized as falseAlso called Type I ErrorProbability that D1 is decided, given that H0 is true:Prob( D1 | H0 )Depends on a threshold t

False Non-Match Rate (FNMR)Probability that a correctly claimed identity is not recognized as trueAlso called Type II ErrorProbability that D0 is decided, given that H1 is true:Prob( D0 | H1 )Depends on a threshold tFailure to Enroll Rate (FER)Probability that a person cannot enroll in the biometric systemPerson doesnt have biometric featurePerson has poor quality biometric featureTrade-off between FMR/FNMR and FER

Failure to Capture Rate (FCR)Probability of failure to capture the biometric feature when trying to authenticateBad capturing conditionsToo dark for face recognitionDirty fingerprint readerBackground noise for voice recognition

Equal Error Rate (EER)EER is the point where FMR and FNMR are equalDistance metrics - 1In biometrics we need to compare extracted features that will differ a bit every time they are measuredNeed a way to compare extracted featuresInter person distance must be largeIntra person distance must be small

Distance metrics - 2We want to know how far 2 sequences x and y are apart or how close together they are. Let x = (x1,x2,,xn) Let y = (y1,y2,,yn)Assume x can be compared to yAbsolute DistanceSum the absolute differences between each of the components of x and y

d1(x,y) = | xi-yi |

Extremely easy to calculate

Euclidean DistanceSum the squares of the differences between each of the components of x and y

d2(x,y) = [ ( xi-yi )2 ]

Also easy to calculate

Maximum Difference DistanceThe distance between x and y is defined as the maximum absolute difference of its components

d3(x,y) = max | xi-yi |

Extremely easy to calculateMore distance metrics?Many more distance metrics possibleSometimes first a mathematical transformation of the data is neededNot all parts of the data need to be taken into account

ThresholdFeatures are extracted from biometric characteristicFeatures are compared to templateDistance metric gives distance dUse of threshold tdt: authentication OKd>t: authentication NOT OK

Example - Distance scores

Example FNMR/FMRIf t=0.256 we see that(FNMR,FMR) = ( 0/5 , 3/20 )If t=0.213 we see that(FNMR,FMR) = ( 1/5 , 1/20 )If t=0.212 we see that(FNMR,FMR) = ( 2/5 , 1/20 )If t=0.207 we see that(FNMR,FMR) = ( 2/5 , 0/20 )

ROC CurveROC: Receiver Operating Characteristic