イスラエルにおける情報セキュリティ関連動向調査報告書 survey … · the...

81
2007 情財第 0256 号 イスラエルにおける情報セキュリティ関連動向調査報告書 Survey on Technological Strategy related to Biometrics Security in Israel 2008 年 3 月

Upload: others

Post on 04-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

2007情財第 0256号

イスラエルにおける情報セキュリティ関連動向調査報告書

Survey on Technological Strategy related to Biometrics

Security in Israel

2008 年 3 月

Page 2: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

2

Table of Contents

Subject: Page:

Opening 4-6

Introduction 7-8

The Need for Biometric Technologies 9

Biometric Research in Israel

General 10

Iris Recognition 11-14

Fingerprint Recognition 15-16

Face Recognition 17

Biometric Face Recognition, Research by Technion 17-20

Biometric Face Recognition, Research by Rafael 20-25

Voice recognition 26-31

Biometric Signature 32-33

Future Biometric Technologies 34

Biometric Identification by Dogs 34-35

Biometric Identification according to Facial Expression 35-38

Automatic Identification, Surveillance and Tracking in Open Space 38-41

Biometric Development for Identifying People in Closed Objects 41

Biometric Application for Identifying Objects 42-44

The Israeli Government

General 45

The Israeli Government 45-48

Biometric Picture Database 48-50

Government Offices Purchase Biometric Technologies 51-52

Criticism for using Biometric Technology 53-55

The Biometric Standardization in Israel

General 56

The Israeli Standardization Tasks 56

The Matching Committees 57

Page 3: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

3

The Biometric Committee in Israel 57

The Lack of Standards 58

The Israeli Standardization for Biometrics 58

Adaptation of International Standards 58

The Standards that have been Adopted by Israel 59-65

The Israeli Industry

Fingerprint Companies 66-69

Intelligent Video Surveillance 70

Biometric Signature 71-72

Biometric Smart Cards 73-76

Voice Authentication 77-79

Dog Bio Security 80

Bibliography 81

Page 4: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

4

Opening

Biometrics is defined as the total behavioral and/or physical characteristics of people

that can be measured and be used for verification and identification when needed.

Different definitions were given to the concept of biometrics. This definition seems

the most comprehensive and includes all the components of the theory. Another

definition claims that biometrics is a science that measures physiological

characteristics that enable to identify a person unequivocally. Another definition

claims that biometric is a process of identifying unique characteristics of a user in the

Internet.

We will not analyze these definitions at this stage, but we will return to them later in

this report.

In general, biometrics is divided into two groups:

1. Physiological characteristics are related to the shape of the body. The oldest

physiological characteristics that have been used for more than 100 years are

fingerprints. Other examples are face recognition, hand geometry, Iris

recognition and many more.

2. Behavioral characteristics are related to the behavior of a person. The first

characteristic to be used, still widely used today, is the signature. More

modern approaches are the study of keystroke dynamics and behavioral

tracking technologies. Some researchers, who study biometrics, refer to the

concept as a synonym for behaviometrics, which is a term for behavioral

biometrics such as typing rhythm or mouse gestures, where the analysis can be

done continuously without interrupting or interfering with user activities.

In correlation to all the above mentioned definitions, each person has his unique

biometric characteristics, which can be identified and used for identification. Thus,

even before we enter into all types of characteristics that identify a person, it should

be indicated in the formulation of biometric means of identification, there is a need to

verify the person’s specific details and to store them in a database, such as the

organization’s system’s memory. This is done in order to compare between the

memorized details and the examined person’s details.

Page 5: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

5

There are methods for identifying people, even without having any data about them in

the database and thus they can still be identified. This will be discussed later in the

report.

Over the years, many different biometric characteristics were found. The first

characteristic is the fingerprint. This was the primary means for identifying a person.

This type of identification has been found to be falsified in different ways, therefore,

throughout the years different alternative technologies have been developed, many of

which are in use in Israel. Each of these technologies has advantages and

disadvantages, which will be described in this report. Due to the disadvantages in the

biometric technologies which have been developed, researches keep researching to

look for additional biometric means in order to cover the disadvantages. Companies

have developed software and hardware which combines different biometric

technologies to identify a person in parallel to ensure better security and better

identification.

Identification and verification through fingerprints, loses its exclusivity, and about 20

new physiological and behavioral characteristics can be used for identification, each

in its unique and exclusive way.

The biometric characteristics that are in use are:

1. Face

2. Iris

3. Retina

4. Vein structure of hand

5. Finger geometry

6. Hand geometry

7. Ear

8. Voice

9. Keystrokes

10. Mouse Strokes

11. DNA

12. Signature

13. Gait

14. Toes

Page 6: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

6

15. Odor

16. Biometric Dog Bark

17. Face expression

18. Biometric detection of moving objects in open area

19. Biometric sensors for people in closed places

Not only the biometric technologies have advantages and disadvantages the whole

concept of biometrics has its advantages and disadvantages. The collection of the

individual’s biometric details and storing them in databases has strong opposition.

The objection come from the claims that such databases can be used to reduce the

right of man’s privacy and to increase the intervention of the ruling powers, which

already has "too much" information and personal details of the citizens.

However, the advantages overcome the disadvantages of the need and the importance

of keeping people’s privacy, as biometrics authentication helps to improve life quality

of most people. This includes the use of smart cards, through which we pay, such as

credit cards, or getting money through biometric identification and many other

applications. These technologies also help to protect people from the penetration of

undesirable people to the state or to secured sites. Thus, a compromise must be found

between the concept of keeping individual rights and personal information and

between individual’s welfare. This will be discussed later in this report.

Page 7: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

7

Introduction

International cooperation is needed for strive to ultimate security. Standards and

international rulings are set in order to achieve this goal.

In Israel, the subject of biometrics development in spread at many fields, such as

academic institutes, industry, banking, government, etc. With the development of

more exact technologies, the importance of the subject is more and more understood

as well as the recognition that it is very difficult to manage normal life without

biometric security.

There are also opposing repercussions, including the fact that with each new

biometric development, criminal factors and others develop ways to circumvent these

technologies.

As a result of the sophisticated counter development, different combined biometric

means are used and not only one identifying factor, such as mutual use of finger prints

and face technologies, or using several fingers combined with hand identification or

face and voice means. In other words, the one-feature identification technology is

disappearing, and its place is taken by the multi-featured identification technology

which is done by a combination of software and hardware that can identify several

features at once. This increases the certainty of identification. Biometric technologies

are continually developing, so that it is possible to use them for different purposes

from what they were originally developed for.

In this paper, we will describe the different ways in which biometric technologies are

used. Each human feature is researched and examined in order to develop it to the

level of biometric technologies. Many technologies have developed, alongside

international standards, as will be later described. The actual application of biometric

technologies are varied and are spreading in different fields such as in the field of

medicine, banking services, transportation, public safety, governmental services and

many other uses.

Following are some examples of where the Israeli government is constantly looking to

secure its offices and agencies by different means including biometric authentication.

Page 8: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

8

One interesting new application that the government is working on penetration is at

the Israeli National Health Services where it is implementing a new biometric

identification project. 1.8 million Patients will be identified by fingerprint, instead of

the currently used magnetic card. The first stage of the project has been run as a pilot.

After the success of the pilot, a national operation of the project will be conducted in

8.000 medical centers.

The project provides the possibility that each patient will be identified immediately by

the doctor. It is the first time in Israel where a patient of one of the National Health

Services organizations will receive medical treatment, only after identification. Their

identification enables continuous treatment. It also enables the security and privacy of

its users and prevents identity thefts.

Another place where the technology is used is in the Palestinian border crossing in

Jenin. It is one of the single places in the world where three identifying technologies

are used together: identification of the back of the hand, the face and fingers, not

fingerprints. The advantage of operating several identification methods is because of

the ability to achieve a valid identity of 98%. It is possible also to use each technology

alone.

The biometric process of identification at border crossing shortens the queues and

reduces the contact between the border officers and the crossers.

One other place where biometric means are used is the Employment Service, where

contact between Employment clerks and the employment searchers. As part of the

project, the employment searchers put their finger upon a machine that identifies their

fingerprint and type their identity card number. Immediately, they receive a code with

a report if they have any work offers as well as whether they want to receive them as a

printed output. The employment services workers said that the system reduced the

number of employment request in 4%. The proof is that they don’t request social

security and this is a very effective financial saving.

Page 9: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

9

The Need for Biometrics Technologies

While in the past, fingerprints were the sole reliable means of identifying people, in

the modern times the identification technologies are different. Today’s world

necessitates the development of other means and technologies in order to cope with

the sophistication of the ability to forge and steal a person’s identity.

The need to identify a person has increased due to the development of international

commerce and globalization. For example, the easier passage of people from state to

state for work or tourism (border checkups), the use of different and newer means of

payments such as credit cards that necessitate identification of the payer, the ability to

collect payments through indirect means, using signatures in computer networks (user

identification), entrance to guarded buildings (identification of the enterer), etc.

It is possible to identify and verify a person without biometric means by two methods:

1. Possession-based: using one specific "token" such as a security tag or a card,

2. Knowledge-based: the use of a code or password.

These identification methods are losing reliability due to the wide forging possibilities

and the biometric technologies are taking their place.

Page 10: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

10

Biometric Research in Israel

General

Universities, research institutes, government agencies, private companies in Israel are

developing software and hardware in the field of Biometry.

Five biometric technologies are widely used in Israel:

1. Iris

2. Fingerprint

3. Face

4. Voice

5. Signature

Even these five biometric fields are divided into two groups:

1. The first group includes the fingerprint, Iris and face biometric technologies,

where there is a need for the presence of the identified person.

2. The second group includes the voice and the digital signature, can be used

mainly to identify a person from distance and of course can be used with the

presence of the person as well.

The developers of the first group of technologies claim that also their technologies

can be used from distance. This is due to the new telecommunication technologies

that are available today, that make possible the transfer of information so even if the

database is in distance, it is possible to identify a person using these techniques.

As mentioned, biometrics includes about 20 different technologies, three of which are

more in use than the others: Iris, Fingerprints and Face. Different researches and

developments were done in Israel on these three technologies, as well as in other

biometric fields that will be later discussed.

Following are details on researches that were studied in Israel:

Page 11: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

11

1. Iris Recognition

Research by Prof. Dori Peleg, and his associate from The Israeli Technion, (the most

esteemed technological institute in Israel).

The Iris is the circle that encircles the pupil in the human eye. The reason why so

many researchers initiate studies on this subject is because the Iris has many

advantages of precise recognition. The main advantage of Iris recognition is its

stability as a single enrollment that can last a lifetime. More than this, it has a so far

unmatched practical false-accept rate of zero. There is no known pair of images of

two different Irises that the algorithm in its deployed configuration mistakenly

identifies at the same. The Iris Code false-reject rates are comparable to the most

accurate single-finger fingerprint matchers.

The Iris recognition technology has other advantages compared with other biometric

technologies:

1. The Iris has a fine texture that, like fingerprints, is determined randomly

gestation during embryonic gestation. Even genetically identical individuals

have completely independent Iris textures.

2. It is an internal organ that is well protected against damage and wear by a

highly transparent and sensitive membrane.

3. The identification of the Iris can be performed from about 8cm to a few meters

away.

4. There is no need for the person to touch any equipment in order to be

identified.

5. The identification of a person by the Iris technology is done by camera

similarly of taking photography.

As mentioned, the most in-depth study on the subject of Iris recognition in Israel

seems to be the Technion’s study. The motivation to make this research is the fact that

there is a strong scientific demand for the proliferation of systems, concepts and

Page 12: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

12

algorithms for Iris recognition and identification. This is mostly because of the

comparatively short time that Iris recognition systems have been around.

There is still a great need for substantial mathematical and computer-vision research

and insight into Iris recognition. Iris recognition uses camera technology, and subtle

IR illumination to reduce specular reflection from the convex cornea to create images

of the detail-rich, intricate structures of the Iris. These unique structures converted

into digital templates, provide mathematical representations of the Iris that yield

unambiguous positive identification of an individual.

Prof. Peleg’s study, was, as mentioned, based upon Prof. Daugman’s algorithms from

Cambridge University, which are the basis of almost all currently commercially

deployed Iris-recognition systems. The study was divided into two parts:

1. Processing the picture - Isolating the Iris: given levels of gray in the picture

will activate the algorithm that specifically finds the Iris borders which are the

pupil, the white of the eye and the eyelid.

2. Processing the information – Summarization of the features from the Iris and

converting them to consecutive bits that become a unique matrix for each eye.

In order to identify a person, the system will process the photograph taken from his

eye that is encoded to the consecutive bits and will perform a comparison of the

matrixes that are stored in the database. The decision if two matrixes match will be

made by a success/failure test which is statistically independent.

The Study determined that an Iris-recognition algorithm first has to identify the

approximately concentric circular outer boundaries of the Iris and the pupil in a photo

of an eye. The set of pixels covering only the Iris is then transformed into a bit pattern

that preserves the information that is essential for a statistically meaningful

comparison between two Iris images. The mathematical methods used resemble those

of modern lossy compression algorithms for photographic images.

Among the problems that the research solved is the best way to find the center of the

pupil and the center of the Iris. The study also determined how to identify the Iris,

even though the pupil isn’t a perfect circle.

Page 13: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

13

Another problem that the Technion’s research found was how to overcome the effect

of the eyelashes that hinder the photographing of the Iris and reduces the ability to

detect the Iris and its use as a complete identification.

In fact, the Technion’s research suggests ways to photograph and identify by

automatic measurement in purpose of finding the different components, in order to get

full information on the Iris, which is identified among other factors by the upper and

lower curves, especially when it isn’t always possible to get the points on the curve.

This research, states that the size or color of the Iris has no connection to the Iris

recognition technology as the measured factor is the circle around the pupil which

structure doesn’t depend on size and color. In fact, identification by the Iris is one of

the quickest, most exact and easiest existing identification technologies.

The Iris identification technology is done according to the identification of the Iris

using simulation platforms that increase the speed of identification and accuracy.

Usually, during the photography of the Iris for its keeping in memory, or during the

identification of the person, the person has to approach the camera to a distance of

8cm in order to perceive the Iris in the best possible way. Only then it is possible that

the Iris is captured and identifies the person. The researchers at the Technion kept in

the database, in addition to each eye’s special matrix, its masking in order to increase

the technology’s effectiveness, meaning the relevant bytes for comparison.

This can cause a huge difference in the samples that are kept in the database, and the

same person may get a rejection instead of acceptance. To avoid this situation,

masking is done. Every image has a mask besides the processed image. Before the

image (which wants to enter) gets processed, matching between the 2 masks is done.

After finding the common information, the identification process continues.

This shows that actually, the primary assumption of the research was correct which

means that only part of the Iris is needed in order to identify a person and that there is

no need for the entire Iris for identification. Thus, if there are distortions of the lashes,

that usually cover the upper part of the eye, or of the Iris curve, it is possible to ignore

them and to take only the revealed part of the Iris and it will give the information that

is needed. For this purpose, the research has developed different algorithms that will

help to measure the Iris and will overcome the above mentioned difficulties.

The Technion’s researchers give different ideas to improve the algorithms. Another

problem that the researchers dealt with is the fact that in some cases the pupil enlarges

Page 14: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

14

or narrows and then the size of the picture of the pupil changes. According to the

researchers, there is no loss of information with this, only the compression of the

information is on a smaller area.

Among other things, the researchers studies problems that occur during the

identification process. As the identification is made with a comparison to the picture

that exists in the database, it is possible that during the identification, the eye that was

open during the photographing, is closed and thus, a situation will occur where the

new samples of the eye aren’t similar to the existing samples of the eye, and actually,

represents the eyelid and not the Iris. In order to keep their consistency, the

researchers kept in their data bank, not only the special matrix of each eye, but also its

mask, meaning the relevant bytes for comparison.

After the researchers isolated from each eye the part that contains the necessary

information, and contained it in the appropriate way, they needed to research the

problem of the comparison between the picture in the system and that which is

examined during the identification.

There are many problems that affect the comparison between the original picture and

the picture which was taken during identifications, like different lightening, different

environment, etc. as a result, the researchers found the characteristics of each eye

which do not dependent on lightening or any other external factor such as eyelashes or

different stimulation and opening of the eye, which entered into the picture.

Disadvantages of Iris Recognition Technology

1. Iris recognition is difficult to perform at a distance and if the person to be

identified is not cooperating by holding the head still and looking into the

camera it will not work. As with other photographic biometric technologies,

Iris recognition is susceptible to poor image quality, with associated failure to

enroll rates.

2. Another problem is the fear of some of the identified persons from the beam of

light and this makes some people oppose identification by these means.

Page 15: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

15

2. Fingerprints Recognition

Identification by fingerprints which was the earliest of all biometric means of

identification, and was considered the sole such means for a long time. The use of this

technology was made in the days, where no one even dreamed about computer

technologies and their development. In the past, fingerprints were identified through

primitive means such as a magnifying glass, etc., done by a graphologist. It was also

known that at those times there were much less needs for identification compared to

nowadays.

In spite of early use of fingerprints as identifying means, this technology is still used

today, and is considered among the three most used leading biometric identification

technologies in the world, along with the Iris and face techniques.

Although the fingerprint was the first method, and the most known one, research and

development is still being done in this field in order to improve it and to develop more

efficient technologies. The renovation mostly focuses upon the mechanism that read

the fingerprints and the mechanism that keeps it in memory.

Fingerprints are used also as identifying means, for people who don’t know to read

and write and thus they don’t know how to sign their names.

The fingerprint technology is also used in some countries for identification in border

passages. Israel too uses the technology of fingerprints in the borders; though it is

joined to other means of identification like smart cards, etc. The smart card has a chip

which identifies its carrier or matrixes that the identified person must mark.

Throughout the years, different means and simple methods of forging fingerprints

developed. Thus, identification by fingerprints is usually done with the entire hand or

with two fingers or in combination of an additional biometric technology of

identification such as a face or even foot print is used for identification together with

the fingerprint.

Advantages of the Fingerprint Method

1. The greatest advantage of using fingerprints for identification is the simplicity.

Page 16: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

16

2. This method is inexpensive, and it is possible to keep it in memory even under

primitive conditions.

3. Another advantage of fingerprint identification is the assurance that other

person will have the same fingerprint very remote and close to impossible.

Disadvantages of the Fingerprint Method

1. It is possible to copy and to forge fingerprints in simple ways and at low costs.

2. As the fingerprint is kept as a picture in the database it is relatively easy to

steel it and to forge it, whereas other authentication methods are not so easy to

forge.

In Israel, some companies keep researching this field to accelerate the identification

and its accuracy. For this purpose, a solution has been developed that in one solution

the registration process and identification process are all done by the same unit. This

system can be used away from the computer and can be used comfortably in different

areas without computerized system for example:

Identification of computer users.

Identification of car doors users.

Identification at entrance to private homes.

The Israeli companies focus on studies to improve the maximal speed and accuracy of

this technology. The information about the leading companies who are researching the

fingerprint field will be detailed in the industry chapter.

Page 17: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

17

3. Face Recognition

Over the last few years, face recognition has become a popular area of research in

computer vision and one of the most successful applications of image analysis.

A general statement of the face recognition technology (in computer vision) can be

stated as follows: Given still or video images of a scene, identity or verify one or

more persons in the scene using a stored database of face.

Face recognition is considered one out of three leading technologies in the

identification of human beings. The other two are as previously said, fingerprints and

Iris identification. There are many other technologies that are used to identify which

will be described in detail in our report.

The face recognition has been researched and is still being researched by the industry

and by the universities in Israel.

Researches for face recognition have been carried out by the Technion Israel Institute

of Technology and by a government company Rafael which was recognized by the

government as The National Knowledge Center of Biometric in Israel.

Biometric Face Recognition Research done by the Technion

The researchers at the Technion determine that the technology of face recognition has

the potential of becoming the leading biometric technology. Unfortunately, it is also

one of the most difficult pattern recognition problems. Also with this technology, the

researchers refer to the data used for a specific recognition task as a template. The

face recognition algorithm needs to compare a given face with a given template and

verify their equivalence. Such a setup (one-to-one matching) can occur when

biometric technology is used to secure financial transactions, for example, in an

automatic teller machine (ATM). In this case, the user is usually assumed to be

collaborative.

Page 18: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

18

On the other hand, the face recognition algorithm should then match a given face with

one of the individuals in the database. For instance, finding a terrorist in a crowd

(one-to-many matching) is one such application.

The researchers check two possibilities: The first possibility that identifies a

cooperating person and the second possibility that identifies a non cooperating person.

The first possibility means even collaborative users in a natural environment present

high variability of their faces due to natural factors beyond their control. The greatest

difficulty of face recognition, compared to other biometrics systems come from the

immense variability of the human face. The facial appearance depends heavily on

environmental factors, for example, the lighting conditions, background scene and

head pose. It also depends on facial hair, the use of cosmetics, jewelry and piercing.

Last but not least, plastic surgery or long-term processes like aging and weight gain

can have a significant influence on facial appearance.

The researchers determine that much of the facial appearance variability is inherent to

the face itself. Even if we hypothetically assume that external factors do not exist, for

example, that the facial image is always acquired under the same illumination, pose,

and with the same haircut and make up, still, the variability in a facial image due to

facial expressions may be even greater than a change in the person’s identity.

The researchers determine that very few reliable fiducially points can be extracted

from a 2D facial image in the presence of pose, illumination, and facial expression

variability. In the 2D technology, the researchers find many disadvantages at almost

every stage of the identity. Even in cases where the identified person cooperates, it is

difficult to identify him by a picture that is stored on the database due to feature-based

algorithms are forced to use a limited set of points, which provide low discrimination

ability between faces. The researchers indicate additional disadvantages in the usage

of 2D technology and derive to the conclusion that this system cannot be used for

identification of a person. They suggest generating synthetic images of the face in

new, unseen conditions. Generating facial images with new pose and illumination

requires some 3D facial surface as an intermediate stage. It is possible to use a generic

3D head model or estimate a rough shape of the facial surface from a set of

observations in order to synthesize new facial images and then apply standard face

recognition methods like eigen faces to the synthetic images. Yet, facial expressions

Page 19: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

19

appear to be more problematic to synthesize. The researchers indicate the approach

modeling facial expressions as warping of the facial image do not capture the true

geometric changes of the facial surface, and are therefore useful mainly for computer

graphics applications. That is, the results may look natural, but fail to represent the

true nature of the expression.

The researchers rejected all other options. They derive to the conclusion that the face

is a 3 dimensional object. The use of only 2D of the face is misleading. For example,

if one had the ability to draw any face on his facial surface, he could make himself

look essentially like any person and deceive any 2D face recognition method.

Practically, even with very modest instruments, makeup specialists in the theater and

movie industry can change completely the facial appearance of actors.

The researchers explain that Three-dimensional face recognition is a relatively recent

trend that in some sense breaks the long-term tradition of mimicking the human visual

recognition system, like the 2D methods attempt to do and they determine that trying

to use 3D information has become an emerging research direction in hope to make

face recognition more accurate and robust.

The researchers continue and explain that Three-dimensional facial geometry

represents the internal anatomical structure of the face rather than its external

appearance influenced by environmental factors. As the result, unlike the 2D facial

image, 3D facial surface is insensitive to illumination, head pose and cosmetics. It

needs to be noted that while in 2D face recognition a conventional camera is used, and

3D face recognition requires a more sophisticated sensor capable of acquiring depth

information usually referred to as depth or range camera or 3D scanner.

The researchers found a disadvantage in the 3D technology whereas the 3D shape of

the face is usually acquired together with a 2D intensity image. This is one of the

main disadvantages of 3D methods compared to 2D ones. Particularly, it prohibits the

use of legacy photo databases, like those maintained by police and special agencies.

The researchers determine that one of the problems that they would like to solve in

their research is being able to identify a person with different facial expressions. It

treats the facial surface as a deformable object in the context of Riemannian geometry.

Our observations show that the deformations of the face resulting from facial

Page 20: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

20

expressions can be modeled as isometrics, such that the intrinsic geometric properties

of the facial surface are expression-invariant. Thus, finding an expression-invariant

representation of the face is essentially equivalent to finding an isometric-invariant

representation of the facial surface.

The researchers determine that Isometric embedding is the core of their 3D face

recognition system. It consists of measuring the geodesic distances between points on

the facial surface and then using multidimensional scaling to perform the embedding.

This way, the task of comparing deformable objects like faces is transformed into a

much simpler problem of rigid surface matching, at the expense of losing some

accuracy, which appears to be insignificant in this case.

The main advantage in the 3D face system is that the facial surface is not needed to be

given explicitly. All the stages of this recognition system, including pre-processing

and computation of geodesic distances can be carried out given only the metric tensor

of the surface. An additional advantage is that this system allows the researchers to

use simple and cost-efficient 3D acquisition techniques like photometric stereo.

Avoiding explicit surface reconstruction also saves computational time and reduces

the numerical inaccuracies

Biometric Face Recognition Research done by Rafael

General

First Founded in 1948 as Israel’s National Research & Development Defense

Laboratory within the Ministry of Defense, Rafael became incorporated as a

government-owned company in 2002. Rafael has nearly 5000 employees.

Rafael masters leading edge technologies for defense applications and has a unique

infrastructure, including advanced laboratories and R&D centers. Its high-technology

base has enabled it to maintain a leading edge in the world markets.

Page 21: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

21

Background of Rafael Face Recognition Research

The purpose of the system is to automatically identify people from a face databank,

especially people who participated in crimes, who forged identifying documents, were

"caught" in surveillance cameras. It can also be used to exonerate people from false

accusations.

Rafael’s system can unite several biometric factors into one application, for example

immediate identification of face and fingerprints of the same person. The system is

able to use several technologies in order to identify one person.

Rafael made a modification of the "smart card" system, which insures a very high

security level at the entrance to buildings, airports and other important places. The

Smart Card Reader was also developed by Rafael.

Regarding the identification process, there are two lists of data in Rafael’s system, the

"White list" and the "Red list". The white list will include employees or visitors, while

the red list will include suspicious people. The system will identify a person according

to the list, after he is photographed, without his needing to identify himself or

cooperate in anyway. The system will react with an automatic warning the minute that

the person will approach.

There is also the check point system, which enables recording, identification, input

and output of data and photographs into the system.

Rafael has decided to enter the biometric field due to increased worldwide concern

about terrorist attacks (especially in Israel). There is a widening interest in such

technology, especially face authentication, because most of the present biometric

identification methods are considered invasive, i.e. it requires an active participation

of the inspected candidate: placing a finger on the fingerprint identification device or

positioning an eye in front of the retinal scanner lens and so on. By contrast, the facial

recognition methods do not require an active participation on behalf of the candidate.

It is possible to identify candidates from a distance and without their knowledge.

Page 22: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

22

The Israeli Ministry of Defense requested Rafael to research the face identification

and to come up with a new technology in this field. The Israeli Ministry of Defense

program was aimed to identify suspects as human bombers and suicidal terrorists.

The algorithms and the knowledge of Rafael take into consideration, the following

five factors, which are based on the usage of Rafael’s missile system and image

processing technologies:

Pose

Illumination

Expression

Occlusion

Time Laps

All above five factors might substantially decrease the performance of today’s face

recognition systems. One of the problems in face recognition is that all the algorithms

perform normally under ideal conditions, but when those conditions are changes, the

accuracy rates drops. The process of face authentication is done in a few stages in real

time. The novelty of Rafael’s algorithms is in advanced image pre-processing and

sophisticated fusion of different matching engines.

In this technology it is possible to clear the distortion that occurred when taking the

picture such as artificial compression, light damage, shading or blueness of the

picture if taken from far distance.

Rafael uses different extraction techniques:

1) Geometric features matching.

2) Local texture extraction.

The first one represents the general geometric structure of each face and focusing on

a fiducially points on each face. The second features is affected from local texture and

information embedded in the image (such as contrast and skin characteristics and

other facial attributes).

Page 23: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

23

Rafael developed ID facial equipment for recognition system. The Facial Recognition

System is used to automate the search through large facial database and identify

wanted persons in law enforcement scenarios. Typical applications in which the ID

technology will be used are searching for the identity of a suspect whose face image

was captured in a crime scene and also supporting the investigation of a video stream

collected from surveillance or intelligence camera sources for known wanted people.

The system can also clear a person as being unknown to the law enforcement agency.

The main functions of Rafael’s system are:

1. Manage a facial image database of known and unknown people: input new and

updated images, store and retrieve the images.

2. Manage textual data associated with each person whose image is stored: ID data,

known aliases, gender, race, birth-date, case ID, time stamp and other relevant

data.

3. Enroll new persons into the database using a standard digital camera or any

video camera. Pre-process imported and enrolled images in the database, and

create image template and store the template associated with the row image,

ready to be matched with images from analog.

4. Control the quality of enrolled and imported images and classify each image

into quality groups.

5. Match single probe image against all the images in the database and produce a

list of candidates for identification ordered by probability rank.

Advantages of the Rafael Face Recognition Technology

One of the main advantages of this Biometric solution is that it can perform data

fusion of few unrelated biometrics algorithms and provide one improved result.

The system is also advanced in the sense that it can identify a pre-enrolled individual

from the "watch list" as he appears in the camera field of view, without any need from

the individual to declare his identity, and without any participation from the subject. If

the subject is in the "watch list", the system will alert.

The system can find face in any dynamic video:

Page 24: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

24

1) Captures one or more face images and automatically handle all the pre-

processing procedure such as pose, head size, resolution, exposure, blur, etc.

2) Automatically choose the best quality image of the face, and the cropping.

3) Saving the image to the system.

4) Creating the biometric template and save it into a database.

5) Using 2D to 3D state of the art technology.

The system can detect faces as small as 20 x 30 pixels. The unit can:

- Use original database of near-frontal stills, and generate a 3D model during each

enrollment.

- Create additional views at different pose angles, rendered off the generated 3D

model.

The system has a unit for facial verifications that enhance the security level in access

to buildings, airports, and critical infrastructures.

The system consists of the following stages:

1. Enrollment:

Face finding in any dynamic video source such as CCTV cameras, web

cameras or any static image with 8 bit grayscale or 24 bit RGB.

Captures one or more face images and automatically handle all the pre-

processing procedure such as pose, head size, resolution, exposure, blur, etc.

Automatically choose the best quality image of the face, and the cropping.

Saving the image to the system in accordance to all ICAO / ISO standards.

Creating the biometric template and save it into a database.

2. Verification:

Verifies person’s identity from video input against enrolled image.

2 verification options (fully automatic or partially controlled).

Gives the option of verifying 2 static images.

Integrate into the fusion model for outstanding performance.

3. Video Processing

Captures any frame that supports video for windows.

Read/Write/Save options in an advanced video component.

Page 25: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

25

Display the video source in the application.

Following are the two additional research and development fields that are developed

in Israel that identify a person from distance.

Page 26: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

26

4. Voice Recognition

There is no doubt that the voice recognition technology is among the important

biometric technologies.

The voice technology has many advantages over other technologies. In these

technologies it is possible to verify or identify the identity of an individual from

distance. In Israel, one of the leading voice technologies was developed by the

Company Cellmax. This technology was recognized and accepted as an international

standard. We will elaborate on the standard issue in the standards chapter.

This technology, like other technologies, necessitates the storage of the person’s voice

within the database for future identification, and then the comparing of the voice

patterns between the stored voice and the person’s actual voice. This Israeli

technology has high percentages of accuracy in identifying an individual.

The importance of the voice technology recognition is increasing in the globalization

world where international transactions, including payments, business overseas,

international commerce, global communication including communication with vessels

in sea and the use of different types of call centers are being done. Credit transactions

which are done on the phone and different banking transactions all need identification

from distance.

In Israel, the voice technology has gained special attention and developed in a high

level due to the security needs. For example, a terrorist that covers his face and talks

about his activities on television, his voice can be recorded and stored in the state

database. If this person is caught due to terrorist activities, he could be identified

through his voice.

There are many more examples for the usage of the voice technology such as being

able to call a department store, request an item, and pay the amount identified by

voice and receive the package within a few days, or entering a movie house just by

saying “I’d like two tickets, please” or being able to walk into an airport, checking the

baggage and walking onto the flight, safe in the knowledge that the voice at the

check-in proved both the identity and the ability to pay for the ticket. The expectation

Page 27: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

27

that in less than ten years, a person’s voiceprint will be used as the ultimate user

identification tool in the most natural way, whether to operate devices remotely (by

phone or online) or entrances. Standardization is also playing a key role in making

this prediction a reality. The Biometric Committee of the International Standards

Organization (ISO) is dealing with Speech Data Interchange Format for Speaker

Recognition project. The committee’s shared vision is to create a global standard data

exchange file format for raw speech data for speaker recognition. This interface will

standardize voice for makers of hardware, chips, DSPs and the like, but may also

propel the development of all electronic media, from computers to cell phones – even

electrical appliances.

Voice biometrics, meaning speaker recognition, identification and verification

technologies, should not be confused with speech recognition technologies, which

have the ability to recognize what a person is saying but do not recognize who the

person is. By contrast, speaker recognition, verification and identification

technologies can be used to ascertain if the speaker is the person he or she claims to

be.

Voice biometrics is the only biometric output that can be delivered over any type of

communication network. Accuracy rates for voice biometrics are good, reaching False

Acceptance Rates and False Rejection Rates in the infinite of percentages, and Equal

Error Rates of less than 1%.

Around the world, new, higher levels of security are being formulated, that leave

behind the days of single-factor authentication (PIN, password or challenge question)

and call for multifactor methods to ascertain a person’s identity by answering the

question, “Is this person who he/she claims to be?” using three factors:

1. Something the person knows.

2. Something the person has.

3. Something the person is.

Voice technology provides a three-in-one solution. Because voice biometrics is a

complex function created and generated by at least 15 physical parameters, it is both

“something you have” and “something you are”, and the PIN or password, detected

by speech recognition technology, is “something you know”.

Page 28: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

28

Voice biometrics also differs from the other forms of biometrics in that it is a complex

function created and generated by at least 15 physical parameters as follows:

1. Nasal cavity

2. Nostril

3. Lip

4. Tongue

5. Tooth

6. Oral cavity

7. Jaw

8. Trachea

9. Lungs

10. Diaphragm

11. Esophagus

12. Larynx

13. Pharyngeal cavity

14. Soft palate

15. Hard palate

Like the other biometric markers, the result of a biometric measurement of the voice

is totally depending on:

1. Input,

2. Accurate mathematical algorithms, and

3. Computing Power.

An advanced voice biometrics solutions will take, as its foundation, these 15

parameters that create a personal voiceprint and makes calculations in real-time using

a proven, highly accurate mathematical algorithm. The voice verification algorithm

provides a method and system for registering and authenticating secure, voice-based,

e-commerce transactions over telecommunications networks. The technology

provides a method and system for voice registration involving three major steps:

• Fractal analysis,

• Spectrographic analysis, and

• Determination of Lyapunov exponents.

Page 29: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

29

Advanced methods perform fractal analysis, where raw data is investigated and each

sample gives a set of non-dimensional numbers that characterize a speaker’s voice

uniquely. The method also produces a vector consisting of the aforementioned 15

physical voice parameters that form the key index for the verification. The system

performs a spectrographic analysis, investigating the raw data to generate a uniquely

identifiable pattern. The system includes a voice registration unit for providing unique

initial identification by finding the speaker/user’s voice parameters in a voice

registration sample and storing it in a database.

An advanced system will also include a voice-authenticating unit for verifying one of

a plurality of users that includes a recognition unit for providing a voice

authentication sample that operates with the database. The voice-authenticating unit

also includes a decision unit that operates with the recognition unit and the database,

to decide whether the user is the same as the person of the same identity registered

with the system. In this way, the user’s identity is verified absolutely.

Input quality, the most important factor, is greatly affected by the type of input device

(Professional microphone vs. cell phone, for example) and environment (noisy street

vs. quiet office). State-of-the-art voice biometrics will automatically measure voice

sample quality, then correct and clean it to produce the clearest possible data.

Advanced technologies can adapt to voiceprint changes, support input over landline,

VoIP, and have even overcome cellular phone distortion. It can even overcome a

stuffy nose, an adolescent boy’s voice cracking, or physiological changes due to

injury.

In addition to higher levels of accuracy powered by improving algorithms, the

software for voice biometrics solution does not require additional hardware or

infrastructure.

Voice is biometric output that can be delivered over any type of communication

network: landline or mobile phone, wired and/or unwired virtual private network

(VPN), voice over IP network (VOIP), radio network and, of course, local

microphone.

For call centers, voice biometrics is an ideal solution, providing higher levels of

identification and verification while keeping costs low by increasing process

automation. Answering a challenge question takes 20 to 40 seconds, but an

individual’s voiceprint can be recognized by a voice biometrics system within 3 to 7

seconds. Banks, brokerages, healthcare providers and any other institution with a

Page 30: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

30

vested interest in preventing identity theft can also benefit from voice, which is

forecast to become the technology of choice for phone banking, primarily due to

convenience, low-to-no hardware requirement and cost.

Voice also eliminates psychological barriers for users. Many people dislike giving

personal information over the phone, and don’t like the feeling that their

conversations are being recorded. Voice ID and verification eliminates both these

elements, because the person is the password and their voice is the verifier. This has

significance for all voice-based transactions; as approved individuals see that just by

saying a few words, they’re allowed seamless access to the services they’re entitled to,

they’ll feel more comfortable and confident about expanding the range of services

they receive.

Voice could liberate people from cards, smart and otherwise. If your voice is your

identity, you will be identified on the spot, and your service provider or security

operator will have verification that you are you.

The voice system has different possibilities and professional implementations. For

examples, in the field of forensic solutions, an automated mode and half automated

mode have been developed:

A. An Automated Mode, for intelligence needs only. This mode is designated to

operate online and to assist in intelligence assignments. This mode

incorporates additional information, such as Calling Line Identity and a

narrowed down speakers’ list, for speakers that may speak from the same

phone. In this mode a Speaker Verification and a Multi Speaker Verification

are implemented.

B. Half Automated Mode, for the purposes of suspect interrogation and suspect

location according to a voice that cannot be recognized by a human ear, in

certain phone conversations. This mode is different from the previous mode,

due to the need for making Large Scale Identification, and not just Speaker

Verification or Multi Verification. This mode provides a list of suspects out of

a given list. A procedure similar to that of an Automated Fingerprint

Identification System.

Page 31: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

31

Up to the last few years, a forensic voice lineup has been conducted either by a human

Voice Recognition or by using a Spectrogram of frequencies that exist in speech. Few

doubts were raised opposing these methods. Those doubts are linked to the scientific

grounds on which those methods are founded.

A. Can these methods be considered scientific and can they be considered to be an

exact science?

B. Are these methods objective?

C. Can other experts reconstruct the same results and arrive at the same conclusions?

D. What are the error rates for these methods?

E. Are the sources for error in the method known? Both in all that has to do with the

spectrogram itself and in all that has to do with the analysis?

F. What scientific community holds an agreement as for using these methods?

To overcome these doubts today, the new system supports the traditional method but

with a new technology based on computerized speaker authentication it overcomes

the problems.

Page 32: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

32

5. Biometric Signature

Another important biometric technology is the biometric signature which has the

ability to be sent to any distance by combination of software and hardware.

In the global market where connections and commercial business is done from place

to place or from different countries, when companies and individuals need to identify

themselves before making any type of business transaction, a biometric identifying

signature is needed.

In other words, the biometric signature comes to solve the need of identifying a

person from distance in the most secure way.

In the biometric signature, there are all the attributes of a regular signature, meaning

movement, form, organization and pressure. The difference is that in a simple

signature it is hard to identify a forgery as a naked eye will not see the difference

between signatures, whereas, when it is done biometrically, the computer traces the

hand movement like writing itself that is connected to the brain which sends messages

to the hand during the signature and by that it is almost impossible to forge the

signature.

The biometric signature is meant to be used for transferring messages to banks or any

other need that uses distant identification. This technology like most other biometric

technologies needs an identification of the signature in advance. The comparison

between the two signatures, the one which was given in advance, which is in the

database, and the one that is sent by distance is done by sophisticated algorithms. This

technology is able to adjust the signature which is in the database every time that a

new message with a signature is sent. In other words, the algorithms are able to

identify the signature even if it has some changes and update the file with the changes.

This technology mimics the human brain process, so that computers using it will have

the capability to learn from experience, accumulate knowledge, and apply this

knowledge to new situations. The technology takes previously solved examples to

build a system that makes classifications, and forecasts.

Page 33: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

33

In fact, the biometric signature covers the technology of PKI. Therefore, eventually,

the biometric signature technology will dominate the distance authentication, which

means, instead of using an encoded digital seal of 128 bits or more, biometric

technologies will be used.

Page 34: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

34

Future Biometric Technologies

In this chapter, we will present examples of biometric technologies which haven’t yet

been in use or that the use of them is initial and has not gained experience and

therefore is unknown to the public. In some cases, the developments are based on

biometric technology but are not used for personal identification but for impersonal

identification.

The technologies which will be described were developed by universities or by

companies which specialize in the biometric field. These technologies, like other

biometric technologies, are based on physiological or behavioral reactions of the

identified persons.

The innovation in some of these technologies is that the identified person doesn’t

need to have his details in any database and sometimes he even isn’t aware of being

checked. (This type of technology has already been discussed in the face recognition).

Some of these technologies are secret and thus cannot be published, but we will refer

to those which have already been advertised in Israel, some of which are already in

use, such as the following.

1. Biometric Identification by Dogs

As dogs are used for guarding secured places such as prisons, secured entrances,

airports and border crossings, a new research found that the police, military and

guards that are dependent on the dog barks became used to the barking and didn’t pay

enough attention to the barking. The barking could continue for long hours and the

guards could not attach them to a special event and therefore disregarded them.

A study which was performed in Israel in cooperation with the University of

California found that it is possible to translate barking into alarm. There are different

kinds of barking and it is possible to distinguish between the different types of barks.

It was found that all dogs emit the same type of bark when they sense trouble.

Page 35: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

35

Once the barking was classified into different groups, it became possible to develop a

biometric sensor that will distinguish between the dog barks and alert the guards when

trouble is sensed.

This biometric sensor is attached to the dog’s body and senses the dog barks. It then

transmits this information to the security system where the guards are located. The

system receives signals from the dog, and performs a unique digital signal processing

analysis. The data is filtered and passed through an analytical process to determine the

state of the dog, and indicate the one of 3 system alert levels: *No-Alert - The

watchdog is responding to routine events, *Medium-Alert - There is suspicious

activity in the vicinity, *High-Alert - An intrusion has occurred into the dog’s

territory.

The Watchdog Security System can be integrated into existing security systems

(Central Control Systems, home alarm, CCTV monitoring systems, etc.) to effectively

alert and present the security crisis to the required system.

The technology for identifying different types of barks including all the equipment

needed to operate it, was developed by the Israeli company Bio-Sense. Additional

information regarding this company and its technology will be introduced later in the

chapter of Israeli companies.

2. Biometric Identification according to Facial Expression

This technology refers to the face expression and not to the face shape and features.

Over the past few decades, the growing computational capacity led to the

development of a wide variety of real time image processing applications that can

replace the human eye.

Human beings can usually detect emotional signs in other humans’ facial expressions

and infer their underlying emotions. However, up to date, no satisfactory automatic

method could quantitatively map facial expression attributes to real life emotional

stimuli.

Page 36: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

36

The researchers at Tel Aviv University developed a method which enables to

statistically relate a facial expression and the stimulus that arouses it. The results show

that the probability of guessing the stimulus from features extracted from facial

animation points is higher than the prior probability. That is, for the first time, it is

possible to point out on a systematic approach for automatically relating facial

expressions to emotional stimulus. This biometric development will lead to a new

technology where there is no need for a template in a database for identifying

suspicious people as it will be done on the spot without having to compare previous

information.

An interesting application to this capacity is the detection of a person’s emotional

state from his/her facial expression. Efficient algorithms to this problem could yield a

whole variety of systems in the fields of security, particularly in identification of

suspicious people, medicine and more. Up to date, no satisfactory automatic method

could quantitatively map facial expression attributes to real life emotional stimuli.

Details of this research:

Classical psychology studies claim that there are six basic facial expressions that

express emotions which are recognized all over the world and in all cultures. The

classic facial expressions are: happiness, anger, sadness, surprise, disgust and fear.

These six basic facial expressions proved that a spontaneous change in face

expressions, which represent the six basic facial expressions, occurred in almost a

similar frequency both among Japanese subjects, American subjects, as well as among

European and Israeli subjects, as a reaction to watching a strong emotion raising

movie. These studies show that different facial expressions, which are composed from

the basic facial expressions, aren’t culture tied and thus can be identified with no

connection to the identity of the subject.

A study conducted in Tel Aviv University by Dr. Nadav Nechmad, presented the

methodology of characterizing facial expressions through a computer and finding a

connection between stimuli and a change in the facial expression and the person’s

emotional state. In this field, in contrast to face identification which purpose is to

identify the person, the study’s purpose is to find the statistical connection between

the stimuli and facial expression, which will be applicable to everyone.

Page 37: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

37

Such applications can serve, in the future other systems, in the field of security and

medicine, which use the person’s eye for diagnosis. Thus, for example, it is possible

to locate suspects in airports or to diagnose patients’ mental state according to their

facial expressions. An additional field of applications which opens a full world of

possibilities is the interactive computer games, where the game depends upon the

user’s facial expression. There is no doubt that it will be possible to develop an

application which can diagnose a person’s mental state according to his changing

facial expressions, even partially, which will be a tremendous achievement that will

serve in many fields.

The classic studies claim that basic expressions of emotions and accordingly facial

expressions are directly connected to a specific neurological brain structure, which

characterizes these emotions. Their claim is that the connection isn’t between

emotions and facial expression, but between certain components of the emotion and

facial expression, as the facial expression is composed from several emotions.

The researchers claimed that most of the studies which were conducted focusing on a

relatively small collection of facial expressions such as happiness, sadness, fear,

surprise, etc. In their opinion, many other studies are needed as facial expression is

actually divided into 44 units, which divide into further sub-units. These sub-units can

be used to characterize and categorize people’s different facial expressions. Also,

showing initiated emotions, aware of the request to do so, is totally dissimilar to

spontaneous and unexpected facial expression of a person in reaction to surprising

stimuli.

The Israeli researchers focused on finding the relationship between external stimuli

such as a computer game and spontaneous reaction such as facial expression of their

subjects. They claim that it is possible to classify the different facial expressions that

were expressed by the subject according to the type of the stimuli and to assume, in

correlation, what was his emotional state when his facial expression changed. They

claim that it will be possible to build a tool which will analyze the emotional state of a

person before exams.

This research was conducted with people from different cultures. Therefore they

claimed that facile expressions are culture independent.

Page 38: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

38

The disadvantages and doubts about this research:

The facial expression method is being doubted by some researchers who claim that

the difference of culture and education, do effect the person’s reactions and facial

expressions.

They also claim that some people will not express emotions when they are among

certain people, whereas when these people are among other people they will express

strong emotions and therefore it will not be consistent to follow their facial

expressions.

The opposing researchers claim that emotions are a collection of social components of

the person’s reaction towards his environment and thus facial expression cannot

describe the real emotions that the person feels, but his interpretation to a changing

environment.

3. Automatic Identification, Surveillance and Tracking in Open

Spaces

Identification surveillance tracking technologies are developed for security reasons

such as tracking people crossing borders or crossing in unauthorized places. The

identification is impersonal but it will isolate and identify person from other objects.

There are many problems in the identification surveillance and tracking in open field

due to natural factors that could affect the identification in the open filed like winds

that throws objects in the air, changes of lighting at different times of the day, or

sometimes different background colors or objects that are in the background that

could affect the identification of the person. All these factors may cause false alarms

or unnecessary alarms, or no alarm at all, even if there is a need.

Thus, the system’s operator can become complacent, with the many false alarms.

Reducing the sensitivity of the system will reject only some of the false operations,

Page 39: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

39

and as a result of that, the quality of the performance will deteriorate. Thus, the

optimal solution must be found in the algorithm that knows how to treat false alarms

and not to ignore them.

In order to overcome these problems, a research was conducted at Tel Aviv

University by Dr. Yair Dalal. Its purpose was to build a smart camera for

implementing automatic surveillance in order to overcome these problems. The study

presents an algorithm and a "smart camera" system for real time applications of

automatic supervision in open field, such as identification of object’s movements. The

form of objects can change during their motion, and the general rules of motions are

known. The algorithm that was developed during the research has the following

advantages: Identification of moving objects, even if they are gray color or are similar

to the background where they move. The form of objects can change during their

motions, so that the algorithm can treat the three dimensional motion of viscous

objects. The algorithm copes with situations of extreme and continuous changes in the

lightening level which include the field of vision. The algorithm can cope with a large

variety of motion speeds: deviation of small and big objects is identified by the

system, including situations where the bodies stop for different periods of time during

their motion in the field of vision. The algorithm can function in the presence of

several objects in the field of vision and in the presence of noise that can cause false

alarms. Objects can move as groups close to each other or separately to different

directions and the algorithm follows after each group of objects that move together.

Because the algorithm is efficient, quick and works with reduced pictures, it is easy to

apply in commercial systems for real time applications.

Also, in order to test and to prove the system’s efficiency, the algorithm was

examined in various cases, some of which are presented in the research. The examples

are supposed to observe the functioning of different parts in the algorithm’s coping in

extreme situations. The results shown in this work show that the system managed to

cope with the demands that were targeted.

The new camera development distinguishes between different types of disturbances

and copes with them. Meaning, it is possible to use it for identifying motion, for

identification and for tracking undesired people and for surveillance. The performance

Page 40: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

40

quality of the algorithm for motion discovery mostly depends upon its ability to

ignore false alarms.

The combination of camera-processor demands the ability to observe the scene, such

as a parking field, and to alarm guards when an extreme event occurs, such as the

motion of a car or a person entering the field. It is necessary that the system will be

"smart" and able to successfully distinct between an undesired person or object and

other activities in the scene, such as the motion of animals, the motion of wind among

the trees, clouds, etc. There are two types of disturbances: cyclical disturbances that

occur in the scene through long period of times and passing disturbances.

Following are the algorithm’s features:

The input - the information that will be received by a single video camera will

not change its place during surveillance.

The size - during surveillance, the body will be approximately a hundredth

from the size of the picture area.

The structure - the body for identification does not have to be stiff and will

not have to have strait angels but can even be similar to a viscous item.

The contrast - the system will know how to deal with cases that the

brightness of the body will be similar to that of the background.

Texture - there will need no difference between the texture of the bodies and

the texture of the background where they move. This requirement may ease

the identification since it is possible to differentiate between moving objects

and their background.

Multiple items - the algorithm should be able to deal with a number of

moving objects simultaneously in the field of vision and in different directions.

For example: a number of people moving in different directions.

Movement - there is no need that the object for identification will constantly

move in the field of vision. This means that during certain times, the object

will not change its place. The algorithm will need to also identify the object at

non movement.

False activation - the system needs to be able to cope with false cycled

activations and with false passing activations.

Page 41: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

41

Light conditions - the algorithm copes with changes of lighting. It will be

possible to distinct between gradual changes of lighting and sudden changes of

lighting. Gradual changes of lighting occur because of changes in the sun’s

angle and following those changes in the shadow projection near the detector.

Sudden light changes occur as a result of lighting, lights of a passing car, a

moving cloud, a passing airplane, etc.

Starting conditions - it is possible to assume that when the system is started,

there are only objects that compose the background in the field of vision,

without other objects.

Speed - the algorithm will perform the processing in real time in a small and

inexpensive system.

4. Biometric Development for Identifying People in Closed Places

This technology comes to solve the problem of hiding terrorists and unauthorized

passengers in shipping containers, closed objects such as cars, closed cabins with

double walls or forgotten children in cars.

The system connects wirelessly to a sensor in the car and senses motions. Therefore it

can identify a person within the car or the container.

The original system is composed from a combination of sensors that are connected

together through wireless or linear communication, that transmit data to a collecting

box, which incorporates all the sensors’ data. The box integrates them and transfers

the information to a software program that performs an attribute of a motion that was

recorded by the sensors. For example, the system will identify a person that tries to

connect illegally to an oil pipe or a person who enters a protected area with sensors.

The systems can distinguish between a person’s motion and an animal’s motion.

This application is already used at the Israeli customs border crossing. This biometric

development joins the list of new developments that help people in specific fields and

the identification is impersonal.

Page 42: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

42

5. Biometric Applications for Identifying Objects

The biometric theory refers to the identification of behavioral and/or physical

characteristics of people that is measured by sensors and used by algorithms.

This research suggests an application for identification of different forms and objects,

and at the same measure identification of different targets using the biometric idea.

These methods carry reference images that remain in memory, and when needed, a

comparison is made between the reference image and the image of the object

identified like in the biometric perception.

In a research conducted at Tel Aviv University by Dr. Oren Gelbert, an algorithm for

general identification was developed. The algorithm was for identifying two

correlating dimensional forms that are invariant to the imaging transformation and the

light conditions. Thus, even if the photography conditions of the objects are different

from the reference image, nevertheless, the algorithm identifies the desired form. The

uniqueness of the algorithm is in the combination of two attributes:

1) It takes care of all the geometric distortions which are part of a typical

transformation (meaning motion, circle, change of size and inversion in any

angle).

2) Based on the correlation method, and thus there is no need of former

information about the two dimensional form needed for identification.

Another important attribute of the presented algorithm is the ability to measure the

imaging transformation parameters. This is especially important for application where

they need the placing and orientation of the camera in reference to the target, such as

automatic navigation systems, which are positioned at the head of missiles. Such a

system can take air photographs of points along the needed flying course, and any

time that the system will pass through such a point, it will identify and calculate, by

the parameters its relative placing to the photographed point.

As mentioned, it is also possible to use algorithms for identification of targets. The

Automatic Target Recognition is a system which purpose is to observe one site

through a two dimensional sensor, such as a video camera, to locate and recognize the

Page 43: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

43

image in order to locate the appearance of a known target (or several targets). The

uses for Automatic Target Recognition systems are varied – starting from surveillance

systems and entrance control (opening electric gates with the appearance of a known

body), and automatic navigation systems in unmanned flights (such as in missiles). It

is possible to insert into such a navigation system a satellite image of points along a

needed course and each time that the system will pass around one such point, it will

identify it and correct the flight course according to its relative position to the

photographed point.

The attributes of the Automatic Target Recognition system are:

A positive identification (meaning the system’s decision that the required

object appears in the image) must be verified at the utmost confidentiality,

because most of the Automatic Target Recognition systems are integrated in

unmanned weapon systems against an object that isn’t the desired target. The

chance for false alarms in the system is a measure to its security.

Non-identification means that the system doesn’t recognize the desired object

in the image in spite of the fact that it appears in it. Non-identification means

that the system will not achieve its purpose, and thus the chances for non

identification are a measure for the system’s quality.

There are almost no limitations on the type of targets, baring the fact that the intention

is to recognize two dimensional forms, and thus the target needs to be relatively "flat",

(such as flight course in an aerial photograph), or that the target is composed, among

other things from a specific surface, which can be recognized (such as a car’s front,

that includes lights, license plates and a grill).

There is a minimum of information regarding the character of the desired target. In

fact, it is strived so that the sole information that will be fed to the system will be an

image of the target (recognition image), this in contrast to the Automatic Target

Recognition, which depends upon attributes that were known before, such as specific

geometric attributes. The reason for this demand is the ability to feed into the system

targets for identification even in the field in as little time as possible. Under these

conditions, we will usually have only few images of the required target. The feeding

will be done by a non-specializing operator, which obliges an automatic input process

Page 44: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

44

and doesn’t enable in-depth analysis of the target. Also, the minimum requirement is

early information, which enables flexibility in the choice of targets, because uniform

targets will not be limited.

During the systems regular operation, it will capture from the video camera a single

image, where the desired target may appear. It is possible that the application of the

algorithm where an endless loop occurs of input-identification (without early stage of

target discovery), and it is possible that the trigger to the process of identification will

be external, such as a motion discovery system, that will perform a primary process

for the input picture.

The space can be photographed in different angles and different distances by different

lens and varied lighting conditions, so that the fed image, at the beginning - at the

stage of target recognition can be very different from the image which is received

during the identification stage. It must be also remembered that photography under a

relatively sharp angle to the photographed space or when the target is only on a small

part of the space, it will cause the little information sent by the target by the sensor,

which will affect the reliability of the identification. This too must be taken into

account during the algorithm decision making.

Early algorithm must be quite quick, because the maximal period between the

beginnings of processing one picture to the beginning of processing a tracking picture

will be relatively small to the period that that target is in the picture. This can prevent

the situation where the algorithm is busy with checking the former image, and during

that time, the algorithm is busy in examining a former image, will pass in the field

without being identified and recognized. This demand throws on the planning and

implementation of the algorithm and the structure of the entire system.

As it can be seen, the biometric technology can be implemented in different ways

such as in the industry, Medicine, Security and military.

Page 45: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

45

The Israeli Government

General

It seems that governments that were directly hit by terror or those that fear it are

encouraging the development of biometric technologies for protecting their citizens.

Within its institutes, it included local industry, schools, and public places. One such

example is the USA which, from September 11th, 2001, changed all the surveillance

of people entering the USA. Today, biometric technology takes an important part in

the lives of USA citizens and, in a certain level, in the lives of those who enter the

country.

Israel, suffering terrorist acts throughout its existence is making great efforts in this

field. A good example for this kind of efforts is the border crossings within the Israeli

states illustrate the advantages of using biometric identification. Three types of

biometric identification methods are used simultaneously in order to identify the

travelers to Israel: hand biometric data, fingers and face technologies.

The Israeli Government

The Israeli government established a Ministerial committee for advancing biometric

technologies in Israel. A specialists’ committee was established in the Prime

Minister’s office, with members from different government offices and Intelligence.

The role of specialists is to implement the biometric technologies within different

government offices. This government committee for biometric applications acts for

merger and coordination between the different projects, regarding data sources and

information import. The last field is an important part of the process. The government

decision is that before trying to develop local inventions, the committee should strive

to locate, import and alter it according to Israeli needs. All is done according to Israeli

standards by the appropriate factors.

The committee was also asked to examine the need and possibility of using biometric

applications in state services: for preventing frauds and improve general security in

government offices and organizations. They were asked to examine the biometric

Page 46: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

46

applications, the existing standards and to determine special rules for government

offices, regarding adoption of biometric applications, taking their special needs into

consideration. The specialists also determined the necessary list of equipments and

technology which are appropriate to the different government offices. For example,

the government leads two large national projects: electronic ID and electronic

biometric passport. When the passport will be available, it will be used to monitor

entrance of people into the countries that will adopt the biometric passport.

The government makes specific decisions regarding biometric subjects every once in

a while. For example, the government decision from 2005 which concerns the Justice

Ministry Memorandum about identity cards and travel cards with biometric

parameters. The Memorandum includes legislation changes needed for including

biometric identifiers in the "Smart Identity Card" in passports and other travel

documents. These identifiers will be correlated to the USA government and the

European Union’ demands, and according to the LCAO, ISO and NIST. The Israeli

interior office and police will use biometric means for border inspections. The interior

office and police will conduct a supervised experiment of issuing identity cards and

passports with biometric information. In its winter session, the government decided to

submit a legislation regarding population registration, including identity cards and

travel cards with a computerized photograph like used in the driver license.

We will present several examples of governmental decisions regarding the use of

biometric technologies that will show the importance that the Israeli government

imparts to these new biometric technology.

The government decided to establish a committee with representatives from the

Internal Security Office, the Police, the Interior Ministry, the Intelligence office, the

Treasury Ministry, the Justice Ministry, the Military and the head of the State

Comptroller in the Prime Minister’s Office.

The committee will examine the need for using a technology, taking into

consideration concepts such as protection of privacy regarding the use of

biometric applications in the State Service, for fraud prevention and security

improvement.

Page 47: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

47

The committee will work with the Accountant General, who is responsible for

the development and maintenance of public computers and smart cards in the

government.

The committee will examine the existing standard biometric applications, and

set appropriate rules for the government offices for adoption of biometric

applications.

The committee will examine each application by the relevant office, and

taking into consideration the needs of each office for using biometric

applications. This decision will not delay any work which is already conducted

regarding the advancement of biometric applications in government offices,

including inter-ministerial working groups, which advance the program for

applying biometric applications regarding foreign workers or law enforcement

agencies.

The committees that work towards advancing the use of biometric applications

in government offices will report every six months to the Ministry committee,

regarding the advancement of their work.

Another decision was to establish a general information center in biometric subjects

within Rafael, the governmental company. Rafael will establish a center for biometric

technology information this information will be available to all government offices.

The government also determines to conduct experiments of biometric products

according to international standards and appointed the committee to prepare Israeli

standards to biometric products in correlation to the relevant foreign standards. The

government bodies will examine any application that must be used in order to make

the process more efficient, to reduce expenses and to enable exchange of information

between the different bodies. The intention is to achieve a confirmed list of products

that governmental bodies could use in the future, with no need for further checking.

The head of the professional committee declared that there is no contradiction

between secrecy, high security and standards. The basic biometric technology

principles are known principles. Like in the digital signature, here too the architecture

is known and open, the passwords and authorizations are personal and kept secret.

Page 48: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

48

Another decision concerns biometric means for computer systems users. The Israeli

Standard Institute will perform tests of products and software according to the

committee’s decisions.

An additional application is the integration of biometric technology in the "Smart

Identity Cards". This card must integrate biometric identifying means and strengthen

the processor. Without biometric means, the forging of the card is easy, and thus can

be used for illegal activities. It is expected that the growing use of biometric

identification means is expected to affect the war against crime and fraud. It will be a

great saving of resources, enabling a change in the current use of single method

applications, and preventing many frauds in fields such as credit cards, automatic

bank equipment, ATM, online commerce, etc. In fact, today, it is very easy to use a

credit card which isn’t your own, transfer money from others’ accounts and commit

frauds in commercial purchases. An intelligent use of biometric means will stop these

acts.

Biometric Picture Database in the Government

A. Biometric applications can be applied to the government pictures database. The

pictures that will be taken in the future will be of a quality that will enable biometric

use.

B. The inter-ministerial committee for biometric applications will prepare, within a

period of six months, a proposal regarding biometric applications that will be

assimilated in part of the documents issued by the Interior Ministry in order to

increase the ability to identify and verify the identity of the holders.

C. The Treasury’s Budget Supervisor, together with the inter-ministerial center, will

hold an operating framework for several leading pilots in the government. The

projects will be in the following fields:

1. Projects in the field of improving border crossing, which will be able to

identify people who are forbidden entrance.

2. Projects for identifying foreign workers.

Page 49: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

49

3. Projects for prevention of fraud and increasing the identification possibility of

bodies who are receiving government payments.

4. Projects in the field of entrance control to computerized systems.

D. The specialist committee will report to the Minister's committee every six months.

The report will include a detailed work program in the different fields of their

biometric work including goals, budgets, resources and schedules for operation.

In addition, border crossing identification will be done using a smart card with

biometric technologies.

In the field of information security, the Israel Standard Institute will establish an

information center for biometric technology applications, with a database regarding

their validity. The information will be given to any government representative.

Furthermore, the government decided to enhance a biometric technology pilot in the

Social Security Institute, in order to prevent frauds which mean that receiving money

by this institute will be done only with biometric identification.

The Ministry of Transportation started to replace the driver license of the citizens of

the State of Israel to new biometric license according to the international standard.

The photographing of the driver is done by a new biometric system that preserves the

person’s identity for many years without having to change the license.

There is a lot of activity in governmental offices regarding the advancement and

implementation of biometric technologies, in accordance to the specialist committee

rules about the implementation of biometric technologies. For example, the General

Comptroller's Office conducts experiments for using different biometric technologies

in the Israeli Court Offices.

These are only some of the examples from the many activities that the government is

initiating in this field.

Page 50: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

50

In order to increase the awareness of the biometrics subject among the Israel public,

the government publishes information regarding new biometric technologies,

including the use of technologies by the government itself and by other institutes. It

also publishes special biometric events that occur all over the world. The publications

seem effective as there is much public interest and awareness regarding the biometric

subject.

In addition to the Prime Minister’s office Specialists’ committees for implementing

biometric technologies in government offices, there is a special department in the

same office, which role is to follow the instructions of implementing biometric

technologies in the state’s service. This department also follows the performance of

the State’s Comptroller’s recommendations. The role of this unit will be to follow up

the committee’s recommendations and to enhance different stipends and services. In

the field of improving services and the availability of online government services, the

use of single identification method can remove the last barriers for online services in

every field, anyplace, anytime. It will be possible to conduct businesses in a secure

and safe environment.

In fact, biometric technology leads to an organizational revolution in the government

services. Using biometric identification changes the service in many government

offices, such as the Employment Services. A year ago, the Employment services

began to use services based on biometric identification by fingers’ scan. The results

are clear. There are no queues; there is almost no need to enter the offices. The

interaction is made through biometric kiosks, which stand in the offices vestibules.

After the primary identification, the identified person receives job offers on the screen

as well as a printed output, and can begin to look for work.

Page 51: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

51

Government Offices - Purchases Biometric Technologies

The governmental purchase of biometric items is done directly through the offices’

management, according to the Prime Minister’s Biometric Specialists Committee’s

recommendations. In addition, there is also a list of recommended technologies. Each

office decides which biometric item it needs. It can be the face technology, the Iris or

the fingerprint, or any other technology that the committee decided that is appropriate

for government offices.

Before purchasing the appropriate items, the ministerial office asks for information

from the biometric technology companies. After the companies replay and submit

their information, including the request for information questionnaires, the

government conducts a tender between the companies that hold the appropriate items.

For example, the Airport Authority purchases different biometric items, and thus

enables the use of biometric technologies in the entrance to Israel, which include the

use of smart cards and a combination of hand and finger identification, which saves,

and reduces the time for standing in line. There are thoughts to add the face

identification technology when entering the country in order to broaden the security.

The Face technology is also considered for using when leaving the country, because it

can be easily integrated with the existing five finger identification. The intention is to

install a new system in the Airport which will shorten the identification stage when

leaving the country through a biometric identification system.

The surveillance system at the airport began to use a new computerized system, using

fingerprints for identifying the travelers’ identity. The system will be able to identify

forged passports through a comparison between the traveler’s fingerprints and the

information stored in the security and interior office databases. The biometric system

is supposed to warn in any case where a person will try to gain entrance through a

false identity and forged passports.

Recently, a new biometric identification method was developed for preventing the

forging and selling of Israeli passports to hostile people. The phenomena which is

Page 52: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

52

widespread in Eastern Asia among the Israeli travelers, is spreading and the Defense

Ministry fears that the purchased passports could be used by terrorists.

Another important advantage of the system is the reduction of friction between the

Airport’s surveillance officers and minority groups, who usually have to pass through

grueling examinations, which often give rise to complaints from the Israeli Arabs.

In the first stage, the system will only operate partially and experimentally, and will

examine 15,000 passengers, mostly from the Israeli business sector. In the next stage,

the intention is to operate it fully, and thus all the travelers will pass through it. The

hope is that the system will shorten the security check queues and will reduce the

passengers’ need to answer annoying questions.

Nowadays the system is based on a database of travelers’ fingerprints who signed a

biometric border passing smart card, as well as the surveillance database, which

contains all the fingerprints of anyone who served in the IDF and all who were

arrested by the police. The Ben Gurion Airport Authorities promise that the use of

information, which will be gathered by the citizens, will only be used for primary

security checks, but the operation of the system is expected to raise strong opposition

and will have to receive the endorsement of the Israeli parliament.

The idea of integrating biometric technologies, is the ruling approach nowadays, and

will control both the exit and the entrance ports to Israel.

Page 53: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

53

Criticism for Using Biometric Technologies

The intensive means that the Israeli government uses to advance the biometric subject

causes much criticism. Fear from the "big brother" figure who has details on all the

citizens in its many databases is at the basis of the criticism, which is aired in different

newspapers, as can be seen in one example, in an article at one of the leading Israeli

papers: Maariv (15.10.07):

"The big catch in the right for privacy is the fact that it is taken from

us in small portions. Here a security camera in each street corner, there

the police listen to telephone lines, and now requests of free approach

to the cellular companies’ databases. This without speaking about the

Airport’s x-ray screening machinery, which seem quite natural to us,

and these are only the things that we know about. In the last years, a

complete industry has developed which purpose is to turn us

completely "transparent". The reasons is almost always the public

safety, fighting crime and terror - and those who protest citing

Orwell’s prophetic 1984, is perceived as a suspect, who wants to hide

something.

In the technological era, privacy is a basic right for luxuries and the

big trouble is that in addition to the personal price that we pay for such

transparent lives, the high dependence of the security forces, the police

and government on technological means, doesn’t necessarily achieve

its goals. Maybe even opposite, for example, the surveillance systems

of the USA had all the information regarding the terrorists’ intentions

regarding the 9.11 events, they only didn’t know how to interpret their

data. In fact, security forces admit that depending on technology

causes cognitive laziness and causing fear among a large section of the

public.

The problem is that the "big brother’s threat is all around us. The

combination of all the organizations creates the highest risk that will

prevent any of us to be who he wants to be. The right for privacy is

only appreciated when it is taken from us". It is maybe difficult to

argue with the advantage of using finger prints in the Airport, it must

Page 54: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

54

only be recalled that no one can promise us that here is where it will

all end".

On the other hand, the Head of the Professional Committee explained that, in fact, in

order to keep privacy and to prevent illegal follow-up such as the "big brother"

scenario, the projects are accompanied by legislators from the Justice Ministry, who

specialize in privacy protection. Many of the discussions within the governmental

biometric committee are about keeping privacy laws alongside information freedom.

In fact, the technology by itself isn’t bad, but sometimes a situation can occur where

criminals will use the technology for unlawful purposes. Technology shouldn’t be

obstructed, but should be deeply examined and used carefully.

In the same paper, another criticism claims that:

"The question regarding the governmental databases and their uses is

at the center of a battle raging within the Constitution Committee. The

legislation that raises such opposition is about giving the police direct

approach to the information databases of cellular phones companies

and the Bezeq telephone company. The subject raises such high public

outcry because it may enable the law enforcement agencies the ability

to enter into the private lives of each citizen, without supervision or

need of legal endorsement. Yet those who are for the law claim that it

will only shorten processes, without allowing the police more rights

than which it already enjoys. Recently, the committee members

discussed how it will be possible to establish these databases without

damage to professional’s privileged information, such as doctors,

lawyers, social workers and religious figures…"

The worry and fear from the big brother’s open eye is also expressed in Sara

Frenkel’s article, "Someone’s watching us". In this article, the writer indicates that the

big brother’s eye is open? Yes. But our eyes are also open, as we consider the need

for surveillance means against terrorists and forgery of smart cards. The writer quotes

the head of State Audit Department "many fears are expressed regarding databases

that can be used by criminals. Our challenge is on one hand to have the best means for

serving the state and its citizens and at the same time, we have to prevent the "big

Page 55: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

55

brother" situations". The head of State Audit Department continues and says that he

will "minimize the privacy invasion and ensure not to make bad usage in the existing

technologies". The issue of holding databases raises many questions as to the

information that the database will provide to those holding it, whereas on the other

hand, "we do not want to live in a country where all our actions are known to

someone". He also says that privacy invasion needs to be balanced between the public

interest and defending large publics from terror. He brings an example from Israel’s

everyday life - If a person would like to enter Israel from Gaza strip and does not

want to give biometric identity, he may need to wait in line for as many as 6 hours

until an investigator will come to identify him whereas if this person once gave his

biometric information at the border, it will take him only a few minutes to cross the

border to Israel".

The Israeli government is also aware of the citizens fear from the "big brother"

situation and therefore according to the decision that was reached by the specialist

committee for coordination, which included representatives from different ministries

decided that the balance between the need to protect the citizen and invade his privacy

will be well examined and taken all precautions that will be needed."

Page 56: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

56

The Biometric Standardization in Israel

General

Israel sees the great importance in the international standardization which is lead by

the Israeli Standardization Association. This association has put for itself two main

strategies in this field on its agenda. The first is getting the Israeli standards to

correlate to the international standards. To date, about 40% of the Israeli standards are

adopted from foreign standards. The second strategy is getting Israel to be active in

helping in preparation and writing of the international standards.

In recent years, Israel has invested in identifying the different potential fields for

standardization to participate in the international standardization. It established new

committees that its representatives are mostly from the Israeli industry and

government agencies. These committees are in constant connections with the

international committees. In Israel, there are nine active "mirror committees" that are

working to identify the needs and to initiate international standards and to participate

in preparing these standards.

The Israeli Standardization Tasks

One of the main tasks of the Israeli Standardization Association is to bring the Israeli

industry to be more involved and knowledgeable in the international standardization

and perhaps be influential on the international standards. Israel is active in

approximately 250 international committees which are both technical and sub-

committees. There are approximately 70 specialists that are active in working groups

of the international standardization, among them 10 are in the biometric field.

There are six active Israelis that serve as Project leaders in the international

standardization committees.

Page 57: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

57

The Matching Committees

Another initiation that the Israeli standardization association has made is

establishment of "matching committees" and a matching committee for biometric

standardization. These committees are working in parallel to the international

committees and are in constant connections with other biometric committees. They

need to identify Israeli standards that need to be updated and to regularly maintain

them and to write comments to the international standards that are being prepared.

The Biometric Committee in Israel

In 2006, different "mirror committees" were established, and among them the

biometric authentication committee was established. This committee is meant to

follow and take active roles in the international standard committee ISO-JTC1/SC37

in order to leverage the international standards and to promote the Israeli biometric

industry. This committee has ten members from different active companies and the

government sector. The committee holds regular meetings. During 2006-2007, the

committee has placed two draft standards, one of which became an international

standard.

1. Voice Data File Format

2. Biometric Graphic Signature Data Exchange Format

The Voice Data File Format was accepted and became a standard based on the

technology which was developed by the company Cellmax (details about this

company and its technology are in the voice authentication chapter and the industry

chapter).

The request to be recognized as an international standard for Biometric Graphic

Signature by the Israeli company is still pending.

Page 58: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

58

The Lack of Standards

The lack of standards creates confusion as it is needed to rely on manufacturers who

will present its products as being best quality. When there is no standard, there is no

definition for the quality of the product.

Before September 11th, most of the Biometric standards dealt with fingerprints. The

first standard was Data Format for the interchange of ANSI/NIST ITL1-2000

Fingerprint, Facial & Scar Mark & Tattoo Information was published in 1986.

Following this standard, an additional standard was published by the FBI that also

deals with transfer of information in this field, “Electronic Fingerprint Transmission

Specification”. In addition to these two standards (and standards in similar subjects),

that are the basis for information exchange between authorities with respect to

fingerprints and law enforcement worldwide, at the end of the 1990’s, the first

commercial standards in the biometric field were published. But only after September

11th, even the international community realized the need for specific standards in the

biometric field and became more involved in their preparation. During June 2002,

ISO authorized the establishment of a secondary committee for the preparation of

generic biometric standard - ISO/IEC JTC1 SC37.

The Israeli Standardization for Biometrics

Up to date, Israel has adopted 8 out of the 20 international standards in the Biometric

field that exist and is working on adopting all other ones. To accept a standard, it is

needed to have at least 75% of the votes of the committee’s members. Once a

standard has been approved according to a certain technology, all other companies

that develop similar technologies adjust their technology to the standard and try to

enrich it. If they manage to enrich the technology, a new standard needs to be issued.

Adaptation of an International Standard

The process of adopting a standard in Israel goes through a committee that first

checks that the standard does not contradict an existing law or regulation. If needed,

Page 59: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

59

the international standard will be customized to the Israeli needs but up until now,

there was no need to customize any of the adopted standards, which means the

international standard was accepted as is.

The Standards that have been Adopted by Israel

1. ISO IEC 19794-5:2005(2) - Automated Face Recognition

The first part of this standard gives a format for face recognition applications

requiring exchange of face image data of typical applications.

a. Human examination of facial images with sufficient resolution to ascertain

small features.

b. Human verification by comparison with facial images.

c. Computer automated face identification (one in many searching).

d. Computer automated face verification (one in many matching).

Face Image Data

- Specifies a record format for storing recording and transmitting the information.

- Specifies scene constraints of the facial images.

- Specifies photographic properties of the facial images

- Specifies digital image attributes of the facial images.

The standard gives definition to common terms used for the standard. This unifies all

terms internationally for instance in the face biometrics:

The face is divided to the different parts and each part is characterized such as:

- Chin: The central formed position of the lower jaw.

- Color image: continuous tone image that has more than one channel each of which is

coded with one or multiple bits.

There are many factors that are taken into consideration such as gender, skin and hair

color. Different masks such as glasses, beard, moustache, eye blinking, eye patch or

any other health problems that could affect the face.

Page 60: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

60

2. ISO IEC 19784-1: 2006 (E) - Biometric Application Programming Interface (API).

This standard provides a high level generic biometric authentication model suited to

most forms of biometric technology.

An architectural model is described which enables components of biometric system to

be provided by different vendors and to inter-work through fully defined application

programming interface.

There is hardware or software that performs biometric functions such as capture

matching or archiving. These parts of the architecture are called BIOAPI units and

can be integral to a BSP (Biometric Service provider) or can be supplied as part of a

separate BIOAPI Function Provider (BFP) component.

3. ISO/IEC 19794-1:2006 - Information Technology - Biometric Data Interchange

Formats - Part1: Framework.

This standard is split to 6 parts which all of them were adopted by Israeli Standard

Association.

Part 1 - The Framework

Part 2 - Finger Minutiae Data

Part 3 - Finger Pattern Spectral Data

Part 4 - Finger Image Data

Part 5 - Face Image Data

Part 6 - Iris Image Data

Still under preparation are:

Part 7 - Signature/Sign Behavioral Data

Part 8 - Finger Pattern Skeletal Data

This first part of the standard is intended to describe the general aspects and

requirements for defining biometric data interchange formats.

The notation and transfer formats provide platform independence and separation

syntax from content definition.

Page 61: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

61

Social & Jurisdictional Issues

Harmonized Biometric Vocabulary

Biometric Interfaces BIO API, BIO AMI, and Card Interface

Biometric System Properties Biometric Profiles, Security Evaluation,

Performance Evaluation

Biometric Data Security Attributes Confidentiality, Integrity

Biometric Formats, Framework (CBEFF) IDS

Biometric Data Interchange Formats

The above figure shows the interrelation of biometric related ISO/IEC standardization

field. Biometric data complying with Biometric Data Interchange Format of ISO/IEC

19794 represents the care component of biometric interoperability. Biometric formats

frameworks such as ISO/IEC 19785 (CBEFF) serve as a wrapper around biometric

data. Since biometric data are sensitive data and subject to attack, cryptographic

protection is required in interchange environments.

Conceptual diagram of general biometric system

It is difficult to draw generalizations about biometric systems all such systems have

many common elements. Biometric samples are acquired from a subject by a sensor.

The sensor output is sent to a processor which extracts the distinctive but repeatable

measures of the sample (the "features"), discharging all other components. The

resulting features can be stored in the database as a "template" or compared to a

specific template many templates or all templates already in the database to determine

if there is a match. A decision regarding the identity claim is made based upon the

similarity between the sample features and those of the templates compared.

4. ISO/IEC 19794-2:2005 - Information Technology - Biometric Data Interchange

Formats - Part 2: Finger Minutiae Data, for implementing interoperable biometric

recognition systems.

This part establishes a data interchange format for minutiae- based fingerprint capture

and recognition equipment. Representation of fingerprint data using minutiae is a

wide used technique in many application areas.

Page 62: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

62

This standard defines specifics of the extraction of the key points (called minutiae)

from fingerprints ridge patterns. Two types of data formats are then defined. One for

general storage and transport and one for use in card based systems. The card format

has a standard and a compact expression.

The standard specifies formats for representation of fingerprints using the

fundamental notion of minutiae. It is generic as can be applied in wide range of

applications for automated fingerprint recognition, and can be involved in guidelines

and values for matching and decision parameters.

5. ISO/IEC 19794-3 2006 - Information Technology - Biometric Data Interchange

Formats - Part3: Finger Pattern Spectral Data.

This Standard establishes the data interchange format for finger pattern spectral data.

The goal for this part of ISO is to allow the exchange of local or global spectral data

derived from fingerprint image without the exchange of the entire image. This will

allow more compact data representations.

This part of the standard allows for representation of spectral components such as

Discrete Fourier Transform and (single scale) Gabor filter components extracted from

global or stationary (nor image dependent and not varying over the image local

overlapping or non overlapping uniform sized regions of the original intensity (non

color) image). Some or all of the extracted spectral components will be stored in the

data format depending upon the implementation.

There are fingerprints recognition algorithms that use spectral data directly for pattern

matching. Spectral data based recognition algorithms process “globally” local sections

(cells) of biometric images in contrast to morphological-based algorithms which

extract singularities in the morphological features. At the current time, there is no

established mechanism for the interchange of pattern spectral information for the use

of spectral based fingerprint matching algorithms.

By publishing a standard for spectral based representation of fingerprints, it allows the

interoperability among fingerprints.

- Recognition vendors based on a small data record.

Page 63: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

63

- Support the proliferation of low cost commercial fingerprint sensors with limited

coverage dynamic range or resolution.

- Define a data record that can be used to store biometric information on a variety of

storage mediums (including but not limited to portable device and smart cards).

- Encourage the adoption of biometrics in applications where interoperability is

required.

6. ISO/IEC 19794-4 - Information technology - Biometric Data Interchange Formats

- Part 4 - Finger Image Data.

This part of the standard specifies a data record interchange format for storing,

recording and transmitting the information from one or more finger or palm image

areas within the IOS/IEC 19785-1 VBEFF data structure. This can be used for the

exchange and comparison of finger image data. It defines the content format and units

of measurement for the exchange of finger image data that may be used in the

verification or identification process of a subject.

The information consists of a variety of mandatory and optional items including

scanning parameters for compressed or uncompressed images and vendor specific

information. This information is intended for interchange among organizations that

relay on automated devices and systems for identification or verification purposes

based on the information from finger imager areas. Information complied and

formatted in accordance with this part of the standard can be recorded on machine

readable media or may be transmitted by data communication facility.

7. ISO/IEC 19794-5 (2005) - Information Technology - Biometric Data Interchange

Formats - Part 5: Face Image Data.

Face images also commonly referred to as displayed portraits, have been used for

many decades to verify identity of persons. In recent years, digital face images are

used in many applications including human examination as well as computer

automated face recognition. Although photographic formats have been standardized in

some cases such as passport and driver license, it is also demanded to define a

standard data format of digital face images to allow interoperability among vendors.

This part of the standard is intended to give a face image for face recognition

applications requiring exchange of face image data. The typical applications are:

Page 64: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

64

1) Human examination of facial images with sufficient resolution to allow a human

examiner to ascertain small features such as moles and scars that might be used to

verify identity.

2) Human verification of identity by comparison of persons against facial images.

3) Computer automated face identification (one to many searching).

4) Computer automated face verification (one to one matching).

To enable many applications on variety of devices including devices that have the

limited resources required for data storage and to improve face recognition accuracy,

this part of the standard specifies not only a data format but also scene constraints

(lighting, pose, expression, etc.), photographic properties (positioning camera, focus,

etc.) and digital image attributes (image resolution, image size, etc.). Several image

types are introduced to define categories that satisfy requirements of some

applications. Each requirement is specified for each image type.

8. ISO/IEC 19794-8 (2006) - Information Technology - Biometric Data Interchange

Formats - Part 8: Finger Pattern Skeletal Data

This part of the standard establishes a data interchange format for pattern based

skeletal fingerprint recognition algorithms. Pattern based algorithms process sections

of biometric images. Pattern- based algorithms have been shown to work well with

the demands but commercially driven fingerprint sensor formats such as small area

and swipe sensors.

The exchange format that is defined in this part of the standard describes all

characteristics of a fingerprint in a small data record. It allows the extraction of both

spectral information (orientation frequency phase, etc.) and features (minutiae core

ridge count, etc.). Transformations like translation and rotation can also be

accommodated by the format defined herein.

This part of the standard specifies the pattern-based skeletal representation of

fingerprints.

- Interoperability among fingerprint recognition vendors based on a small data record

is allowed.

Page 65: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

65

- Proliferation of low-cost commercial fingerprint sensors with limited coverage

dynamic range or resolution is supported.

- A data record that can be used to store biometric information on a variety of storage

media (including but not limited to portable devices and smart cards) is defined.

- Adoption of biometrics applications requiring interoperability is encouraged.

It is recommended that biometric data protection techniques in ANSI/x9 x9.84 or

ISO/IEC 15408 are used to safeguard the biometric data defined herein for

confidentiality, integrity and availability.

This part of the standard specifies the interchange format for the exchange of pattern-

based skeletal fingerprint recognition data. The data format is generic in that it may be

applied and used in a wide range of application areas where automated fingerprint

recognition is involved.

Page 66: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

66

The Israeli Industry

Fingerprint Companies

1. BioGuard Components and Technologies Ltd

BioGuard develops biometric solutions for a wide variety of applications comprising

an integral part of the everyday life - in the home, at the workplace, in vehicles and

more.

The company’s goal is to develop and implement user-friendly biometric products

and solutions, meeting the market needs. The company’s system and modules are

complying with US and European biometric standards.

Operating as stand-alone systems or on a network, Bioguard’s state-of-the-art

biometric solutions are incorporated into systems and units at governmental and

sensitive facilities, at places of business, as components of integrated security systems,

and in the home. They are designed to be integrated into existing systems, offering a

host of additional benefits, such as enhanced fleet management, streamlined

administration. Bioguard’s technology is a universal personal biometric ID seal that

will replace ordinary keys in the daily lives, providing secure access to a wide variety

of applications.

2. Classfeye Ltd

Classfeye develops secure fingerprint recognition technology using existing cell-

phones and/or Internet cameras and is enabling identity management solutions for

mobile markets. The company’s technology eliminates the need for dedicated

hardware (e.g., fingerprint sensors, USB keys and code generators). The technology

enables device security and biometric identification for applications including m-

Commerce, m-Banking, enterprise security (including remote access to networks),

law enforcement and homeland security.

Page 67: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

67

Classfeye develops technology for fingerprint recognition/identification using a

standard camera phone or web camera. The company has developed a software-only

solution and is porting its technology to multiple OS systems for deployment on all

major handset platforms. Company’s technology can be used for handset security,

identification, authentication or non-repudiation for financial transactions. The

software technology is loaded on the handset. The user enrolls through an enrollment

process whereby he uses the cell phone camera to enroll his biometric

signature/identification, extracted from a series of fingerprint images. These can be

stored on the handset and/or at a remote server. Upon demand, as launched from

various applications, the user identify/authenticate himself/herself by using the cell

phone camera to extract and match his signature/identification as obtained from a

series of fingerprint images, in real time, with those extracted and stored during

enrollment. Classfeye is integrating its technology within existing identity

management applications and network architectures.

3. Synel Industries Ltd

Synel Develops fingerprint verification and identification terminals. It also develops

products for the management of time and attendance, access control and job costing.

This company provides on-line and real-time data collection for effective and

immediate access to information throughout an organization, allowing a company to

improve efficiency and enhance performance. Synel solutions are available for

complex, multi-location enterprises as well as for single-building facilities, and for

organizations with few to thousands of employees.

The company develops a ‘total systems’. Its equipment and systems are designed in a

modular fashion, which maximizes flexibility for adaptation to particular customer

needs. This also means that the systems are designed to allow future upgrades and

modifications when necessary.

4. IQS Biometric Solution Ltd

IQS Company develops identity management and access control solutions for the

information security requirements of large and medium sized organizations. In

Page 68: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

68

addition to the standard access protection systems in common use such as passwords,

magnetic cards, and smart cards, solutions offered by IQS also include sophisticated

biometric identification systems.

IQS Company develops solutions to problems of secure entry safeguards for

workstations, infrastructures and computer systems. Solutions for preventing hostile

penetration of systems, protect information in unprotected legacy systems, monitor

users’ activities, and control physical access.

IQS solutions and products operate in all the computerization environments and

platforms available in the marketplace today and integrate seamlessly with a wide

range of identification products.

The company’s technology is meant for dealing with identity management for large

populations, even up to the level of national population registers and including the

integration of Government Ministries and/or Institutions under a central umbrella

platform, which manages any number of identities required.

The company implements projects in different fields such as: security / Israel Defense

Forces, medicine, industry, banking, financing, insurance and much more.

IQS has developed and implemented specially constructed products for organizations,

based on international standards and regulations.

5. Idesia Ltd

Idesia develops biometric technology, biological electric signal in humans: a

BioDynamic Signature, unique to each individual. The company’s technology is

based on the human body’s natural bio-signal activities.

The company’s technology, BioDynamic Signature advantages are:

- Their sensors are small and thin, which enables them to be integrated in

microelectronic devices.

Page 69: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

69

- Their bio-signals are dynamic so the level of identification (one to many

matching) or verification (one to one matching) can be specified according to the

application.

- In many cases, database searching for a match can be expedited by adjusting

these parameters.

- The technology eliminates failure-to-enroll episodes when the system cannot

efficiently capture a biometric sample and false rejection incidents when a

legitimate user is denied access.

- The sensors are user friendly.

- This system requires less power than fingerprint systems making it a more

attractive solution for handheld devices.

6. ID-U Biometrics Ltd

Dynamic Biometrics Identification (ID-U) develops biometric identification platforms

using individual’s response to external pseudo-random stimuli.

The company’s main markets are Governments, Travel & Transportation Companies,

Banks & Financial Institutions, Hospitals, Casinos, and Homeland Security Forces.

ID-U develops an identification signature based on a subject’s response to external

stimuli. The signature includes dynamic information, which is a combination of

behavioral, physiological, and physical characteristics. Since the subjects’ responses

are different each time they approach the system, ID-U’s platform cannot be

controlled by the user or copied by others. As a result, the system minimizes the

possibility of forgery or spoofing, and provides a high level of security.

Page 70: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

70

Intelligent Video Surveillance

1. Mate - Intelligent Video

This company develops intelligent video surveillance systems. By using behavior

tracking technology in a unique way, it closes many of the possible loopholes. This

technology converts ordinary video cameras into intelligent sensors and information

systems that recognize faces, track irregular behavior, count people and detect events.

Through the Tri-Layered approach, the technology gives its customers a complete

solution that protects the perimeter, manages access control at the target facility and

monitors the site in between. Each zone relies on specific video detection products

and technologies to deal with a rising potential threat.

Video surveillance cameras have been critical component in every location where

security systems are installed. However, until now, equipped with motion detection,

microwave or infrared technologies, they have performed basic tasks. The uniqueness

of this technology is by changing that scenario by adding intelligence to video

surveillance.

** Behavior Tracking - Video object detection, tracking and identification of specific

behaviors. The products use sophisticated scene-learning algorithms to minimize false

alarms.

** People-Counting - combines biometric detection and behavior tracking technology

to count people staying in or passing through a specific region (such as a doorway).

This has applications such as tailgating detection and prevention, counting pedestrian

flow into and out of a given area and detecting crowding.

Page 71: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

71

Biometric Signature

1. Applied Neural Computing Ltd. (ANC)

ANC, develops technology in the field of neural network research and has a fully

operational neural network engine.

Inspired by the biological nervous system, neural network technology is being used to

solve a wide variety of scientific, engineering, data mining, signature authentication

and other complex pattern recognition applications. Neural networks are suited to

such applications because, like their biological counterparts, a neural network can

learn, and therefore can be trained to find solutions, recognize patterns, classify data,

and forecast future events. Neural network technology can be either software or

hardware that mimic the human brain problem solving process, so that computers

using it will have the capability to learn from experience, accumulate knowledge, and

apply this knowledge to new situations. Just as people apply knowledge gained from

past experience to new problems or situations, neural networks take previously solved

examples to build a system of "neurons" that makes new decisions, classifications,

and forecasts. In other words, a neural network is a system that learns from experience

rather than being dependent upon preprogrammed skills and relying upon huge

databases.

Applied Neural Computing’s core neural network technology can be perceived as an

artificial brain that can be implemented in a very wide variety of applications, creating

a compelling element of added value. Neural networks can be implemented in many

types of applications and in a wide range of industries. It can be implemented on a

chip, increasing processing speed significantly, or implemented as an engine for

software, which can create a great deal of added value by making the application

more intelligent, flexible and faster.

Implemented on computer chips, ANC’s neural network can perform faster

computations and enable chips to perform new tasks that they are not capable of

performing at present. In the telecommunications field, the company’s neural

networks will enable new networking systems to effectively manage growing

bandwidth use. Applied Neural Computing technology can be implemented in the

Page 72: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

72

financial industry to forecast stock prices, to rate bonds, to forecast exchange rates,

and to assess complex trends in real time. It can be used in E-commerce for data

mining and data analysis because it is able to process large amounts of data very

quickly. ANC’s neural networks can also be the basis for the next generation of fast

and effective Internet search engines. They can provide tangible assistance to medical

professionals in making critical diagnoses by analyzing EEG and ECG monitors and

even in identifying pre-cancerous cells, as well as in various aspects of telemedicine

and in the growing field of DNA and Gene research. When implemented in e-training

systems, it can adapt teaching methods to any individual’s pace and type of learning

and perception. Neural networks can also be used for speech recognition, biometrics

recognition and signature recognition.

2. WonderNet

WonderNet develops biometric Signature Authentication products, and total solutions

for the security needs of the information technology market.

The company’s Biometric Signature Authentication system provides the answer

returning the handwritten signature to its traditional position of trust.

Page 73: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

73

Biometric Smart Cards

1. Daniel Data Systems Ltd (DDS)

DDS develops Access Control and Alarm Monitoring. DDS solutions are meant for

the needs of budgets and installations, from the single facility to multiple-site high

tech corporations, universities, banks and defense plants.

The company’s technology for Access Control prevents material or information

robbery, by limiting / supervising the access to all or part of the facility, lab, computer

room, or storage areas to authorized persons, during specific time periods. Intelligent

multi-technology controllers, linked to advanced identification systems ranging from

card reader to biometrics, are programmed to control “who is going where and when”.

Each person is equipped with a personalized card or another ID that controls access.

Another technology developed by DDS is the Alarm Monitoring which is developed

to prevent catastrophes or limits damage by informing of abnormal events and

reacting to them in real time. Alarm Monitoring usually functions in coordination

with Access Control. Different sensors, such as magnetic contacts, motion detectors,

broken window sensors and temperature indicators are connected to intelligent

controllers that centralize the information. Predefined reactions are triggered: CCTV

cameras, alarms, heating switched on or off, display of appropriate maps on the screen,

etc.

DDS also provides flexible solutions for Time & Attendance reporting work hours

and streamlining payroll procedures and Job Costing analytic accounting of task

completion and work efficiency.

2. Aurora Technologies Ltd.

Aurora develops comprehensive smart card solutions for project development from

initial analysis, specification and definition to final product and production

documentation. The company capabilities and experience encompass hardware and

software system engineering, hardware design, development, prototyping, production

and testing and software development have developed hands-on expertise in a wide

and varied range of electronic and computer related disciplines. These include control

Page 74: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

74

systems, data acquisition and manipulation, intrinsically safe systems, distributed

computation and control, medical instrumentation, industrial systems, avionic as well

as commercial systems and more.

Aurora is strategically placed in the smart-card application field and has a wide and

varied assortment of installed applications, including electronic purse, personal

identification and data collection schemes. The company also deals with access

control systems and both centralized and distributed monitoring and control systems.

In addition, to its smart card systems, Aurora has developed two main product lines.

** SCC - Smart Card Controller - a family of controllers for unattended smart card

applications.

** TAU - a compact Time and Attendance Unit for low cost personnel attendance

recording.

3. Vuance Ltd

Vuance develops Incident Management, Asset Management, Active RF and e-ID

solutions, thus streamlining their backbone of deployment towards overall operational

and business enhancement.

Vuance specializes in secure document technology. These customized solutions and

advanced identification and authentication technologies provide reliable and durable

documents including electronic passports, visas and other border entry/exit documents,

national, military and police identification, as well as Magna software solution for the

management of national population registries. Technologies include data and image

capturing, ID production and personalization with secure and biometric features. A

range of complementary technologies and solutions for the smart card market are also

offered, including customizable smart cards and related products, proprietary smart

card production technologies, and advanced e-ID technologies, coupled with brand

protection and authentication technologies. As an experienced market player, with

fully proven technologies and advanced solutions, Vuance integrates sophisticated

smart card systems that directly match customers’ demands and specifications.

Other Solutions developed by Vuance:

Page 75: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

75

* EduGate, a comprehensive campus management solution for educational institutions

used with contactless smart cards and smart reader/writers. Operating in real-time, the

solution supplies an accurate flow of information addressing student security, access

control and attendance, and secures cashless transactions. EduGate offers e-Wallet

applications for food service, vending and printing/copying.

* SmartGate 2400, an integrated access control system is based on Vuance’s

contactless smart cards and fingerprint identification. It merges contactless smart card

expertise with the latest hi-tech innovations to provide leading solutions for

commercial and governmental smart cards, data and security related technologies. The

system allows or denies a cardholder access to secured facilities based on assigned

permission groups. The smart card carries an array of visible/invisible security

features and personal information specific to client requirements.

* DynaGate is a portable access control device that provides smart card data biometric

access control and enhanced security. The biometric identification implemented with

the simple touch of a finger, reliably enrolls and verifies an individual’s identity in

one second. It is smaller than a business card and provides an external sensor to

accommodate a wide range of installations.

Vuance is developing in research, development and marketing of advanced

technologies and products for smart-card solutions and government e-ID projects.

Vuance offers a wide range of standard and customized smart-card-based solutions

for physical and logical security, education, corrections facilities and air & seaports.

Vuance is also a leader in the manufacturing of secure and durable documents such as

national identity cards, passports, visas, drivers’ licenses and vehicle registration.

Together with its subsidiaries, Vuance offers solutions in contact and contactless

smart-card technologies.

4. Optisec Systems Ltd.

Optisec is developing Governments, System Integrators and End-Users turnkey

biometric security solution for Access Control and ID verification. Optisec provides

solutions ranging from a single door biometric access control systems to a turnkey

solution from physical access control to building facilities, secure floors, and

Page 76: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

76

computer rooms to Log On to the network. Combining the technology of Smart Cards,

2-D Bar Code, Encryption, and Biometrics, with Israeli’s cutting-edge secure

software solutions, the company provides its clients with full biometric security

solutions.

Optisec applies the approach of providing cost effective security solutions while

keeping the hardware and software user friendly. The solution lies in integrating

cutting-edge biometric technology, maintaining system flexibility, simplicity in

installing and operating, while guaranteeing user privacy. Optisec achieves these

goals by integrating market proven biometric hardware with its own in-house

expertise in biometrics and security.

Page 77: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

77

Voice Authentication

1. Cellmax Systems Ltd (CMS)

Cellmax is an Israeli based developer and supplier of Voice authentication solutions.

The company owns several Voice Biometric technologies which include verification

technologies as well as identification technologies.

Cellmax offers a Voice Biometrics product line which is based on the company’s

technology. The company’s technology is based on a unique, patent Voice Biometrics

technology. Using this technology enables the company to reach a high performance

level.

The company developed the “Viometrics” product line. This product line includes

several products for authentication and surveillance needs.

Cellmax’s technology enables to reach high performance levels. The technology is

based on an advanced learning capability and a strong voice pattern analysis. This

creates the advantages such as: High accuracy, Handling large voice data bases,

Multimedia operation, Wireline; Cellular; VoIP; HTTP; Background noise handling.

Cellmax product line includes three different products: Viogate, Violisten, and

Viosearch.

* Viogate - A password replacement Voice authentication product. The Viogate

authenticates a user by prompting the user for specific three words. There are two

Viogate products: (1) Viogate - V - Verification prompting system, and (2) Viogate - I

- Identification prompting product.

Violisten - Violisten is an authentication listening systems. The Violisten is a free

speech system. Violisten follows a conversation between an agent and a customer and

authenticates the customer by his/her Voice. There are two types of Violisten: (1)

Violisten V - A verification product. The user is identified by a separate system

(DTMF dialing; Speech recognition etc...) and then verified by the Violisten. (2)

Violisten I - The user is prompt to say his name and then talk freely. The user is both

identified and verified by the system.

Page 78: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

78

* Viosearch - An intelligence surveillance product used to identify suspects over

phone calls. There is only an Identification Viosearch. Voice biometrics is related to

some of the most growing demands in today’s world. The main applications areas for

Voice biometrics are:

* Defense & Anti Terror (Examples: Telecom Surveillance; Intelligence; Suspect

identification)

* Law enforcement (Examples: Criminal ID; Court evidence verification;

Immigration)

* Personal and organizational security (Examples: Employee attendance; Access

control; Home alarm)

* IT security (Examples: Tele-banking; Tele-commerce; Dialing cards)

* Privacy (Examples: Voicemail password; Medical records access)

All the aforementioned fields are growing large size markets, with a lot of

governmental and enterprise budget attention.

2. Persay Ltd.

Persay develops biometric speaker verification products used to securely verify

speakers’ identities. The company’s products, FreeSpeech, VocalPassword, and

S.P.I.D are independent of language and accent and enable verification of individuals

using a simple spoken pass phrase or during natural conversation, via any media.

Persay’s technology combats identity fraud without compromising on efficiency,

quality service and customer experience. Persay’s speaker verification products offer

a secure, convenient, efficient, reliable alternative to traditional forms of verification,

such as Personal Identity Numbers (PINs), common question routines, passwords, etc.

With over ten years of intensive research and development efforts as well as

experience in the deployment of speaker verification and identification technology,

Persay’s biometric speaker verification products offer state-of-the-art technology with

algorithmic accuracy and ease of integration and deployment. Persay’s fully-featured

Page 79: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

79

products are integrated with various IT environments, that manage and reduce the

risks involved in providing remote services and applications such as secured call

center access, password reset, offender monitoring, secure web access and more.

Through an extensive network of partners and system integrators, Persay’s technology

enables a wide range of solutions for call centers, telecommunication and financial

industries, as well as for law enforcement and governmental agencies.

3. Sentrycom Ltd.

Sentrycom develops and markets biometric voice authentication solutions that

accurately verify a person’s claimed identity.

Sentrycom’s core technology is based on patented Voice Authentication Engine

(VAE), designed to increase and enhance security while improving end-users privacy

and confidence. VAE was successfully field-tested at Israel Standards Institute-

National Biometrics Testing Center.

Sentrycom has developed a number of products based upon its Voice Authentication

Engine :

* Call Center Access Solution - This product is fully integrated and tested with IVR

platforms from IBM, Avaya and Intel.

* Web Portal Access Solution - This product is fully integrated and tested with IBM

WebSphere.

* Single-Sign-On for Extended Enterprise. This product is fully integrated and tested

with IBM Tivoli Access Manager. Sentrycom is developing products for mobile and

for Homeland Security.

Page 80: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

80

Dog Bio Security

1. Bio Sense (BST)

Bio Sense develops bioelectric systems. BST systems make use of a biological being

as a highly sophisticated sensor, whose behavior is monitored. BST technology

applications include early identification of significant situations like health condition,

security breaches etc.

BST leading product is Dog Bio Sensor (DBS), an advanced watchdog alarm system.

The superb senses of the watchdog are combined with Bio-Sense’s advanced

detection algorithms to upgrade the watchdog into a sophisticated and reliable

bioelectric warning and deterrent system.

DBS has reached research and development goals via a successful large-scale field

experiment and an operational pilot site at a governmental operational facility in Israel.

The Watchdog Security System and algorithms are currently patent-pending.

DBS is based on Bio-Sense patent-pending algorithms. The system receives signals

from the dog, and performs a unique digital signal processing analysis. The data is

filtered and passed through an analytical process to determine the state of the dog, and

indicate the one of three system alert levels: * No-Alert - The watchdog is responding

to routine events, * Medium-Alert - There is suspicious activity in the vicinity, *

High-Alert - An intrusion has occurred into the dog’s territory. The Watchdog

Security System can be integrated into existing security systems (Central Control

Systems, home alarm, CCTV monitoring systems, etc.) to effectively alert and present

the security crisis to the required system.

Page 81: イスラエルにおける情報セキュリティ関連動向調査報告書 Survey … · the most comprehensive and includes all the components of the theory. Another definition

81

Bibliography

1. Alexander M. Bornstein, Michael M. Bornstein and Ron Kimmel, 2005, Three

Dimensional Face Recognition.

2. Berlinskey Uzi, Government publication, 2006, The Challenge of Biometric.

3. Berlinsky Uzi, Government publication, 2006, Israel Prepares for Biometric

Solutions.

4. Brenda McCOWAN, 2002, Barking in domestic dogs.

5. Government publication, Department for State internal Inspection, 2007,

Government decisions for information security and biometric means.

6. Rafael's research on face recognition.

7. White Paper, Rafael's Face Recognition Technology, Capabilities, Advantages,

Benefits. 8. Dr. Nadav Hamadi, Tel Aviv University, 2007, Smart Biometric Camera for

Facial Expression.

9. Dr. Yair Dalal, Tel Aviv University, 2006, Surveillance and Tracking in open

areas.

10. Dr. Gelbart Oren, Tel Aviv University, 2007, Biometric applications for

identifying objects.

11. Greemlend Guy, Tel Aviv University, 2005, Biometric development for

identifying people in closed places.

12. Sophia Yin, University of California, 2002, A new perspective on barking

dogs.

13. What Next, 2006, Guard Dogs Go High-Tech.

14. Yaniv Livneh, June 2007, Internet Telephony, Sniffers, "Vishers" and Hackers

Beware: to overlook aspect of securing unified messaging.

15. The standard institute of Israel, September 2006, Letter to active members of

biometric standardization #11.