イスラエルにおける情報セキュリティ関連動向調査報告書 survey … · the...
TRANSCRIPT
2007情財第 0256号
イスラエルにおける情報セキュリティ関連動向調査報告書
Survey on Technological Strategy related to Biometrics
Security in Israel
2008 年 3 月
2
Table of Contents
Subject: Page:
Opening 4-6
Introduction 7-8
The Need for Biometric Technologies 9
Biometric Research in Israel
General 10
Iris Recognition 11-14
Fingerprint Recognition 15-16
Face Recognition 17
Biometric Face Recognition, Research by Technion 17-20
Biometric Face Recognition, Research by Rafael 20-25
Voice recognition 26-31
Biometric Signature 32-33
Future Biometric Technologies 34
Biometric Identification by Dogs 34-35
Biometric Identification according to Facial Expression 35-38
Automatic Identification, Surveillance and Tracking in Open Space 38-41
Biometric Development for Identifying People in Closed Objects 41
Biometric Application for Identifying Objects 42-44
The Israeli Government
General 45
The Israeli Government 45-48
Biometric Picture Database 48-50
Government Offices Purchase Biometric Technologies 51-52
Criticism for using Biometric Technology 53-55
The Biometric Standardization in Israel
General 56
The Israeli Standardization Tasks 56
The Matching Committees 57
3
The Biometric Committee in Israel 57
The Lack of Standards 58
The Israeli Standardization for Biometrics 58
Adaptation of International Standards 58
The Standards that have been Adopted by Israel 59-65
The Israeli Industry
Fingerprint Companies 66-69
Intelligent Video Surveillance 70
Biometric Signature 71-72
Biometric Smart Cards 73-76
Voice Authentication 77-79
Dog Bio Security 80
Bibliography 81
4
Opening
Biometrics is defined as the total behavioral and/or physical characteristics of people
that can be measured and be used for verification and identification when needed.
Different definitions were given to the concept of biometrics. This definition seems
the most comprehensive and includes all the components of the theory. Another
definition claims that biometrics is a science that measures physiological
characteristics that enable to identify a person unequivocally. Another definition
claims that biometric is a process of identifying unique characteristics of a user in the
Internet.
We will not analyze these definitions at this stage, but we will return to them later in
this report.
In general, biometrics is divided into two groups:
1. Physiological characteristics are related to the shape of the body. The oldest
physiological characteristics that have been used for more than 100 years are
fingerprints. Other examples are face recognition, hand geometry, Iris
recognition and many more.
2. Behavioral characteristics are related to the behavior of a person. The first
characteristic to be used, still widely used today, is the signature. More
modern approaches are the study of keystroke dynamics and behavioral
tracking technologies. Some researchers, who study biometrics, refer to the
concept as a synonym for behaviometrics, which is a term for behavioral
biometrics such as typing rhythm or mouse gestures, where the analysis can be
done continuously without interrupting or interfering with user activities.
In correlation to all the above mentioned definitions, each person has his unique
biometric characteristics, which can be identified and used for identification. Thus,
even before we enter into all types of characteristics that identify a person, it should
be indicated in the formulation of biometric means of identification, there is a need to
verify the person’s specific details and to store them in a database, such as the
organization’s system’s memory. This is done in order to compare between the
memorized details and the examined person’s details.
5
There are methods for identifying people, even without having any data about them in
the database and thus they can still be identified. This will be discussed later in the
report.
Over the years, many different biometric characteristics were found. The first
characteristic is the fingerprint. This was the primary means for identifying a person.
This type of identification has been found to be falsified in different ways, therefore,
throughout the years different alternative technologies have been developed, many of
which are in use in Israel. Each of these technologies has advantages and
disadvantages, which will be described in this report. Due to the disadvantages in the
biometric technologies which have been developed, researches keep researching to
look for additional biometric means in order to cover the disadvantages. Companies
have developed software and hardware which combines different biometric
technologies to identify a person in parallel to ensure better security and better
identification.
Identification and verification through fingerprints, loses its exclusivity, and about 20
new physiological and behavioral characteristics can be used for identification, each
in its unique and exclusive way.
The biometric characteristics that are in use are:
1. Face
2. Iris
3. Retina
4. Vein structure of hand
5. Finger geometry
6. Hand geometry
7. Ear
8. Voice
9. Keystrokes
10. Mouse Strokes
11. DNA
12. Signature
13. Gait
14. Toes
6
15. Odor
16. Biometric Dog Bark
17. Face expression
18. Biometric detection of moving objects in open area
19. Biometric sensors for people in closed places
Not only the biometric technologies have advantages and disadvantages the whole
concept of biometrics has its advantages and disadvantages. The collection of the
individual’s biometric details and storing them in databases has strong opposition.
The objection come from the claims that such databases can be used to reduce the
right of man’s privacy and to increase the intervention of the ruling powers, which
already has "too much" information and personal details of the citizens.
However, the advantages overcome the disadvantages of the need and the importance
of keeping people’s privacy, as biometrics authentication helps to improve life quality
of most people. This includes the use of smart cards, through which we pay, such as
credit cards, or getting money through biometric identification and many other
applications. These technologies also help to protect people from the penetration of
undesirable people to the state or to secured sites. Thus, a compromise must be found
between the concept of keeping individual rights and personal information and
between individual’s welfare. This will be discussed later in this report.
7
Introduction
International cooperation is needed for strive to ultimate security. Standards and
international rulings are set in order to achieve this goal.
In Israel, the subject of biometrics development in spread at many fields, such as
academic institutes, industry, banking, government, etc. With the development of
more exact technologies, the importance of the subject is more and more understood
as well as the recognition that it is very difficult to manage normal life without
biometric security.
There are also opposing repercussions, including the fact that with each new
biometric development, criminal factors and others develop ways to circumvent these
technologies.
As a result of the sophisticated counter development, different combined biometric
means are used and not only one identifying factor, such as mutual use of finger prints
and face technologies, or using several fingers combined with hand identification or
face and voice means. In other words, the one-feature identification technology is
disappearing, and its place is taken by the multi-featured identification technology
which is done by a combination of software and hardware that can identify several
features at once. This increases the certainty of identification. Biometric technologies
are continually developing, so that it is possible to use them for different purposes
from what they were originally developed for.
In this paper, we will describe the different ways in which biometric technologies are
used. Each human feature is researched and examined in order to develop it to the
level of biometric technologies. Many technologies have developed, alongside
international standards, as will be later described. The actual application of biometric
technologies are varied and are spreading in different fields such as in the field of
medicine, banking services, transportation, public safety, governmental services and
many other uses.
Following are some examples of where the Israeli government is constantly looking to
secure its offices and agencies by different means including biometric authentication.
8
One interesting new application that the government is working on penetration is at
the Israeli National Health Services where it is implementing a new biometric
identification project. 1.8 million Patients will be identified by fingerprint, instead of
the currently used magnetic card. The first stage of the project has been run as a pilot.
After the success of the pilot, a national operation of the project will be conducted in
8.000 medical centers.
The project provides the possibility that each patient will be identified immediately by
the doctor. It is the first time in Israel where a patient of one of the National Health
Services organizations will receive medical treatment, only after identification. Their
identification enables continuous treatment. It also enables the security and privacy of
its users and prevents identity thefts.
Another place where the technology is used is in the Palestinian border crossing in
Jenin. It is one of the single places in the world where three identifying technologies
are used together: identification of the back of the hand, the face and fingers, not
fingerprints. The advantage of operating several identification methods is because of
the ability to achieve a valid identity of 98%. It is possible also to use each technology
alone.
The biometric process of identification at border crossing shortens the queues and
reduces the contact between the border officers and the crossers.
One other place where biometric means are used is the Employment Service, where
contact between Employment clerks and the employment searchers. As part of the
project, the employment searchers put their finger upon a machine that identifies their
fingerprint and type their identity card number. Immediately, they receive a code with
a report if they have any work offers as well as whether they want to receive them as a
printed output. The employment services workers said that the system reduced the
number of employment request in 4%. The proof is that they don’t request social
security and this is a very effective financial saving.
9
The Need for Biometrics Technologies
While in the past, fingerprints were the sole reliable means of identifying people, in
the modern times the identification technologies are different. Today’s world
necessitates the development of other means and technologies in order to cope with
the sophistication of the ability to forge and steal a person’s identity.
The need to identify a person has increased due to the development of international
commerce and globalization. For example, the easier passage of people from state to
state for work or tourism (border checkups), the use of different and newer means of
payments such as credit cards that necessitate identification of the payer, the ability to
collect payments through indirect means, using signatures in computer networks (user
identification), entrance to guarded buildings (identification of the enterer), etc.
It is possible to identify and verify a person without biometric means by two methods:
1. Possession-based: using one specific "token" such as a security tag or a card,
2. Knowledge-based: the use of a code or password.
These identification methods are losing reliability due to the wide forging possibilities
and the biometric technologies are taking their place.
10
Biometric Research in Israel
General
Universities, research institutes, government agencies, private companies in Israel are
developing software and hardware in the field of Biometry.
Five biometric technologies are widely used in Israel:
1. Iris
2. Fingerprint
3. Face
4. Voice
5. Signature
Even these five biometric fields are divided into two groups:
1. The first group includes the fingerprint, Iris and face biometric technologies,
where there is a need for the presence of the identified person.
2. The second group includes the voice and the digital signature, can be used
mainly to identify a person from distance and of course can be used with the
presence of the person as well.
The developers of the first group of technologies claim that also their technologies
can be used from distance. This is due to the new telecommunication technologies
that are available today, that make possible the transfer of information so even if the
database is in distance, it is possible to identify a person using these techniques.
As mentioned, biometrics includes about 20 different technologies, three of which are
more in use than the others: Iris, Fingerprints and Face. Different researches and
developments were done in Israel on these three technologies, as well as in other
biometric fields that will be later discussed.
Following are details on researches that were studied in Israel:
11
1. Iris Recognition
Research by Prof. Dori Peleg, and his associate from The Israeli Technion, (the most
esteemed technological institute in Israel).
The Iris is the circle that encircles the pupil in the human eye. The reason why so
many researchers initiate studies on this subject is because the Iris has many
advantages of precise recognition. The main advantage of Iris recognition is its
stability as a single enrollment that can last a lifetime. More than this, it has a so far
unmatched practical false-accept rate of zero. There is no known pair of images of
two different Irises that the algorithm in its deployed configuration mistakenly
identifies at the same. The Iris Code false-reject rates are comparable to the most
accurate single-finger fingerprint matchers.
The Iris recognition technology has other advantages compared with other biometric
technologies:
1. The Iris has a fine texture that, like fingerprints, is determined randomly
gestation during embryonic gestation. Even genetically identical individuals
have completely independent Iris textures.
2. It is an internal organ that is well protected against damage and wear by a
highly transparent and sensitive membrane.
3. The identification of the Iris can be performed from about 8cm to a few meters
away.
4. There is no need for the person to touch any equipment in order to be
identified.
5. The identification of a person by the Iris technology is done by camera
similarly of taking photography.
As mentioned, the most in-depth study on the subject of Iris recognition in Israel
seems to be the Technion’s study. The motivation to make this research is the fact that
there is a strong scientific demand for the proliferation of systems, concepts and
12
algorithms for Iris recognition and identification. This is mostly because of the
comparatively short time that Iris recognition systems have been around.
There is still a great need for substantial mathematical and computer-vision research
and insight into Iris recognition. Iris recognition uses camera technology, and subtle
IR illumination to reduce specular reflection from the convex cornea to create images
of the detail-rich, intricate structures of the Iris. These unique structures converted
into digital templates, provide mathematical representations of the Iris that yield
unambiguous positive identification of an individual.
Prof. Peleg’s study, was, as mentioned, based upon Prof. Daugman’s algorithms from
Cambridge University, which are the basis of almost all currently commercially
deployed Iris-recognition systems. The study was divided into two parts:
1. Processing the picture - Isolating the Iris: given levels of gray in the picture
will activate the algorithm that specifically finds the Iris borders which are the
pupil, the white of the eye and the eyelid.
2. Processing the information – Summarization of the features from the Iris and
converting them to consecutive bits that become a unique matrix for each eye.
In order to identify a person, the system will process the photograph taken from his
eye that is encoded to the consecutive bits and will perform a comparison of the
matrixes that are stored in the database. The decision if two matrixes match will be
made by a success/failure test which is statistically independent.
The Study determined that an Iris-recognition algorithm first has to identify the
approximately concentric circular outer boundaries of the Iris and the pupil in a photo
of an eye. The set of pixels covering only the Iris is then transformed into a bit pattern
that preserves the information that is essential for a statistically meaningful
comparison between two Iris images. The mathematical methods used resemble those
of modern lossy compression algorithms for photographic images.
Among the problems that the research solved is the best way to find the center of the
pupil and the center of the Iris. The study also determined how to identify the Iris,
even though the pupil isn’t a perfect circle.
13
Another problem that the Technion’s research found was how to overcome the effect
of the eyelashes that hinder the photographing of the Iris and reduces the ability to
detect the Iris and its use as a complete identification.
In fact, the Technion’s research suggests ways to photograph and identify by
automatic measurement in purpose of finding the different components, in order to get
full information on the Iris, which is identified among other factors by the upper and
lower curves, especially when it isn’t always possible to get the points on the curve.
This research, states that the size or color of the Iris has no connection to the Iris
recognition technology as the measured factor is the circle around the pupil which
structure doesn’t depend on size and color. In fact, identification by the Iris is one of
the quickest, most exact and easiest existing identification technologies.
The Iris identification technology is done according to the identification of the Iris
using simulation platforms that increase the speed of identification and accuracy.
Usually, during the photography of the Iris for its keeping in memory, or during the
identification of the person, the person has to approach the camera to a distance of
8cm in order to perceive the Iris in the best possible way. Only then it is possible that
the Iris is captured and identifies the person. The researchers at the Technion kept in
the database, in addition to each eye’s special matrix, its masking in order to increase
the technology’s effectiveness, meaning the relevant bytes for comparison.
This can cause a huge difference in the samples that are kept in the database, and the
same person may get a rejection instead of acceptance. To avoid this situation,
masking is done. Every image has a mask besides the processed image. Before the
image (which wants to enter) gets processed, matching between the 2 masks is done.
After finding the common information, the identification process continues.
This shows that actually, the primary assumption of the research was correct which
means that only part of the Iris is needed in order to identify a person and that there is
no need for the entire Iris for identification. Thus, if there are distortions of the lashes,
that usually cover the upper part of the eye, or of the Iris curve, it is possible to ignore
them and to take only the revealed part of the Iris and it will give the information that
is needed. For this purpose, the research has developed different algorithms that will
help to measure the Iris and will overcome the above mentioned difficulties.
The Technion’s researchers give different ideas to improve the algorithms. Another
problem that the researchers dealt with is the fact that in some cases the pupil enlarges
14
or narrows and then the size of the picture of the pupil changes. According to the
researchers, there is no loss of information with this, only the compression of the
information is on a smaller area.
Among other things, the researchers studies problems that occur during the
identification process. As the identification is made with a comparison to the picture
that exists in the database, it is possible that during the identification, the eye that was
open during the photographing, is closed and thus, a situation will occur where the
new samples of the eye aren’t similar to the existing samples of the eye, and actually,
represents the eyelid and not the Iris. In order to keep their consistency, the
researchers kept in their data bank, not only the special matrix of each eye, but also its
mask, meaning the relevant bytes for comparison.
After the researchers isolated from each eye the part that contains the necessary
information, and contained it in the appropriate way, they needed to research the
problem of the comparison between the picture in the system and that which is
examined during the identification.
There are many problems that affect the comparison between the original picture and
the picture which was taken during identifications, like different lightening, different
environment, etc. as a result, the researchers found the characteristics of each eye
which do not dependent on lightening or any other external factor such as eyelashes or
different stimulation and opening of the eye, which entered into the picture.
Disadvantages of Iris Recognition Technology
1. Iris recognition is difficult to perform at a distance and if the person to be
identified is not cooperating by holding the head still and looking into the
camera it will not work. As with other photographic biometric technologies,
Iris recognition is susceptible to poor image quality, with associated failure to
enroll rates.
2. Another problem is the fear of some of the identified persons from the beam of
light and this makes some people oppose identification by these means.
15
2. Fingerprints Recognition
Identification by fingerprints which was the earliest of all biometric means of
identification, and was considered the sole such means for a long time. The use of this
technology was made in the days, where no one even dreamed about computer
technologies and their development. In the past, fingerprints were identified through
primitive means such as a magnifying glass, etc., done by a graphologist. It was also
known that at those times there were much less needs for identification compared to
nowadays.
In spite of early use of fingerprints as identifying means, this technology is still used
today, and is considered among the three most used leading biometric identification
technologies in the world, along with the Iris and face techniques.
Although the fingerprint was the first method, and the most known one, research and
development is still being done in this field in order to improve it and to develop more
efficient technologies. The renovation mostly focuses upon the mechanism that read
the fingerprints and the mechanism that keeps it in memory.
Fingerprints are used also as identifying means, for people who don’t know to read
and write and thus they don’t know how to sign their names.
The fingerprint technology is also used in some countries for identification in border
passages. Israel too uses the technology of fingerprints in the borders; though it is
joined to other means of identification like smart cards, etc. The smart card has a chip
which identifies its carrier or matrixes that the identified person must mark.
Throughout the years, different means and simple methods of forging fingerprints
developed. Thus, identification by fingerprints is usually done with the entire hand or
with two fingers or in combination of an additional biometric technology of
identification such as a face or even foot print is used for identification together with
the fingerprint.
Advantages of the Fingerprint Method
1. The greatest advantage of using fingerprints for identification is the simplicity.
16
2. This method is inexpensive, and it is possible to keep it in memory even under
primitive conditions.
3. Another advantage of fingerprint identification is the assurance that other
person will have the same fingerprint very remote and close to impossible.
Disadvantages of the Fingerprint Method
1. It is possible to copy and to forge fingerprints in simple ways and at low costs.
2. As the fingerprint is kept as a picture in the database it is relatively easy to
steel it and to forge it, whereas other authentication methods are not so easy to
forge.
In Israel, some companies keep researching this field to accelerate the identification
and its accuracy. For this purpose, a solution has been developed that in one solution
the registration process and identification process are all done by the same unit. This
system can be used away from the computer and can be used comfortably in different
areas without computerized system for example:
Identification of computer users.
Identification of car doors users.
Identification at entrance to private homes.
The Israeli companies focus on studies to improve the maximal speed and accuracy of
this technology. The information about the leading companies who are researching the
fingerprint field will be detailed in the industry chapter.
17
3. Face Recognition
Over the last few years, face recognition has become a popular area of research in
computer vision and one of the most successful applications of image analysis.
A general statement of the face recognition technology (in computer vision) can be
stated as follows: Given still or video images of a scene, identity or verify one or
more persons in the scene using a stored database of face.
Face recognition is considered one out of three leading technologies in the
identification of human beings. The other two are as previously said, fingerprints and
Iris identification. There are many other technologies that are used to identify which
will be described in detail in our report.
The face recognition has been researched and is still being researched by the industry
and by the universities in Israel.
Researches for face recognition have been carried out by the Technion Israel Institute
of Technology and by a government company Rafael which was recognized by the
government as The National Knowledge Center of Biometric in Israel.
Biometric Face Recognition Research done by the Technion
The researchers at the Technion determine that the technology of face recognition has
the potential of becoming the leading biometric technology. Unfortunately, it is also
one of the most difficult pattern recognition problems. Also with this technology, the
researchers refer to the data used for a specific recognition task as a template. The
face recognition algorithm needs to compare a given face with a given template and
verify their equivalence. Such a setup (one-to-one matching) can occur when
biometric technology is used to secure financial transactions, for example, in an
automatic teller machine (ATM). In this case, the user is usually assumed to be
collaborative.
18
On the other hand, the face recognition algorithm should then match a given face with
one of the individuals in the database. For instance, finding a terrorist in a crowd
(one-to-many matching) is one such application.
The researchers check two possibilities: The first possibility that identifies a
cooperating person and the second possibility that identifies a non cooperating person.
The first possibility means even collaborative users in a natural environment present
high variability of their faces due to natural factors beyond their control. The greatest
difficulty of face recognition, compared to other biometrics systems come from the
immense variability of the human face. The facial appearance depends heavily on
environmental factors, for example, the lighting conditions, background scene and
head pose. It also depends on facial hair, the use of cosmetics, jewelry and piercing.
Last but not least, plastic surgery or long-term processes like aging and weight gain
can have a significant influence on facial appearance.
The researchers determine that much of the facial appearance variability is inherent to
the face itself. Even if we hypothetically assume that external factors do not exist, for
example, that the facial image is always acquired under the same illumination, pose,
and with the same haircut and make up, still, the variability in a facial image due to
facial expressions may be even greater than a change in the person’s identity.
The researchers determine that very few reliable fiducially points can be extracted
from a 2D facial image in the presence of pose, illumination, and facial expression
variability. In the 2D technology, the researchers find many disadvantages at almost
every stage of the identity. Even in cases where the identified person cooperates, it is
difficult to identify him by a picture that is stored on the database due to feature-based
algorithms are forced to use a limited set of points, which provide low discrimination
ability between faces. The researchers indicate additional disadvantages in the usage
of 2D technology and derive to the conclusion that this system cannot be used for
identification of a person. They suggest generating synthetic images of the face in
new, unseen conditions. Generating facial images with new pose and illumination
requires some 3D facial surface as an intermediate stage. It is possible to use a generic
3D head model or estimate a rough shape of the facial surface from a set of
observations in order to synthesize new facial images and then apply standard face
recognition methods like eigen faces to the synthetic images. Yet, facial expressions
19
appear to be more problematic to synthesize. The researchers indicate the approach
modeling facial expressions as warping of the facial image do not capture the true
geometric changes of the facial surface, and are therefore useful mainly for computer
graphics applications. That is, the results may look natural, but fail to represent the
true nature of the expression.
The researchers rejected all other options. They derive to the conclusion that the face
is a 3 dimensional object. The use of only 2D of the face is misleading. For example,
if one had the ability to draw any face on his facial surface, he could make himself
look essentially like any person and deceive any 2D face recognition method.
Practically, even with very modest instruments, makeup specialists in the theater and
movie industry can change completely the facial appearance of actors.
The researchers explain that Three-dimensional face recognition is a relatively recent
trend that in some sense breaks the long-term tradition of mimicking the human visual
recognition system, like the 2D methods attempt to do and they determine that trying
to use 3D information has become an emerging research direction in hope to make
face recognition more accurate and robust.
The researchers continue and explain that Three-dimensional facial geometry
represents the internal anatomical structure of the face rather than its external
appearance influenced by environmental factors. As the result, unlike the 2D facial
image, 3D facial surface is insensitive to illumination, head pose and cosmetics. It
needs to be noted that while in 2D face recognition a conventional camera is used, and
3D face recognition requires a more sophisticated sensor capable of acquiring depth
information usually referred to as depth or range camera or 3D scanner.
The researchers found a disadvantage in the 3D technology whereas the 3D shape of
the face is usually acquired together with a 2D intensity image. This is one of the
main disadvantages of 3D methods compared to 2D ones. Particularly, it prohibits the
use of legacy photo databases, like those maintained by police and special agencies.
The researchers determine that one of the problems that they would like to solve in
their research is being able to identify a person with different facial expressions. It
treats the facial surface as a deformable object in the context of Riemannian geometry.
Our observations show that the deformations of the face resulting from facial
20
expressions can be modeled as isometrics, such that the intrinsic geometric properties
of the facial surface are expression-invariant. Thus, finding an expression-invariant
representation of the face is essentially equivalent to finding an isometric-invariant
representation of the facial surface.
The researchers determine that Isometric embedding is the core of their 3D face
recognition system. It consists of measuring the geodesic distances between points on
the facial surface and then using multidimensional scaling to perform the embedding.
This way, the task of comparing deformable objects like faces is transformed into a
much simpler problem of rigid surface matching, at the expense of losing some
accuracy, which appears to be insignificant in this case.
The main advantage in the 3D face system is that the facial surface is not needed to be
given explicitly. All the stages of this recognition system, including pre-processing
and computation of geodesic distances can be carried out given only the metric tensor
of the surface. An additional advantage is that this system allows the researchers to
use simple and cost-efficient 3D acquisition techniques like photometric stereo.
Avoiding explicit surface reconstruction also saves computational time and reduces
the numerical inaccuracies
Biometric Face Recognition Research done by Rafael
General
First Founded in 1948 as Israel’s National Research & Development Defense
Laboratory within the Ministry of Defense, Rafael became incorporated as a
government-owned company in 2002. Rafael has nearly 5000 employees.
Rafael masters leading edge technologies for defense applications and has a unique
infrastructure, including advanced laboratories and R&D centers. Its high-technology
base has enabled it to maintain a leading edge in the world markets.
21
Background of Rafael Face Recognition Research
The purpose of the system is to automatically identify people from a face databank,
especially people who participated in crimes, who forged identifying documents, were
"caught" in surveillance cameras. It can also be used to exonerate people from false
accusations.
Rafael’s system can unite several biometric factors into one application, for example
immediate identification of face and fingerprints of the same person. The system is
able to use several technologies in order to identify one person.
Rafael made a modification of the "smart card" system, which insures a very high
security level at the entrance to buildings, airports and other important places. The
Smart Card Reader was also developed by Rafael.
Regarding the identification process, there are two lists of data in Rafael’s system, the
"White list" and the "Red list". The white list will include employees or visitors, while
the red list will include suspicious people. The system will identify a person according
to the list, after he is photographed, without his needing to identify himself or
cooperate in anyway. The system will react with an automatic warning the minute that
the person will approach.
There is also the check point system, which enables recording, identification, input
and output of data and photographs into the system.
Rafael has decided to enter the biometric field due to increased worldwide concern
about terrorist attacks (especially in Israel). There is a widening interest in such
technology, especially face authentication, because most of the present biometric
identification methods are considered invasive, i.e. it requires an active participation
of the inspected candidate: placing a finger on the fingerprint identification device or
positioning an eye in front of the retinal scanner lens and so on. By contrast, the facial
recognition methods do not require an active participation on behalf of the candidate.
It is possible to identify candidates from a distance and without their knowledge.
22
The Israeli Ministry of Defense requested Rafael to research the face identification
and to come up with a new technology in this field. The Israeli Ministry of Defense
program was aimed to identify suspects as human bombers and suicidal terrorists.
The algorithms and the knowledge of Rafael take into consideration, the following
five factors, which are based on the usage of Rafael’s missile system and image
processing technologies:
Pose
Illumination
Expression
Occlusion
Time Laps
All above five factors might substantially decrease the performance of today’s face
recognition systems. One of the problems in face recognition is that all the algorithms
perform normally under ideal conditions, but when those conditions are changes, the
accuracy rates drops. The process of face authentication is done in a few stages in real
time. The novelty of Rafael’s algorithms is in advanced image pre-processing and
sophisticated fusion of different matching engines.
In this technology it is possible to clear the distortion that occurred when taking the
picture such as artificial compression, light damage, shading or blueness of the
picture if taken from far distance.
Rafael uses different extraction techniques:
1) Geometric features matching.
2) Local texture extraction.
The first one represents the general geometric structure of each face and focusing on
a fiducially points on each face. The second features is affected from local texture and
information embedded in the image (such as contrast and skin characteristics and
other facial attributes).
23
Rafael developed ID facial equipment for recognition system. The Facial Recognition
System is used to automate the search through large facial database and identify
wanted persons in law enforcement scenarios. Typical applications in which the ID
technology will be used are searching for the identity of a suspect whose face image
was captured in a crime scene and also supporting the investigation of a video stream
collected from surveillance or intelligence camera sources for known wanted people.
The system can also clear a person as being unknown to the law enforcement agency.
The main functions of Rafael’s system are:
1. Manage a facial image database of known and unknown people: input new and
updated images, store and retrieve the images.
2. Manage textual data associated with each person whose image is stored: ID data,
known aliases, gender, race, birth-date, case ID, time stamp and other relevant
data.
3. Enroll new persons into the database using a standard digital camera or any
video camera. Pre-process imported and enrolled images in the database, and
create image template and store the template associated with the row image,
ready to be matched with images from analog.
4. Control the quality of enrolled and imported images and classify each image
into quality groups.
5. Match single probe image against all the images in the database and produce a
list of candidates for identification ordered by probability rank.
Advantages of the Rafael Face Recognition Technology
One of the main advantages of this Biometric solution is that it can perform data
fusion of few unrelated biometrics algorithms and provide one improved result.
The system is also advanced in the sense that it can identify a pre-enrolled individual
from the "watch list" as he appears in the camera field of view, without any need from
the individual to declare his identity, and without any participation from the subject. If
the subject is in the "watch list", the system will alert.
The system can find face in any dynamic video:
24
1) Captures one or more face images and automatically handle all the pre-
processing procedure such as pose, head size, resolution, exposure, blur, etc.
2) Automatically choose the best quality image of the face, and the cropping.
3) Saving the image to the system.
4) Creating the biometric template and save it into a database.
5) Using 2D to 3D state of the art technology.
The system can detect faces as small as 20 x 30 pixels. The unit can:
- Use original database of near-frontal stills, and generate a 3D model during each
enrollment.
- Create additional views at different pose angles, rendered off the generated 3D
model.
The system has a unit for facial verifications that enhance the security level in access
to buildings, airports, and critical infrastructures.
The system consists of the following stages:
1. Enrollment:
Face finding in any dynamic video source such as CCTV cameras, web
cameras or any static image with 8 bit grayscale or 24 bit RGB.
Captures one or more face images and automatically handle all the pre-
processing procedure such as pose, head size, resolution, exposure, blur, etc.
Automatically choose the best quality image of the face, and the cropping.
Saving the image to the system in accordance to all ICAO / ISO standards.
Creating the biometric template and save it into a database.
2. Verification:
Verifies person’s identity from video input against enrolled image.
2 verification options (fully automatic or partially controlled).
Gives the option of verifying 2 static images.
Integrate into the fusion model for outstanding performance.
3. Video Processing
Captures any frame that supports video for windows.
Read/Write/Save options in an advanced video component.
25
Display the video source in the application.
Following are the two additional research and development fields that are developed
in Israel that identify a person from distance.
26
4. Voice Recognition
There is no doubt that the voice recognition technology is among the important
biometric technologies.
The voice technology has many advantages over other technologies. In these
technologies it is possible to verify or identify the identity of an individual from
distance. In Israel, one of the leading voice technologies was developed by the
Company Cellmax. This technology was recognized and accepted as an international
standard. We will elaborate on the standard issue in the standards chapter.
This technology, like other technologies, necessitates the storage of the person’s voice
within the database for future identification, and then the comparing of the voice
patterns between the stored voice and the person’s actual voice. This Israeli
technology has high percentages of accuracy in identifying an individual.
The importance of the voice technology recognition is increasing in the globalization
world where international transactions, including payments, business overseas,
international commerce, global communication including communication with vessels
in sea and the use of different types of call centers are being done. Credit transactions
which are done on the phone and different banking transactions all need identification
from distance.
In Israel, the voice technology has gained special attention and developed in a high
level due to the security needs. For example, a terrorist that covers his face and talks
about his activities on television, his voice can be recorded and stored in the state
database. If this person is caught due to terrorist activities, he could be identified
through his voice.
There are many more examples for the usage of the voice technology such as being
able to call a department store, request an item, and pay the amount identified by
voice and receive the package within a few days, or entering a movie house just by
saying “I’d like two tickets, please” or being able to walk into an airport, checking the
baggage and walking onto the flight, safe in the knowledge that the voice at the
check-in proved both the identity and the ability to pay for the ticket. The expectation
27
that in less than ten years, a person’s voiceprint will be used as the ultimate user
identification tool in the most natural way, whether to operate devices remotely (by
phone or online) or entrances. Standardization is also playing a key role in making
this prediction a reality. The Biometric Committee of the International Standards
Organization (ISO) is dealing with Speech Data Interchange Format for Speaker
Recognition project. The committee’s shared vision is to create a global standard data
exchange file format for raw speech data for speaker recognition. This interface will
standardize voice for makers of hardware, chips, DSPs and the like, but may also
propel the development of all electronic media, from computers to cell phones – even
electrical appliances.
Voice biometrics, meaning speaker recognition, identification and verification
technologies, should not be confused with speech recognition technologies, which
have the ability to recognize what a person is saying but do not recognize who the
person is. By contrast, speaker recognition, verification and identification
technologies can be used to ascertain if the speaker is the person he or she claims to
be.
Voice biometrics is the only biometric output that can be delivered over any type of
communication network. Accuracy rates for voice biometrics are good, reaching False
Acceptance Rates and False Rejection Rates in the infinite of percentages, and Equal
Error Rates of less than 1%.
Around the world, new, higher levels of security are being formulated, that leave
behind the days of single-factor authentication (PIN, password or challenge question)
and call for multifactor methods to ascertain a person’s identity by answering the
question, “Is this person who he/she claims to be?” using three factors:
1. Something the person knows.
2. Something the person has.
3. Something the person is.
Voice technology provides a three-in-one solution. Because voice biometrics is a
complex function created and generated by at least 15 physical parameters, it is both
“something you have” and “something you are”, and the PIN or password, detected
by speech recognition technology, is “something you know”.
28
Voice biometrics also differs from the other forms of biometrics in that it is a complex
function created and generated by at least 15 physical parameters as follows:
1. Nasal cavity
2. Nostril
3. Lip
4. Tongue
5. Tooth
6. Oral cavity
7. Jaw
8. Trachea
9. Lungs
10. Diaphragm
11. Esophagus
12. Larynx
13. Pharyngeal cavity
14. Soft palate
15. Hard palate
Like the other biometric markers, the result of a biometric measurement of the voice
is totally depending on:
1. Input,
2. Accurate mathematical algorithms, and
3. Computing Power.
An advanced voice biometrics solutions will take, as its foundation, these 15
parameters that create a personal voiceprint and makes calculations in real-time using
a proven, highly accurate mathematical algorithm. The voice verification algorithm
provides a method and system for registering and authenticating secure, voice-based,
e-commerce transactions over telecommunications networks. The technology
provides a method and system for voice registration involving three major steps:
• Fractal analysis,
• Spectrographic analysis, and
• Determination of Lyapunov exponents.
29
Advanced methods perform fractal analysis, where raw data is investigated and each
sample gives a set of non-dimensional numbers that characterize a speaker’s voice
uniquely. The method also produces a vector consisting of the aforementioned 15
physical voice parameters that form the key index for the verification. The system
performs a spectrographic analysis, investigating the raw data to generate a uniquely
identifiable pattern. The system includes a voice registration unit for providing unique
initial identification by finding the speaker/user’s voice parameters in a voice
registration sample and storing it in a database.
An advanced system will also include a voice-authenticating unit for verifying one of
a plurality of users that includes a recognition unit for providing a voice
authentication sample that operates with the database. The voice-authenticating unit
also includes a decision unit that operates with the recognition unit and the database,
to decide whether the user is the same as the person of the same identity registered
with the system. In this way, the user’s identity is verified absolutely.
Input quality, the most important factor, is greatly affected by the type of input device
(Professional microphone vs. cell phone, for example) and environment (noisy street
vs. quiet office). State-of-the-art voice biometrics will automatically measure voice
sample quality, then correct and clean it to produce the clearest possible data.
Advanced technologies can adapt to voiceprint changes, support input over landline,
VoIP, and have even overcome cellular phone distortion. It can even overcome a
stuffy nose, an adolescent boy’s voice cracking, or physiological changes due to
injury.
In addition to higher levels of accuracy powered by improving algorithms, the
software for voice biometrics solution does not require additional hardware or
infrastructure.
Voice is biometric output that can be delivered over any type of communication
network: landline or mobile phone, wired and/or unwired virtual private network
(VPN), voice over IP network (VOIP), radio network and, of course, local
microphone.
For call centers, voice biometrics is an ideal solution, providing higher levels of
identification and verification while keeping costs low by increasing process
automation. Answering a challenge question takes 20 to 40 seconds, but an
individual’s voiceprint can be recognized by a voice biometrics system within 3 to 7
seconds. Banks, brokerages, healthcare providers and any other institution with a
30
vested interest in preventing identity theft can also benefit from voice, which is
forecast to become the technology of choice for phone banking, primarily due to
convenience, low-to-no hardware requirement and cost.
Voice also eliminates psychological barriers for users. Many people dislike giving
personal information over the phone, and don’t like the feeling that their
conversations are being recorded. Voice ID and verification eliminates both these
elements, because the person is the password and their voice is the verifier. This has
significance for all voice-based transactions; as approved individuals see that just by
saying a few words, they’re allowed seamless access to the services they’re entitled to,
they’ll feel more comfortable and confident about expanding the range of services
they receive.
Voice could liberate people from cards, smart and otherwise. If your voice is your
identity, you will be identified on the spot, and your service provider or security
operator will have verification that you are you.
The voice system has different possibilities and professional implementations. For
examples, in the field of forensic solutions, an automated mode and half automated
mode have been developed:
A. An Automated Mode, for intelligence needs only. This mode is designated to
operate online and to assist in intelligence assignments. This mode
incorporates additional information, such as Calling Line Identity and a
narrowed down speakers’ list, for speakers that may speak from the same
phone. In this mode a Speaker Verification and a Multi Speaker Verification
are implemented.
B. Half Automated Mode, for the purposes of suspect interrogation and suspect
location according to a voice that cannot be recognized by a human ear, in
certain phone conversations. This mode is different from the previous mode,
due to the need for making Large Scale Identification, and not just Speaker
Verification or Multi Verification. This mode provides a list of suspects out of
a given list. A procedure similar to that of an Automated Fingerprint
Identification System.
31
Up to the last few years, a forensic voice lineup has been conducted either by a human
Voice Recognition or by using a Spectrogram of frequencies that exist in speech. Few
doubts were raised opposing these methods. Those doubts are linked to the scientific
grounds on which those methods are founded.
A. Can these methods be considered scientific and can they be considered to be an
exact science?
B. Are these methods objective?
C. Can other experts reconstruct the same results and arrive at the same conclusions?
D. What are the error rates for these methods?
E. Are the sources for error in the method known? Both in all that has to do with the
spectrogram itself and in all that has to do with the analysis?
F. What scientific community holds an agreement as for using these methods?
To overcome these doubts today, the new system supports the traditional method but
with a new technology based on computerized speaker authentication it overcomes
the problems.
32
5. Biometric Signature
Another important biometric technology is the biometric signature which has the
ability to be sent to any distance by combination of software and hardware.
In the global market where connections and commercial business is done from place
to place or from different countries, when companies and individuals need to identify
themselves before making any type of business transaction, a biometric identifying
signature is needed.
In other words, the biometric signature comes to solve the need of identifying a
person from distance in the most secure way.
In the biometric signature, there are all the attributes of a regular signature, meaning
movement, form, organization and pressure. The difference is that in a simple
signature it is hard to identify a forgery as a naked eye will not see the difference
between signatures, whereas, when it is done biometrically, the computer traces the
hand movement like writing itself that is connected to the brain which sends messages
to the hand during the signature and by that it is almost impossible to forge the
signature.
The biometric signature is meant to be used for transferring messages to banks or any
other need that uses distant identification. This technology like most other biometric
technologies needs an identification of the signature in advance. The comparison
between the two signatures, the one which was given in advance, which is in the
database, and the one that is sent by distance is done by sophisticated algorithms. This
technology is able to adjust the signature which is in the database every time that a
new message with a signature is sent. In other words, the algorithms are able to
identify the signature even if it has some changes and update the file with the changes.
This technology mimics the human brain process, so that computers using it will have
the capability to learn from experience, accumulate knowledge, and apply this
knowledge to new situations. The technology takes previously solved examples to
build a system that makes classifications, and forecasts.
33
In fact, the biometric signature covers the technology of PKI. Therefore, eventually,
the biometric signature technology will dominate the distance authentication, which
means, instead of using an encoded digital seal of 128 bits or more, biometric
technologies will be used.
34
Future Biometric Technologies
In this chapter, we will present examples of biometric technologies which haven’t yet
been in use or that the use of them is initial and has not gained experience and
therefore is unknown to the public. In some cases, the developments are based on
biometric technology but are not used for personal identification but for impersonal
identification.
The technologies which will be described were developed by universities or by
companies which specialize in the biometric field. These technologies, like other
biometric technologies, are based on physiological or behavioral reactions of the
identified persons.
The innovation in some of these technologies is that the identified person doesn’t
need to have his details in any database and sometimes he even isn’t aware of being
checked. (This type of technology has already been discussed in the face recognition).
Some of these technologies are secret and thus cannot be published, but we will refer
to those which have already been advertised in Israel, some of which are already in
use, such as the following.
1. Biometric Identification by Dogs
As dogs are used for guarding secured places such as prisons, secured entrances,
airports and border crossings, a new research found that the police, military and
guards that are dependent on the dog barks became used to the barking and didn’t pay
enough attention to the barking. The barking could continue for long hours and the
guards could not attach them to a special event and therefore disregarded them.
A study which was performed in Israel in cooperation with the University of
California found that it is possible to translate barking into alarm. There are different
kinds of barking and it is possible to distinguish between the different types of barks.
It was found that all dogs emit the same type of bark when they sense trouble.
35
Once the barking was classified into different groups, it became possible to develop a
biometric sensor that will distinguish between the dog barks and alert the guards when
trouble is sensed.
This biometric sensor is attached to the dog’s body and senses the dog barks. It then
transmits this information to the security system where the guards are located. The
system receives signals from the dog, and performs a unique digital signal processing
analysis. The data is filtered and passed through an analytical process to determine the
state of the dog, and indicate the one of 3 system alert levels: *No-Alert - The
watchdog is responding to routine events, *Medium-Alert - There is suspicious
activity in the vicinity, *High-Alert - An intrusion has occurred into the dog’s
territory.
The Watchdog Security System can be integrated into existing security systems
(Central Control Systems, home alarm, CCTV monitoring systems, etc.) to effectively
alert and present the security crisis to the required system.
The technology for identifying different types of barks including all the equipment
needed to operate it, was developed by the Israeli company Bio-Sense. Additional
information regarding this company and its technology will be introduced later in the
chapter of Israeli companies.
2. Biometric Identification according to Facial Expression
This technology refers to the face expression and not to the face shape and features.
Over the past few decades, the growing computational capacity led to the
development of a wide variety of real time image processing applications that can
replace the human eye.
Human beings can usually detect emotional signs in other humans’ facial expressions
and infer their underlying emotions. However, up to date, no satisfactory automatic
method could quantitatively map facial expression attributes to real life emotional
stimuli.
36
The researchers at Tel Aviv University developed a method which enables to
statistically relate a facial expression and the stimulus that arouses it. The results show
that the probability of guessing the stimulus from features extracted from facial
animation points is higher than the prior probability. That is, for the first time, it is
possible to point out on a systematic approach for automatically relating facial
expressions to emotional stimulus. This biometric development will lead to a new
technology where there is no need for a template in a database for identifying
suspicious people as it will be done on the spot without having to compare previous
information.
An interesting application to this capacity is the detection of a person’s emotional
state from his/her facial expression. Efficient algorithms to this problem could yield a
whole variety of systems in the fields of security, particularly in identification of
suspicious people, medicine and more. Up to date, no satisfactory automatic method
could quantitatively map facial expression attributes to real life emotional stimuli.
Details of this research:
Classical psychology studies claim that there are six basic facial expressions that
express emotions which are recognized all over the world and in all cultures. The
classic facial expressions are: happiness, anger, sadness, surprise, disgust and fear.
These six basic facial expressions proved that a spontaneous change in face
expressions, which represent the six basic facial expressions, occurred in almost a
similar frequency both among Japanese subjects, American subjects, as well as among
European and Israeli subjects, as a reaction to watching a strong emotion raising
movie. These studies show that different facial expressions, which are composed from
the basic facial expressions, aren’t culture tied and thus can be identified with no
connection to the identity of the subject.
A study conducted in Tel Aviv University by Dr. Nadav Nechmad, presented the
methodology of characterizing facial expressions through a computer and finding a
connection between stimuli and a change in the facial expression and the person’s
emotional state. In this field, in contrast to face identification which purpose is to
identify the person, the study’s purpose is to find the statistical connection between
the stimuli and facial expression, which will be applicable to everyone.
37
Such applications can serve, in the future other systems, in the field of security and
medicine, which use the person’s eye for diagnosis. Thus, for example, it is possible
to locate suspects in airports or to diagnose patients’ mental state according to their
facial expressions. An additional field of applications which opens a full world of
possibilities is the interactive computer games, where the game depends upon the
user’s facial expression. There is no doubt that it will be possible to develop an
application which can diagnose a person’s mental state according to his changing
facial expressions, even partially, which will be a tremendous achievement that will
serve in many fields.
The classic studies claim that basic expressions of emotions and accordingly facial
expressions are directly connected to a specific neurological brain structure, which
characterizes these emotions. Their claim is that the connection isn’t between
emotions and facial expression, but between certain components of the emotion and
facial expression, as the facial expression is composed from several emotions.
The researchers claimed that most of the studies which were conducted focusing on a
relatively small collection of facial expressions such as happiness, sadness, fear,
surprise, etc. In their opinion, many other studies are needed as facial expression is
actually divided into 44 units, which divide into further sub-units. These sub-units can
be used to characterize and categorize people’s different facial expressions. Also,
showing initiated emotions, aware of the request to do so, is totally dissimilar to
spontaneous and unexpected facial expression of a person in reaction to surprising
stimuli.
The Israeli researchers focused on finding the relationship between external stimuli
such as a computer game and spontaneous reaction such as facial expression of their
subjects. They claim that it is possible to classify the different facial expressions that
were expressed by the subject according to the type of the stimuli and to assume, in
correlation, what was his emotional state when his facial expression changed. They
claim that it will be possible to build a tool which will analyze the emotional state of a
person before exams.
This research was conducted with people from different cultures. Therefore they
claimed that facile expressions are culture independent.
38
The disadvantages and doubts about this research:
The facial expression method is being doubted by some researchers who claim that
the difference of culture and education, do effect the person’s reactions and facial
expressions.
They also claim that some people will not express emotions when they are among
certain people, whereas when these people are among other people they will express
strong emotions and therefore it will not be consistent to follow their facial
expressions.
The opposing researchers claim that emotions are a collection of social components of
the person’s reaction towards his environment and thus facial expression cannot
describe the real emotions that the person feels, but his interpretation to a changing
environment.
3. Automatic Identification, Surveillance and Tracking in Open
Spaces
Identification surveillance tracking technologies are developed for security reasons
such as tracking people crossing borders or crossing in unauthorized places. The
identification is impersonal but it will isolate and identify person from other objects.
There are many problems in the identification surveillance and tracking in open field
due to natural factors that could affect the identification in the open filed like winds
that throws objects in the air, changes of lighting at different times of the day, or
sometimes different background colors or objects that are in the background that
could affect the identification of the person. All these factors may cause false alarms
or unnecessary alarms, or no alarm at all, even if there is a need.
Thus, the system’s operator can become complacent, with the many false alarms.
Reducing the sensitivity of the system will reject only some of the false operations,
39
and as a result of that, the quality of the performance will deteriorate. Thus, the
optimal solution must be found in the algorithm that knows how to treat false alarms
and not to ignore them.
In order to overcome these problems, a research was conducted at Tel Aviv
University by Dr. Yair Dalal. Its purpose was to build a smart camera for
implementing automatic surveillance in order to overcome these problems. The study
presents an algorithm and a "smart camera" system for real time applications of
automatic supervision in open field, such as identification of object’s movements. The
form of objects can change during their motion, and the general rules of motions are
known. The algorithm that was developed during the research has the following
advantages: Identification of moving objects, even if they are gray color or are similar
to the background where they move. The form of objects can change during their
motions, so that the algorithm can treat the three dimensional motion of viscous
objects. The algorithm copes with situations of extreme and continuous changes in the
lightening level which include the field of vision. The algorithm can cope with a large
variety of motion speeds: deviation of small and big objects is identified by the
system, including situations where the bodies stop for different periods of time during
their motion in the field of vision. The algorithm can function in the presence of
several objects in the field of vision and in the presence of noise that can cause false
alarms. Objects can move as groups close to each other or separately to different
directions and the algorithm follows after each group of objects that move together.
Because the algorithm is efficient, quick and works with reduced pictures, it is easy to
apply in commercial systems for real time applications.
Also, in order to test and to prove the system’s efficiency, the algorithm was
examined in various cases, some of which are presented in the research. The examples
are supposed to observe the functioning of different parts in the algorithm’s coping in
extreme situations. The results shown in this work show that the system managed to
cope with the demands that were targeted.
The new camera development distinguishes between different types of disturbances
and copes with them. Meaning, it is possible to use it for identifying motion, for
identification and for tracking undesired people and for surveillance. The performance
40
quality of the algorithm for motion discovery mostly depends upon its ability to
ignore false alarms.
The combination of camera-processor demands the ability to observe the scene, such
as a parking field, and to alarm guards when an extreme event occurs, such as the
motion of a car or a person entering the field. It is necessary that the system will be
"smart" and able to successfully distinct between an undesired person or object and
other activities in the scene, such as the motion of animals, the motion of wind among
the trees, clouds, etc. There are two types of disturbances: cyclical disturbances that
occur in the scene through long period of times and passing disturbances.
Following are the algorithm’s features:
The input - the information that will be received by a single video camera will
not change its place during surveillance.
The size - during surveillance, the body will be approximately a hundredth
from the size of the picture area.
The structure - the body for identification does not have to be stiff and will
not have to have strait angels but can even be similar to a viscous item.
The contrast - the system will know how to deal with cases that the
brightness of the body will be similar to that of the background.
Texture - there will need no difference between the texture of the bodies and
the texture of the background where they move. This requirement may ease
the identification since it is possible to differentiate between moving objects
and their background.
Multiple items - the algorithm should be able to deal with a number of
moving objects simultaneously in the field of vision and in different directions.
For example: a number of people moving in different directions.
Movement - there is no need that the object for identification will constantly
move in the field of vision. This means that during certain times, the object
will not change its place. The algorithm will need to also identify the object at
non movement.
False activation - the system needs to be able to cope with false cycled
activations and with false passing activations.
41
Light conditions - the algorithm copes with changes of lighting. It will be
possible to distinct between gradual changes of lighting and sudden changes of
lighting. Gradual changes of lighting occur because of changes in the sun’s
angle and following those changes in the shadow projection near the detector.
Sudden light changes occur as a result of lighting, lights of a passing car, a
moving cloud, a passing airplane, etc.
Starting conditions - it is possible to assume that when the system is started,
there are only objects that compose the background in the field of vision,
without other objects.
Speed - the algorithm will perform the processing in real time in a small and
inexpensive system.
4. Biometric Development for Identifying People in Closed Places
This technology comes to solve the problem of hiding terrorists and unauthorized
passengers in shipping containers, closed objects such as cars, closed cabins with
double walls or forgotten children in cars.
The system connects wirelessly to a sensor in the car and senses motions. Therefore it
can identify a person within the car or the container.
The original system is composed from a combination of sensors that are connected
together through wireless or linear communication, that transmit data to a collecting
box, which incorporates all the sensors’ data. The box integrates them and transfers
the information to a software program that performs an attribute of a motion that was
recorded by the sensors. For example, the system will identify a person that tries to
connect illegally to an oil pipe or a person who enters a protected area with sensors.
The systems can distinguish between a person’s motion and an animal’s motion.
This application is already used at the Israeli customs border crossing. This biometric
development joins the list of new developments that help people in specific fields and
the identification is impersonal.
42
5. Biometric Applications for Identifying Objects
The biometric theory refers to the identification of behavioral and/or physical
characteristics of people that is measured by sensors and used by algorithms.
This research suggests an application for identification of different forms and objects,
and at the same measure identification of different targets using the biometric idea.
These methods carry reference images that remain in memory, and when needed, a
comparison is made between the reference image and the image of the object
identified like in the biometric perception.
In a research conducted at Tel Aviv University by Dr. Oren Gelbert, an algorithm for
general identification was developed. The algorithm was for identifying two
correlating dimensional forms that are invariant to the imaging transformation and the
light conditions. Thus, even if the photography conditions of the objects are different
from the reference image, nevertheless, the algorithm identifies the desired form. The
uniqueness of the algorithm is in the combination of two attributes:
1) It takes care of all the geometric distortions which are part of a typical
transformation (meaning motion, circle, change of size and inversion in any
angle).
2) Based on the correlation method, and thus there is no need of former
information about the two dimensional form needed for identification.
Another important attribute of the presented algorithm is the ability to measure the
imaging transformation parameters. This is especially important for application where
they need the placing and orientation of the camera in reference to the target, such as
automatic navigation systems, which are positioned at the head of missiles. Such a
system can take air photographs of points along the needed flying course, and any
time that the system will pass through such a point, it will identify and calculate, by
the parameters its relative placing to the photographed point.
As mentioned, it is also possible to use algorithms for identification of targets. The
Automatic Target Recognition is a system which purpose is to observe one site
through a two dimensional sensor, such as a video camera, to locate and recognize the
43
image in order to locate the appearance of a known target (or several targets). The
uses for Automatic Target Recognition systems are varied – starting from surveillance
systems and entrance control (opening electric gates with the appearance of a known
body), and automatic navigation systems in unmanned flights (such as in missiles). It
is possible to insert into such a navigation system a satellite image of points along a
needed course and each time that the system will pass around one such point, it will
identify it and correct the flight course according to its relative position to the
photographed point.
The attributes of the Automatic Target Recognition system are:
A positive identification (meaning the system’s decision that the required
object appears in the image) must be verified at the utmost confidentiality,
because most of the Automatic Target Recognition systems are integrated in
unmanned weapon systems against an object that isn’t the desired target. The
chance for false alarms in the system is a measure to its security.
Non-identification means that the system doesn’t recognize the desired object
in the image in spite of the fact that it appears in it. Non-identification means
that the system will not achieve its purpose, and thus the chances for non
identification are a measure for the system’s quality.
There are almost no limitations on the type of targets, baring the fact that the intention
is to recognize two dimensional forms, and thus the target needs to be relatively "flat",
(such as flight course in an aerial photograph), or that the target is composed, among
other things from a specific surface, which can be recognized (such as a car’s front,
that includes lights, license plates and a grill).
There is a minimum of information regarding the character of the desired target. In
fact, it is strived so that the sole information that will be fed to the system will be an
image of the target (recognition image), this in contrast to the Automatic Target
Recognition, which depends upon attributes that were known before, such as specific
geometric attributes. The reason for this demand is the ability to feed into the system
targets for identification even in the field in as little time as possible. Under these
conditions, we will usually have only few images of the required target. The feeding
will be done by a non-specializing operator, which obliges an automatic input process
44
and doesn’t enable in-depth analysis of the target. Also, the minimum requirement is
early information, which enables flexibility in the choice of targets, because uniform
targets will not be limited.
During the systems regular operation, it will capture from the video camera a single
image, where the desired target may appear. It is possible that the application of the
algorithm where an endless loop occurs of input-identification (without early stage of
target discovery), and it is possible that the trigger to the process of identification will
be external, such as a motion discovery system, that will perform a primary process
for the input picture.
The space can be photographed in different angles and different distances by different
lens and varied lighting conditions, so that the fed image, at the beginning - at the
stage of target recognition can be very different from the image which is received
during the identification stage. It must be also remembered that photography under a
relatively sharp angle to the photographed space or when the target is only on a small
part of the space, it will cause the little information sent by the target by the sensor,
which will affect the reliability of the identification. This too must be taken into
account during the algorithm decision making.
Early algorithm must be quite quick, because the maximal period between the
beginnings of processing one picture to the beginning of processing a tracking picture
will be relatively small to the period that that target is in the picture. This can prevent
the situation where the algorithm is busy with checking the former image, and during
that time, the algorithm is busy in examining a former image, will pass in the field
without being identified and recognized. This demand throws on the planning and
implementation of the algorithm and the structure of the entire system.
As it can be seen, the biometric technology can be implemented in different ways
such as in the industry, Medicine, Security and military.
45
The Israeli Government
General
It seems that governments that were directly hit by terror or those that fear it are
encouraging the development of biometric technologies for protecting their citizens.
Within its institutes, it included local industry, schools, and public places. One such
example is the USA which, from September 11th, 2001, changed all the surveillance
of people entering the USA. Today, biometric technology takes an important part in
the lives of USA citizens and, in a certain level, in the lives of those who enter the
country.
Israel, suffering terrorist acts throughout its existence is making great efforts in this
field. A good example for this kind of efforts is the border crossings within the Israeli
states illustrate the advantages of using biometric identification. Three types of
biometric identification methods are used simultaneously in order to identify the
travelers to Israel: hand biometric data, fingers and face technologies.
The Israeli Government
The Israeli government established a Ministerial committee for advancing biometric
technologies in Israel. A specialists’ committee was established in the Prime
Minister’s office, with members from different government offices and Intelligence.
The role of specialists is to implement the biometric technologies within different
government offices. This government committee for biometric applications acts for
merger and coordination between the different projects, regarding data sources and
information import. The last field is an important part of the process. The government
decision is that before trying to develop local inventions, the committee should strive
to locate, import and alter it according to Israeli needs. All is done according to Israeli
standards by the appropriate factors.
The committee was also asked to examine the need and possibility of using biometric
applications in state services: for preventing frauds and improve general security in
government offices and organizations. They were asked to examine the biometric
46
applications, the existing standards and to determine special rules for government
offices, regarding adoption of biometric applications, taking their special needs into
consideration. The specialists also determined the necessary list of equipments and
technology which are appropriate to the different government offices. For example,
the government leads two large national projects: electronic ID and electronic
biometric passport. When the passport will be available, it will be used to monitor
entrance of people into the countries that will adopt the biometric passport.
The government makes specific decisions regarding biometric subjects every once in
a while. For example, the government decision from 2005 which concerns the Justice
Ministry Memorandum about identity cards and travel cards with biometric
parameters. The Memorandum includes legislation changes needed for including
biometric identifiers in the "Smart Identity Card" in passports and other travel
documents. These identifiers will be correlated to the USA government and the
European Union’ demands, and according to the LCAO, ISO and NIST. The Israeli
interior office and police will use biometric means for border inspections. The interior
office and police will conduct a supervised experiment of issuing identity cards and
passports with biometric information. In its winter session, the government decided to
submit a legislation regarding population registration, including identity cards and
travel cards with a computerized photograph like used in the driver license.
We will present several examples of governmental decisions regarding the use of
biometric technologies that will show the importance that the Israeli government
imparts to these new biometric technology.
The government decided to establish a committee with representatives from the
Internal Security Office, the Police, the Interior Ministry, the Intelligence office, the
Treasury Ministry, the Justice Ministry, the Military and the head of the State
Comptroller in the Prime Minister’s Office.
The committee will examine the need for using a technology, taking into
consideration concepts such as protection of privacy regarding the use of
biometric applications in the State Service, for fraud prevention and security
improvement.
47
The committee will work with the Accountant General, who is responsible for
the development and maintenance of public computers and smart cards in the
government.
The committee will examine the existing standard biometric applications, and
set appropriate rules for the government offices for adoption of biometric
applications.
The committee will examine each application by the relevant office, and
taking into consideration the needs of each office for using biometric
applications. This decision will not delay any work which is already conducted
regarding the advancement of biometric applications in government offices,
including inter-ministerial working groups, which advance the program for
applying biometric applications regarding foreign workers or law enforcement
agencies.
The committees that work towards advancing the use of biometric applications
in government offices will report every six months to the Ministry committee,
regarding the advancement of their work.
Another decision was to establish a general information center in biometric subjects
within Rafael, the governmental company. Rafael will establish a center for biometric
technology information this information will be available to all government offices.
The government also determines to conduct experiments of biometric products
according to international standards and appointed the committee to prepare Israeli
standards to biometric products in correlation to the relevant foreign standards. The
government bodies will examine any application that must be used in order to make
the process more efficient, to reduce expenses and to enable exchange of information
between the different bodies. The intention is to achieve a confirmed list of products
that governmental bodies could use in the future, with no need for further checking.
The head of the professional committee declared that there is no contradiction
between secrecy, high security and standards. The basic biometric technology
principles are known principles. Like in the digital signature, here too the architecture
is known and open, the passwords and authorizations are personal and kept secret.
48
Another decision concerns biometric means for computer systems users. The Israeli
Standard Institute will perform tests of products and software according to the
committee’s decisions.
An additional application is the integration of biometric technology in the "Smart
Identity Cards". This card must integrate biometric identifying means and strengthen
the processor. Without biometric means, the forging of the card is easy, and thus can
be used for illegal activities. It is expected that the growing use of biometric
identification means is expected to affect the war against crime and fraud. It will be a
great saving of resources, enabling a change in the current use of single method
applications, and preventing many frauds in fields such as credit cards, automatic
bank equipment, ATM, online commerce, etc. In fact, today, it is very easy to use a
credit card which isn’t your own, transfer money from others’ accounts and commit
frauds in commercial purchases. An intelligent use of biometric means will stop these
acts.
Biometric Picture Database in the Government
A. Biometric applications can be applied to the government pictures database. The
pictures that will be taken in the future will be of a quality that will enable biometric
use.
B. The inter-ministerial committee for biometric applications will prepare, within a
period of six months, a proposal regarding biometric applications that will be
assimilated in part of the documents issued by the Interior Ministry in order to
increase the ability to identify and verify the identity of the holders.
C. The Treasury’s Budget Supervisor, together with the inter-ministerial center, will
hold an operating framework for several leading pilots in the government. The
projects will be in the following fields:
1. Projects in the field of improving border crossing, which will be able to
identify people who are forbidden entrance.
2. Projects for identifying foreign workers.
49
3. Projects for prevention of fraud and increasing the identification possibility of
bodies who are receiving government payments.
4. Projects in the field of entrance control to computerized systems.
D. The specialist committee will report to the Minister's committee every six months.
The report will include a detailed work program in the different fields of their
biometric work including goals, budgets, resources and schedules for operation.
In addition, border crossing identification will be done using a smart card with
biometric technologies.
In the field of information security, the Israel Standard Institute will establish an
information center for biometric technology applications, with a database regarding
their validity. The information will be given to any government representative.
Furthermore, the government decided to enhance a biometric technology pilot in the
Social Security Institute, in order to prevent frauds which mean that receiving money
by this institute will be done only with biometric identification.
The Ministry of Transportation started to replace the driver license of the citizens of
the State of Israel to new biometric license according to the international standard.
The photographing of the driver is done by a new biometric system that preserves the
person’s identity for many years without having to change the license.
There is a lot of activity in governmental offices regarding the advancement and
implementation of biometric technologies, in accordance to the specialist committee
rules about the implementation of biometric technologies. For example, the General
Comptroller's Office conducts experiments for using different biometric technologies
in the Israeli Court Offices.
These are only some of the examples from the many activities that the government is
initiating in this field.
50
In order to increase the awareness of the biometrics subject among the Israel public,
the government publishes information regarding new biometric technologies,
including the use of technologies by the government itself and by other institutes. It
also publishes special biometric events that occur all over the world. The publications
seem effective as there is much public interest and awareness regarding the biometric
subject.
In addition to the Prime Minister’s office Specialists’ committees for implementing
biometric technologies in government offices, there is a special department in the
same office, which role is to follow the instructions of implementing biometric
technologies in the state’s service. This department also follows the performance of
the State’s Comptroller’s recommendations. The role of this unit will be to follow up
the committee’s recommendations and to enhance different stipends and services. In
the field of improving services and the availability of online government services, the
use of single identification method can remove the last barriers for online services in
every field, anyplace, anytime. It will be possible to conduct businesses in a secure
and safe environment.
In fact, biometric technology leads to an organizational revolution in the government
services. Using biometric identification changes the service in many government
offices, such as the Employment Services. A year ago, the Employment services
began to use services based on biometric identification by fingers’ scan. The results
are clear. There are no queues; there is almost no need to enter the offices. The
interaction is made through biometric kiosks, which stand in the offices vestibules.
After the primary identification, the identified person receives job offers on the screen
as well as a printed output, and can begin to look for work.
51
Government Offices - Purchases Biometric Technologies
The governmental purchase of biometric items is done directly through the offices’
management, according to the Prime Minister’s Biometric Specialists Committee’s
recommendations. In addition, there is also a list of recommended technologies. Each
office decides which biometric item it needs. It can be the face technology, the Iris or
the fingerprint, or any other technology that the committee decided that is appropriate
for government offices.
Before purchasing the appropriate items, the ministerial office asks for information
from the biometric technology companies. After the companies replay and submit
their information, including the request for information questionnaires, the
government conducts a tender between the companies that hold the appropriate items.
For example, the Airport Authority purchases different biometric items, and thus
enables the use of biometric technologies in the entrance to Israel, which include the
use of smart cards and a combination of hand and finger identification, which saves,
and reduces the time for standing in line. There are thoughts to add the face
identification technology when entering the country in order to broaden the security.
The Face technology is also considered for using when leaving the country, because it
can be easily integrated with the existing five finger identification. The intention is to
install a new system in the Airport which will shorten the identification stage when
leaving the country through a biometric identification system.
The surveillance system at the airport began to use a new computerized system, using
fingerprints for identifying the travelers’ identity. The system will be able to identify
forged passports through a comparison between the traveler’s fingerprints and the
information stored in the security and interior office databases. The biometric system
is supposed to warn in any case where a person will try to gain entrance through a
false identity and forged passports.
Recently, a new biometric identification method was developed for preventing the
forging and selling of Israeli passports to hostile people. The phenomena which is
52
widespread in Eastern Asia among the Israeli travelers, is spreading and the Defense
Ministry fears that the purchased passports could be used by terrorists.
Another important advantage of the system is the reduction of friction between the
Airport’s surveillance officers and minority groups, who usually have to pass through
grueling examinations, which often give rise to complaints from the Israeli Arabs.
In the first stage, the system will only operate partially and experimentally, and will
examine 15,000 passengers, mostly from the Israeli business sector. In the next stage,
the intention is to operate it fully, and thus all the travelers will pass through it. The
hope is that the system will shorten the security check queues and will reduce the
passengers’ need to answer annoying questions.
Nowadays the system is based on a database of travelers’ fingerprints who signed a
biometric border passing smart card, as well as the surveillance database, which
contains all the fingerprints of anyone who served in the IDF and all who were
arrested by the police. The Ben Gurion Airport Authorities promise that the use of
information, which will be gathered by the citizens, will only be used for primary
security checks, but the operation of the system is expected to raise strong opposition
and will have to receive the endorsement of the Israeli parliament.
The idea of integrating biometric technologies, is the ruling approach nowadays, and
will control both the exit and the entrance ports to Israel.
53
Criticism for Using Biometric Technologies
The intensive means that the Israeli government uses to advance the biometric subject
causes much criticism. Fear from the "big brother" figure who has details on all the
citizens in its many databases is at the basis of the criticism, which is aired in different
newspapers, as can be seen in one example, in an article at one of the leading Israeli
papers: Maariv (15.10.07):
"The big catch in the right for privacy is the fact that it is taken from
us in small portions. Here a security camera in each street corner, there
the police listen to telephone lines, and now requests of free approach
to the cellular companies’ databases. This without speaking about the
Airport’s x-ray screening machinery, which seem quite natural to us,
and these are only the things that we know about. In the last years, a
complete industry has developed which purpose is to turn us
completely "transparent". The reasons is almost always the public
safety, fighting crime and terror - and those who protest citing
Orwell’s prophetic 1984, is perceived as a suspect, who wants to hide
something.
In the technological era, privacy is a basic right for luxuries and the
big trouble is that in addition to the personal price that we pay for such
transparent lives, the high dependence of the security forces, the police
and government on technological means, doesn’t necessarily achieve
its goals. Maybe even opposite, for example, the surveillance systems
of the USA had all the information regarding the terrorists’ intentions
regarding the 9.11 events, they only didn’t know how to interpret their
data. In fact, security forces admit that depending on technology
causes cognitive laziness and causing fear among a large section of the
public.
The problem is that the "big brother’s threat is all around us. The
combination of all the organizations creates the highest risk that will
prevent any of us to be who he wants to be. The right for privacy is
only appreciated when it is taken from us". It is maybe difficult to
argue with the advantage of using finger prints in the Airport, it must
54
only be recalled that no one can promise us that here is where it will
all end".
On the other hand, the Head of the Professional Committee explained that, in fact, in
order to keep privacy and to prevent illegal follow-up such as the "big brother"
scenario, the projects are accompanied by legislators from the Justice Ministry, who
specialize in privacy protection. Many of the discussions within the governmental
biometric committee are about keeping privacy laws alongside information freedom.
In fact, the technology by itself isn’t bad, but sometimes a situation can occur where
criminals will use the technology for unlawful purposes. Technology shouldn’t be
obstructed, but should be deeply examined and used carefully.
In the same paper, another criticism claims that:
"The question regarding the governmental databases and their uses is
at the center of a battle raging within the Constitution Committee. The
legislation that raises such opposition is about giving the police direct
approach to the information databases of cellular phones companies
and the Bezeq telephone company. The subject raises such high public
outcry because it may enable the law enforcement agencies the ability
to enter into the private lives of each citizen, without supervision or
need of legal endorsement. Yet those who are for the law claim that it
will only shorten processes, without allowing the police more rights
than which it already enjoys. Recently, the committee members
discussed how it will be possible to establish these databases without
damage to professional’s privileged information, such as doctors,
lawyers, social workers and religious figures…"
The worry and fear from the big brother’s open eye is also expressed in Sara
Frenkel’s article, "Someone’s watching us". In this article, the writer indicates that the
big brother’s eye is open? Yes. But our eyes are also open, as we consider the need
for surveillance means against terrorists and forgery of smart cards. The writer quotes
the head of State Audit Department "many fears are expressed regarding databases
that can be used by criminals. Our challenge is on one hand to have the best means for
serving the state and its citizens and at the same time, we have to prevent the "big
55
brother" situations". The head of State Audit Department continues and says that he
will "minimize the privacy invasion and ensure not to make bad usage in the existing
technologies". The issue of holding databases raises many questions as to the
information that the database will provide to those holding it, whereas on the other
hand, "we do not want to live in a country where all our actions are known to
someone". He also says that privacy invasion needs to be balanced between the public
interest and defending large publics from terror. He brings an example from Israel’s
everyday life - If a person would like to enter Israel from Gaza strip and does not
want to give biometric identity, he may need to wait in line for as many as 6 hours
until an investigator will come to identify him whereas if this person once gave his
biometric information at the border, it will take him only a few minutes to cross the
border to Israel".
The Israeli government is also aware of the citizens fear from the "big brother"
situation and therefore according to the decision that was reached by the specialist
committee for coordination, which included representatives from different ministries
decided that the balance between the need to protect the citizen and invade his privacy
will be well examined and taken all precautions that will be needed."
56
The Biometric Standardization in Israel
General
Israel sees the great importance in the international standardization which is lead by
the Israeli Standardization Association. This association has put for itself two main
strategies in this field on its agenda. The first is getting the Israeli standards to
correlate to the international standards. To date, about 40% of the Israeli standards are
adopted from foreign standards. The second strategy is getting Israel to be active in
helping in preparation and writing of the international standards.
In recent years, Israel has invested in identifying the different potential fields for
standardization to participate in the international standardization. It established new
committees that its representatives are mostly from the Israeli industry and
government agencies. These committees are in constant connections with the
international committees. In Israel, there are nine active "mirror committees" that are
working to identify the needs and to initiate international standards and to participate
in preparing these standards.
The Israeli Standardization Tasks
One of the main tasks of the Israeli Standardization Association is to bring the Israeli
industry to be more involved and knowledgeable in the international standardization
and perhaps be influential on the international standards. Israel is active in
approximately 250 international committees which are both technical and sub-
committees. There are approximately 70 specialists that are active in working groups
of the international standardization, among them 10 are in the biometric field.
There are six active Israelis that serve as Project leaders in the international
standardization committees.
57
The Matching Committees
Another initiation that the Israeli standardization association has made is
establishment of "matching committees" and a matching committee for biometric
standardization. These committees are working in parallel to the international
committees and are in constant connections with other biometric committees. They
need to identify Israeli standards that need to be updated and to regularly maintain
them and to write comments to the international standards that are being prepared.
The Biometric Committee in Israel
In 2006, different "mirror committees" were established, and among them the
biometric authentication committee was established. This committee is meant to
follow and take active roles in the international standard committee ISO-JTC1/SC37
in order to leverage the international standards and to promote the Israeli biometric
industry. This committee has ten members from different active companies and the
government sector. The committee holds regular meetings. During 2006-2007, the
committee has placed two draft standards, one of which became an international
standard.
1. Voice Data File Format
2. Biometric Graphic Signature Data Exchange Format
The Voice Data File Format was accepted and became a standard based on the
technology which was developed by the company Cellmax (details about this
company and its technology are in the voice authentication chapter and the industry
chapter).
The request to be recognized as an international standard for Biometric Graphic
Signature by the Israeli company is still pending.
58
The Lack of Standards
The lack of standards creates confusion as it is needed to rely on manufacturers who
will present its products as being best quality. When there is no standard, there is no
definition for the quality of the product.
Before September 11th, most of the Biometric standards dealt with fingerprints. The
first standard was Data Format for the interchange of ANSI/NIST ITL1-2000
Fingerprint, Facial & Scar Mark & Tattoo Information was published in 1986.
Following this standard, an additional standard was published by the FBI that also
deals with transfer of information in this field, “Electronic Fingerprint Transmission
Specification”. In addition to these two standards (and standards in similar subjects),
that are the basis for information exchange between authorities with respect to
fingerprints and law enforcement worldwide, at the end of the 1990’s, the first
commercial standards in the biometric field were published. But only after September
11th, even the international community realized the need for specific standards in the
biometric field and became more involved in their preparation. During June 2002,
ISO authorized the establishment of a secondary committee for the preparation of
generic biometric standard - ISO/IEC JTC1 SC37.
The Israeli Standardization for Biometrics
Up to date, Israel has adopted 8 out of the 20 international standards in the Biometric
field that exist and is working on adopting all other ones. To accept a standard, it is
needed to have at least 75% of the votes of the committee’s members. Once a
standard has been approved according to a certain technology, all other companies
that develop similar technologies adjust their technology to the standard and try to
enrich it. If they manage to enrich the technology, a new standard needs to be issued.
Adaptation of an International Standard
The process of adopting a standard in Israel goes through a committee that first
checks that the standard does not contradict an existing law or regulation. If needed,
59
the international standard will be customized to the Israeli needs but up until now,
there was no need to customize any of the adopted standards, which means the
international standard was accepted as is.
The Standards that have been Adopted by Israel
1. ISO IEC 19794-5:2005(2) - Automated Face Recognition
The first part of this standard gives a format for face recognition applications
requiring exchange of face image data of typical applications.
a. Human examination of facial images with sufficient resolution to ascertain
small features.
b. Human verification by comparison with facial images.
c. Computer automated face identification (one in many searching).
d. Computer automated face verification (one in many matching).
Face Image Data
- Specifies a record format for storing recording and transmitting the information.
- Specifies scene constraints of the facial images.
- Specifies photographic properties of the facial images
- Specifies digital image attributes of the facial images.
The standard gives definition to common terms used for the standard. This unifies all
terms internationally for instance in the face biometrics:
The face is divided to the different parts and each part is characterized such as:
- Chin: The central formed position of the lower jaw.
- Color image: continuous tone image that has more than one channel each of which is
coded with one or multiple bits.
There are many factors that are taken into consideration such as gender, skin and hair
color. Different masks such as glasses, beard, moustache, eye blinking, eye patch or
any other health problems that could affect the face.
60
2. ISO IEC 19784-1: 2006 (E) - Biometric Application Programming Interface (API).
This standard provides a high level generic biometric authentication model suited to
most forms of biometric technology.
An architectural model is described which enables components of biometric system to
be provided by different vendors and to inter-work through fully defined application
programming interface.
There is hardware or software that performs biometric functions such as capture
matching or archiving. These parts of the architecture are called BIOAPI units and
can be integral to a BSP (Biometric Service provider) or can be supplied as part of a
separate BIOAPI Function Provider (BFP) component.
3. ISO/IEC 19794-1:2006 - Information Technology - Biometric Data Interchange
Formats - Part1: Framework.
This standard is split to 6 parts which all of them were adopted by Israeli Standard
Association.
Part 1 - The Framework
Part 2 - Finger Minutiae Data
Part 3 - Finger Pattern Spectral Data
Part 4 - Finger Image Data
Part 5 - Face Image Data
Part 6 - Iris Image Data
Still under preparation are:
Part 7 - Signature/Sign Behavioral Data
Part 8 - Finger Pattern Skeletal Data
This first part of the standard is intended to describe the general aspects and
requirements for defining biometric data interchange formats.
The notation and transfer formats provide platform independence and separation
syntax from content definition.
61
Social & Jurisdictional Issues
Harmonized Biometric Vocabulary
Biometric Interfaces BIO API, BIO AMI, and Card Interface
Biometric System Properties Biometric Profiles, Security Evaluation,
Performance Evaluation
Biometric Data Security Attributes Confidentiality, Integrity
Biometric Formats, Framework (CBEFF) IDS
Biometric Data Interchange Formats
The above figure shows the interrelation of biometric related ISO/IEC standardization
field. Biometric data complying with Biometric Data Interchange Format of ISO/IEC
19794 represents the care component of biometric interoperability. Biometric formats
frameworks such as ISO/IEC 19785 (CBEFF) serve as a wrapper around biometric
data. Since biometric data are sensitive data and subject to attack, cryptographic
protection is required in interchange environments.
Conceptual diagram of general biometric system
It is difficult to draw generalizations about biometric systems all such systems have
many common elements. Biometric samples are acquired from a subject by a sensor.
The sensor output is sent to a processor which extracts the distinctive but repeatable
measures of the sample (the "features"), discharging all other components. The
resulting features can be stored in the database as a "template" or compared to a
specific template many templates or all templates already in the database to determine
if there is a match. A decision regarding the identity claim is made based upon the
similarity between the sample features and those of the templates compared.
4. ISO/IEC 19794-2:2005 - Information Technology - Biometric Data Interchange
Formats - Part 2: Finger Minutiae Data, for implementing interoperable biometric
recognition systems.
This part establishes a data interchange format for minutiae- based fingerprint capture
and recognition equipment. Representation of fingerprint data using minutiae is a
wide used technique in many application areas.
62
This standard defines specifics of the extraction of the key points (called minutiae)
from fingerprints ridge patterns. Two types of data formats are then defined. One for
general storage and transport and one for use in card based systems. The card format
has a standard and a compact expression.
The standard specifies formats for representation of fingerprints using the
fundamental notion of minutiae. It is generic as can be applied in wide range of
applications for automated fingerprint recognition, and can be involved in guidelines
and values for matching and decision parameters.
5. ISO/IEC 19794-3 2006 - Information Technology - Biometric Data Interchange
Formats - Part3: Finger Pattern Spectral Data.
This Standard establishes the data interchange format for finger pattern spectral data.
The goal for this part of ISO is to allow the exchange of local or global spectral data
derived from fingerprint image without the exchange of the entire image. This will
allow more compact data representations.
This part of the standard allows for representation of spectral components such as
Discrete Fourier Transform and (single scale) Gabor filter components extracted from
global or stationary (nor image dependent and not varying over the image local
overlapping or non overlapping uniform sized regions of the original intensity (non
color) image). Some or all of the extracted spectral components will be stored in the
data format depending upon the implementation.
There are fingerprints recognition algorithms that use spectral data directly for pattern
matching. Spectral data based recognition algorithms process “globally” local sections
(cells) of biometric images in contrast to morphological-based algorithms which
extract singularities in the morphological features. At the current time, there is no
established mechanism for the interchange of pattern spectral information for the use
of spectral based fingerprint matching algorithms.
By publishing a standard for spectral based representation of fingerprints, it allows the
interoperability among fingerprints.
- Recognition vendors based on a small data record.
63
- Support the proliferation of low cost commercial fingerprint sensors with limited
coverage dynamic range or resolution.
- Define a data record that can be used to store biometric information on a variety of
storage mediums (including but not limited to portable device and smart cards).
- Encourage the adoption of biometrics in applications where interoperability is
required.
6. ISO/IEC 19794-4 - Information technology - Biometric Data Interchange Formats
- Part 4 - Finger Image Data.
This part of the standard specifies a data record interchange format for storing,
recording and transmitting the information from one or more finger or palm image
areas within the IOS/IEC 19785-1 VBEFF data structure. This can be used for the
exchange and comparison of finger image data. It defines the content format and units
of measurement for the exchange of finger image data that may be used in the
verification or identification process of a subject.
The information consists of a variety of mandatory and optional items including
scanning parameters for compressed or uncompressed images and vendor specific
information. This information is intended for interchange among organizations that
relay on automated devices and systems for identification or verification purposes
based on the information from finger imager areas. Information complied and
formatted in accordance with this part of the standard can be recorded on machine
readable media or may be transmitted by data communication facility.
7. ISO/IEC 19794-5 (2005) - Information Technology - Biometric Data Interchange
Formats - Part 5: Face Image Data.
Face images also commonly referred to as displayed portraits, have been used for
many decades to verify identity of persons. In recent years, digital face images are
used in many applications including human examination as well as computer
automated face recognition. Although photographic formats have been standardized in
some cases such as passport and driver license, it is also demanded to define a
standard data format of digital face images to allow interoperability among vendors.
This part of the standard is intended to give a face image for face recognition
applications requiring exchange of face image data. The typical applications are:
64
1) Human examination of facial images with sufficient resolution to allow a human
examiner to ascertain small features such as moles and scars that might be used to
verify identity.
2) Human verification of identity by comparison of persons against facial images.
3) Computer automated face identification (one to many searching).
4) Computer automated face verification (one to one matching).
To enable many applications on variety of devices including devices that have the
limited resources required for data storage and to improve face recognition accuracy,
this part of the standard specifies not only a data format but also scene constraints
(lighting, pose, expression, etc.), photographic properties (positioning camera, focus,
etc.) and digital image attributes (image resolution, image size, etc.). Several image
types are introduced to define categories that satisfy requirements of some
applications. Each requirement is specified for each image type.
8. ISO/IEC 19794-8 (2006) - Information Technology - Biometric Data Interchange
Formats - Part 8: Finger Pattern Skeletal Data
This part of the standard establishes a data interchange format for pattern based
skeletal fingerprint recognition algorithms. Pattern based algorithms process sections
of biometric images. Pattern- based algorithms have been shown to work well with
the demands but commercially driven fingerprint sensor formats such as small area
and swipe sensors.
The exchange format that is defined in this part of the standard describes all
characteristics of a fingerprint in a small data record. It allows the extraction of both
spectral information (orientation frequency phase, etc.) and features (minutiae core
ridge count, etc.). Transformations like translation and rotation can also be
accommodated by the format defined herein.
This part of the standard specifies the pattern-based skeletal representation of
fingerprints.
- Interoperability among fingerprint recognition vendors based on a small data record
is allowed.
65
- Proliferation of low-cost commercial fingerprint sensors with limited coverage
dynamic range or resolution is supported.
- A data record that can be used to store biometric information on a variety of storage
media (including but not limited to portable devices and smart cards) is defined.
- Adoption of biometrics applications requiring interoperability is encouraged.
It is recommended that biometric data protection techniques in ANSI/x9 x9.84 or
ISO/IEC 15408 are used to safeguard the biometric data defined herein for
confidentiality, integrity and availability.
This part of the standard specifies the interchange format for the exchange of pattern-
based skeletal fingerprint recognition data. The data format is generic in that it may be
applied and used in a wide range of application areas where automated fingerprint
recognition is involved.
66
The Israeli Industry
Fingerprint Companies
1. BioGuard Components and Technologies Ltd
BioGuard develops biometric solutions for a wide variety of applications comprising
an integral part of the everyday life - in the home, at the workplace, in vehicles and
more.
The company’s goal is to develop and implement user-friendly biometric products
and solutions, meeting the market needs. The company’s system and modules are
complying with US and European biometric standards.
Operating as stand-alone systems or on a network, Bioguard’s state-of-the-art
biometric solutions are incorporated into systems and units at governmental and
sensitive facilities, at places of business, as components of integrated security systems,
and in the home. They are designed to be integrated into existing systems, offering a
host of additional benefits, such as enhanced fleet management, streamlined
administration. Bioguard’s technology is a universal personal biometric ID seal that
will replace ordinary keys in the daily lives, providing secure access to a wide variety
of applications.
2. Classfeye Ltd
Classfeye develops secure fingerprint recognition technology using existing cell-
phones and/or Internet cameras and is enabling identity management solutions for
mobile markets. The company’s technology eliminates the need for dedicated
hardware (e.g., fingerprint sensors, USB keys and code generators). The technology
enables device security and biometric identification for applications including m-
Commerce, m-Banking, enterprise security (including remote access to networks),
law enforcement and homeland security.
67
Classfeye develops technology for fingerprint recognition/identification using a
standard camera phone or web camera. The company has developed a software-only
solution and is porting its technology to multiple OS systems for deployment on all
major handset platforms. Company’s technology can be used for handset security,
identification, authentication or non-repudiation for financial transactions. The
software technology is loaded on the handset. The user enrolls through an enrollment
process whereby he uses the cell phone camera to enroll his biometric
signature/identification, extracted from a series of fingerprint images. These can be
stored on the handset and/or at a remote server. Upon demand, as launched from
various applications, the user identify/authenticate himself/herself by using the cell
phone camera to extract and match his signature/identification as obtained from a
series of fingerprint images, in real time, with those extracted and stored during
enrollment. Classfeye is integrating its technology within existing identity
management applications and network architectures.
3. Synel Industries Ltd
Synel Develops fingerprint verification and identification terminals. It also develops
products for the management of time and attendance, access control and job costing.
This company provides on-line and real-time data collection for effective and
immediate access to information throughout an organization, allowing a company to
improve efficiency and enhance performance. Synel solutions are available for
complex, multi-location enterprises as well as for single-building facilities, and for
organizations with few to thousands of employees.
The company develops a ‘total systems’. Its equipment and systems are designed in a
modular fashion, which maximizes flexibility for adaptation to particular customer
needs. This also means that the systems are designed to allow future upgrades and
modifications when necessary.
4. IQS Biometric Solution Ltd
IQS Company develops identity management and access control solutions for the
information security requirements of large and medium sized organizations. In
68
addition to the standard access protection systems in common use such as passwords,
magnetic cards, and smart cards, solutions offered by IQS also include sophisticated
biometric identification systems.
IQS Company develops solutions to problems of secure entry safeguards for
workstations, infrastructures and computer systems. Solutions for preventing hostile
penetration of systems, protect information in unprotected legacy systems, monitor
users’ activities, and control physical access.
IQS solutions and products operate in all the computerization environments and
platforms available in the marketplace today and integrate seamlessly with a wide
range of identification products.
The company’s technology is meant for dealing with identity management for large
populations, even up to the level of national population registers and including the
integration of Government Ministries and/or Institutions under a central umbrella
platform, which manages any number of identities required.
The company implements projects in different fields such as: security / Israel Defense
Forces, medicine, industry, banking, financing, insurance and much more.
IQS has developed and implemented specially constructed products for organizations,
based on international standards and regulations.
5. Idesia Ltd
Idesia develops biometric technology, biological electric signal in humans: a
BioDynamic Signature, unique to each individual. The company’s technology is
based on the human body’s natural bio-signal activities.
The company’s technology, BioDynamic Signature advantages are:
- Their sensors are small and thin, which enables them to be integrated in
microelectronic devices.
69
- Their bio-signals are dynamic so the level of identification (one to many
matching) or verification (one to one matching) can be specified according to the
application.
- In many cases, database searching for a match can be expedited by adjusting
these parameters.
- The technology eliminates failure-to-enroll episodes when the system cannot
efficiently capture a biometric sample and false rejection incidents when a
legitimate user is denied access.
- The sensors are user friendly.
- This system requires less power than fingerprint systems making it a more
attractive solution for handheld devices.
6. ID-U Biometrics Ltd
Dynamic Biometrics Identification (ID-U) develops biometric identification platforms
using individual’s response to external pseudo-random stimuli.
The company’s main markets are Governments, Travel & Transportation Companies,
Banks & Financial Institutions, Hospitals, Casinos, and Homeland Security Forces.
ID-U develops an identification signature based on a subject’s response to external
stimuli. The signature includes dynamic information, which is a combination of
behavioral, physiological, and physical characteristics. Since the subjects’ responses
are different each time they approach the system, ID-U’s platform cannot be
controlled by the user or copied by others. As a result, the system minimizes the
possibility of forgery or spoofing, and provides a high level of security.
70
Intelligent Video Surveillance
1. Mate - Intelligent Video
This company develops intelligent video surveillance systems. By using behavior
tracking technology in a unique way, it closes many of the possible loopholes. This
technology converts ordinary video cameras into intelligent sensors and information
systems that recognize faces, track irregular behavior, count people and detect events.
Through the Tri-Layered approach, the technology gives its customers a complete
solution that protects the perimeter, manages access control at the target facility and
monitors the site in between. Each zone relies on specific video detection products
and technologies to deal with a rising potential threat.
Video surveillance cameras have been critical component in every location where
security systems are installed. However, until now, equipped with motion detection,
microwave or infrared technologies, they have performed basic tasks. The uniqueness
of this technology is by changing that scenario by adding intelligence to video
surveillance.
** Behavior Tracking - Video object detection, tracking and identification of specific
behaviors. The products use sophisticated scene-learning algorithms to minimize false
alarms.
** People-Counting - combines biometric detection and behavior tracking technology
to count people staying in or passing through a specific region (such as a doorway).
This has applications such as tailgating detection and prevention, counting pedestrian
flow into and out of a given area and detecting crowding.
71
Biometric Signature
1. Applied Neural Computing Ltd. (ANC)
ANC, develops technology in the field of neural network research and has a fully
operational neural network engine.
Inspired by the biological nervous system, neural network technology is being used to
solve a wide variety of scientific, engineering, data mining, signature authentication
and other complex pattern recognition applications. Neural networks are suited to
such applications because, like their biological counterparts, a neural network can
learn, and therefore can be trained to find solutions, recognize patterns, classify data,
and forecast future events. Neural network technology can be either software or
hardware that mimic the human brain problem solving process, so that computers
using it will have the capability to learn from experience, accumulate knowledge, and
apply this knowledge to new situations. Just as people apply knowledge gained from
past experience to new problems or situations, neural networks take previously solved
examples to build a system of "neurons" that makes new decisions, classifications,
and forecasts. In other words, a neural network is a system that learns from experience
rather than being dependent upon preprogrammed skills and relying upon huge
databases.
Applied Neural Computing’s core neural network technology can be perceived as an
artificial brain that can be implemented in a very wide variety of applications, creating
a compelling element of added value. Neural networks can be implemented in many
types of applications and in a wide range of industries. It can be implemented on a
chip, increasing processing speed significantly, or implemented as an engine for
software, which can create a great deal of added value by making the application
more intelligent, flexible and faster.
Implemented on computer chips, ANC’s neural network can perform faster
computations and enable chips to perform new tasks that they are not capable of
performing at present. In the telecommunications field, the company’s neural
networks will enable new networking systems to effectively manage growing
bandwidth use. Applied Neural Computing technology can be implemented in the
72
financial industry to forecast stock prices, to rate bonds, to forecast exchange rates,
and to assess complex trends in real time. It can be used in E-commerce for data
mining and data analysis because it is able to process large amounts of data very
quickly. ANC’s neural networks can also be the basis for the next generation of fast
and effective Internet search engines. They can provide tangible assistance to medical
professionals in making critical diagnoses by analyzing EEG and ECG monitors and
even in identifying pre-cancerous cells, as well as in various aspects of telemedicine
and in the growing field of DNA and Gene research. When implemented in e-training
systems, it can adapt teaching methods to any individual’s pace and type of learning
and perception. Neural networks can also be used for speech recognition, biometrics
recognition and signature recognition.
2. WonderNet
WonderNet develops biometric Signature Authentication products, and total solutions
for the security needs of the information technology market.
The company’s Biometric Signature Authentication system provides the answer
returning the handwritten signature to its traditional position of trust.
73
Biometric Smart Cards
1. Daniel Data Systems Ltd (DDS)
DDS develops Access Control and Alarm Monitoring. DDS solutions are meant for
the needs of budgets and installations, from the single facility to multiple-site high
tech corporations, universities, banks and defense plants.
The company’s technology for Access Control prevents material or information
robbery, by limiting / supervising the access to all or part of the facility, lab, computer
room, or storage areas to authorized persons, during specific time periods. Intelligent
multi-technology controllers, linked to advanced identification systems ranging from
card reader to biometrics, are programmed to control “who is going where and when”.
Each person is equipped with a personalized card or another ID that controls access.
Another technology developed by DDS is the Alarm Monitoring which is developed
to prevent catastrophes or limits damage by informing of abnormal events and
reacting to them in real time. Alarm Monitoring usually functions in coordination
with Access Control. Different sensors, such as magnetic contacts, motion detectors,
broken window sensors and temperature indicators are connected to intelligent
controllers that centralize the information. Predefined reactions are triggered: CCTV
cameras, alarms, heating switched on or off, display of appropriate maps on the screen,
etc.
DDS also provides flexible solutions for Time & Attendance reporting work hours
and streamlining payroll procedures and Job Costing analytic accounting of task
completion and work efficiency.
2. Aurora Technologies Ltd.
Aurora develops comprehensive smart card solutions for project development from
initial analysis, specification and definition to final product and production
documentation. The company capabilities and experience encompass hardware and
software system engineering, hardware design, development, prototyping, production
and testing and software development have developed hands-on expertise in a wide
and varied range of electronic and computer related disciplines. These include control
74
systems, data acquisition and manipulation, intrinsically safe systems, distributed
computation and control, medical instrumentation, industrial systems, avionic as well
as commercial systems and more.
Aurora is strategically placed in the smart-card application field and has a wide and
varied assortment of installed applications, including electronic purse, personal
identification and data collection schemes. The company also deals with access
control systems and both centralized and distributed monitoring and control systems.
In addition, to its smart card systems, Aurora has developed two main product lines.
** SCC - Smart Card Controller - a family of controllers for unattended smart card
applications.
** TAU - a compact Time and Attendance Unit for low cost personnel attendance
recording.
3. Vuance Ltd
Vuance develops Incident Management, Asset Management, Active RF and e-ID
solutions, thus streamlining their backbone of deployment towards overall operational
and business enhancement.
Vuance specializes in secure document technology. These customized solutions and
advanced identification and authentication technologies provide reliable and durable
documents including electronic passports, visas and other border entry/exit documents,
national, military and police identification, as well as Magna software solution for the
management of national population registries. Technologies include data and image
capturing, ID production and personalization with secure and biometric features. A
range of complementary technologies and solutions for the smart card market are also
offered, including customizable smart cards and related products, proprietary smart
card production technologies, and advanced e-ID technologies, coupled with brand
protection and authentication technologies. As an experienced market player, with
fully proven technologies and advanced solutions, Vuance integrates sophisticated
smart card systems that directly match customers’ demands and specifications.
Other Solutions developed by Vuance:
75
* EduGate, a comprehensive campus management solution for educational institutions
used with contactless smart cards and smart reader/writers. Operating in real-time, the
solution supplies an accurate flow of information addressing student security, access
control and attendance, and secures cashless transactions. EduGate offers e-Wallet
applications for food service, vending and printing/copying.
* SmartGate 2400, an integrated access control system is based on Vuance’s
contactless smart cards and fingerprint identification. It merges contactless smart card
expertise with the latest hi-tech innovations to provide leading solutions for
commercial and governmental smart cards, data and security related technologies. The
system allows or denies a cardholder access to secured facilities based on assigned
permission groups. The smart card carries an array of visible/invisible security
features and personal information specific to client requirements.
* DynaGate is a portable access control device that provides smart card data biometric
access control and enhanced security. The biometric identification implemented with
the simple touch of a finger, reliably enrolls and verifies an individual’s identity in
one second. It is smaller than a business card and provides an external sensor to
accommodate a wide range of installations.
Vuance is developing in research, development and marketing of advanced
technologies and products for smart-card solutions and government e-ID projects.
Vuance offers a wide range of standard and customized smart-card-based solutions
for physical and logical security, education, corrections facilities and air & seaports.
Vuance is also a leader in the manufacturing of secure and durable documents such as
national identity cards, passports, visas, drivers’ licenses and vehicle registration.
Together with its subsidiaries, Vuance offers solutions in contact and contactless
smart-card technologies.
4. Optisec Systems Ltd.
Optisec is developing Governments, System Integrators and End-Users turnkey
biometric security solution for Access Control and ID verification. Optisec provides
solutions ranging from a single door biometric access control systems to a turnkey
solution from physical access control to building facilities, secure floors, and
76
computer rooms to Log On to the network. Combining the technology of Smart Cards,
2-D Bar Code, Encryption, and Biometrics, with Israeli’s cutting-edge secure
software solutions, the company provides its clients with full biometric security
solutions.
Optisec applies the approach of providing cost effective security solutions while
keeping the hardware and software user friendly. The solution lies in integrating
cutting-edge biometric technology, maintaining system flexibility, simplicity in
installing and operating, while guaranteeing user privacy. Optisec achieves these
goals by integrating market proven biometric hardware with its own in-house
expertise in biometrics and security.
77
Voice Authentication
1. Cellmax Systems Ltd (CMS)
Cellmax is an Israeli based developer and supplier of Voice authentication solutions.
The company owns several Voice Biometric technologies which include verification
technologies as well as identification technologies.
Cellmax offers a Voice Biometrics product line which is based on the company’s
technology. The company’s technology is based on a unique, patent Voice Biometrics
technology. Using this technology enables the company to reach a high performance
level.
The company developed the “Viometrics” product line. This product line includes
several products for authentication and surveillance needs.
Cellmax’s technology enables to reach high performance levels. The technology is
based on an advanced learning capability and a strong voice pattern analysis. This
creates the advantages such as: High accuracy, Handling large voice data bases,
Multimedia operation, Wireline; Cellular; VoIP; HTTP; Background noise handling.
Cellmax product line includes three different products: Viogate, Violisten, and
Viosearch.
* Viogate - A password replacement Voice authentication product. The Viogate
authenticates a user by prompting the user for specific three words. There are two
Viogate products: (1) Viogate - V - Verification prompting system, and (2) Viogate - I
- Identification prompting product.
Violisten - Violisten is an authentication listening systems. The Violisten is a free
speech system. Violisten follows a conversation between an agent and a customer and
authenticates the customer by his/her Voice. There are two types of Violisten: (1)
Violisten V - A verification product. The user is identified by a separate system
(DTMF dialing; Speech recognition etc...) and then verified by the Violisten. (2)
Violisten I - The user is prompt to say his name and then talk freely. The user is both
identified and verified by the system.
78
* Viosearch - An intelligence surveillance product used to identify suspects over
phone calls. There is only an Identification Viosearch. Voice biometrics is related to
some of the most growing demands in today’s world. The main applications areas for
Voice biometrics are:
* Defense & Anti Terror (Examples: Telecom Surveillance; Intelligence; Suspect
identification)
* Law enforcement (Examples: Criminal ID; Court evidence verification;
Immigration)
* Personal and organizational security (Examples: Employee attendance; Access
control; Home alarm)
* IT security (Examples: Tele-banking; Tele-commerce; Dialing cards)
* Privacy (Examples: Voicemail password; Medical records access)
All the aforementioned fields are growing large size markets, with a lot of
governmental and enterprise budget attention.
2. Persay Ltd.
Persay develops biometric speaker verification products used to securely verify
speakers’ identities. The company’s products, FreeSpeech, VocalPassword, and
S.P.I.D are independent of language and accent and enable verification of individuals
using a simple spoken pass phrase or during natural conversation, via any media.
Persay’s technology combats identity fraud without compromising on efficiency,
quality service and customer experience. Persay’s speaker verification products offer
a secure, convenient, efficient, reliable alternative to traditional forms of verification,
such as Personal Identity Numbers (PINs), common question routines, passwords, etc.
With over ten years of intensive research and development efforts as well as
experience in the deployment of speaker verification and identification technology,
Persay’s biometric speaker verification products offer state-of-the-art technology with
algorithmic accuracy and ease of integration and deployment. Persay’s fully-featured
79
products are integrated with various IT environments, that manage and reduce the
risks involved in providing remote services and applications such as secured call
center access, password reset, offender monitoring, secure web access and more.
Through an extensive network of partners and system integrators, Persay’s technology
enables a wide range of solutions for call centers, telecommunication and financial
industries, as well as for law enforcement and governmental agencies.
3. Sentrycom Ltd.
Sentrycom develops and markets biometric voice authentication solutions that
accurately verify a person’s claimed identity.
Sentrycom’s core technology is based on patented Voice Authentication Engine
(VAE), designed to increase and enhance security while improving end-users privacy
and confidence. VAE was successfully field-tested at Israel Standards Institute-
National Biometrics Testing Center.
Sentrycom has developed a number of products based upon its Voice Authentication
Engine :
* Call Center Access Solution - This product is fully integrated and tested with IVR
platforms from IBM, Avaya and Intel.
* Web Portal Access Solution - This product is fully integrated and tested with IBM
WebSphere.
* Single-Sign-On for Extended Enterprise. This product is fully integrated and tested
with IBM Tivoli Access Manager. Sentrycom is developing products for mobile and
for Homeland Security.
80
Dog Bio Security
1. Bio Sense (BST)
Bio Sense develops bioelectric systems. BST systems make use of a biological being
as a highly sophisticated sensor, whose behavior is monitored. BST technology
applications include early identification of significant situations like health condition,
security breaches etc.
BST leading product is Dog Bio Sensor (DBS), an advanced watchdog alarm system.
The superb senses of the watchdog are combined with Bio-Sense’s advanced
detection algorithms to upgrade the watchdog into a sophisticated and reliable
bioelectric warning and deterrent system.
DBS has reached research and development goals via a successful large-scale field
experiment and an operational pilot site at a governmental operational facility in Israel.
The Watchdog Security System and algorithms are currently patent-pending.
DBS is based on Bio-Sense patent-pending algorithms. The system receives signals
from the dog, and performs a unique digital signal processing analysis. The data is
filtered and passed through an analytical process to determine the state of the dog, and
indicate the one of three system alert levels: * No-Alert - The watchdog is responding
to routine events, * Medium-Alert - There is suspicious activity in the vicinity, *
High-Alert - An intrusion has occurred into the dog’s territory. The Watchdog
Security System can be integrated into existing security systems (Central Control
Systems, home alarm, CCTV monitoring systems, etc.) to effectively alert and present
the security crisis to the required system.
81
Bibliography
1. Alexander M. Bornstein, Michael M. Bornstein and Ron Kimmel, 2005, Three
Dimensional Face Recognition.
2. Berlinskey Uzi, Government publication, 2006, The Challenge of Biometric.
3. Berlinsky Uzi, Government publication, 2006, Israel Prepares for Biometric
Solutions.
4. Brenda McCOWAN, 2002, Barking in domestic dogs.
5. Government publication, Department for State internal Inspection, 2007,
Government decisions for information security and biometric means.
6. Rafael's research on face recognition.
7. White Paper, Rafael's Face Recognition Technology, Capabilities, Advantages,
Benefits. 8. Dr. Nadav Hamadi, Tel Aviv University, 2007, Smart Biometric Camera for
Facial Expression.
9. Dr. Yair Dalal, Tel Aviv University, 2006, Surveillance and Tracking in open
areas.
10. Dr. Gelbart Oren, Tel Aviv University, 2007, Biometric applications for
identifying objects.
11. Greemlend Guy, Tel Aviv University, 2005, Biometric development for
identifying people in closed places.
12. Sophia Yin, University of California, 2002, A new perspective on barking
dogs.
13. What Next, 2006, Guard Dogs Go High-Tech.
14. Yaniv Livneh, June 2007, Internet Telephony, Sniffers, "Vishers" and Hackers
Beware: to overlook aspect of securing unified messaging.
15. The standard institute of Israel, September 2006, Letter to active members of
biometric standardization #11.