Title: Biometrics
1Biometrics
- CUBS, University at Buffalo
- http//www.cubs.buffalo.edu
- http//www.cedar.buffalo.edu/govind/CSE717
- govind_at_buffalo.edu
2Conventional Security Measures
- Possession or Token Based
- Passport, IDs, Keys
- License ,Smart cards,Swipe cards, Credit Cards
- Knowledge Based
- Username/password
- PIN
- Combination(P,K)
- ATM
- Disadvantages of Conventional Measures
- Do not authenticate the user
- Tokens can be lost or misused
- Passwords can be forgotten
- Multiple tokens and passwords difficult to manage
- Repudiation
3Biometrics
- Definition
- Biometrics is the science of verifying and
establishing the identity of an individual
through physiological features or behavioral
traits - Examples
- Physical Biometrics
- Fingerprint, Hand Geometry,Iris,Face
- Measurement Biometric
- Dependent on environment/interaction
- Behavioral Biometrics
- Handwriting, Signature, Speech, Gait
- Performance/Temporal biometric
- Dependent on state of mind
- Chemical Biometrics
- DNA, blood-glucose
4Requirements of Biometrics
- Universality
- Each person should have the biometric
- Uniqueness
- Any two persons should have distinctive
characteristics - Permanence
- Characteristic should be invariant over time
- Collectability
- Characteristic should be easy to acquire
- Acceptability
- Is non-intrusive
- Non repudiation
- User cannot deny having accessed the system
5General Biometric System
Biometric Sensor
Feature Extraction
Database
Enrollment
Feature Extraction
Biometric Sensor
Matching
Authentication
Result
6Types of Authentication
- Verification
- Answers the question Am I whom I claim to be?
- Identity of the user is known
- 11 matching
- Identification
- Answers the question Who am I?
- Identity of the user is not known
- 1N matching
- Positive Recognition
- Determines if an individual is in the database
- Prevents multiple users from assuming same
identity - Negative Recognition
- Determines if an individual is NOT in the given
database - Prevents single user from assuming multiple
indentities
7Aspects of a Biometric Systems
- Sensor and devices
- Types of sensors
- Electrical and mechanical design
- Feature representation and matching
- Enhancement, preprocessing
- Developing invariant representations
- Developing matching algorithms
- Evaluation
- Testing
- System Issues
- Large Scale databases
- Securing Biometric Systems
- Ethical, Legal and Privacy Issues
8Applications And Scope of Biometrics
9Biometric Modalities
- Common modalities
- Iris
- Fingerprint
- Face
- Voice Verification
- Hand Geometry
- Signature
- Other modalities
- Retinal Scan
- Odor
- Gait
- Keystroke dynamics
- Ear recognition
- Lip movement
10Fingerprint Verification
Fingerprints can be classified based on the ridge
flow pattern
Fingerprints can be distinguished based on the
ridge characteristics
11Feature Extraction
X Y ? T
106 26 320 R
153 50 335 R
255 81 215 B
12Matching
- Rotation
- Scaling
- Translation
- Elastic distortion
X Y ? T
106 26 320 R
153 50 335 R
255 81 215 B
X Y ? T
215 08 120 R
213 20 145 R
372 46 109 B
T(?X, ?Y , ??)?
13Face RecognitionEigen faces approach
Face detection and localization
Eigen faces
Normalization
14Face Feature Representations
Facial Parameters
Semantic model
Eigen faces
15Speaker Recognition
- Computer Access
- Transactions over phone
- Forensics
- Caller identification
16Cepstral feature approach
- Preprocessing
-
- Feature Extraction
- Speaker model
- Matching
17Vocal Tract modeling
Signal Spectrum
Smoothened Signal Spectrum
Speech signal
18Speaker Model
19Signature Verification
Online Signature verification
Off line Signature Verification
20Matching Similarity Measure
Y (y1 , y2 , , yn) X (x1 , x2 , , xn)
Similarity by R2 91
Similarity by R2 31
21Dynamic Alignment
( y2 is matched x2, x3, so we extend it to be two
points in Y sequence.)
Dynamic alignment
Where (x1i, y1i, v1i) are points in the
sequence And a, b, c are the weights, e.g., 0.5,
0.5, 0.25
- DTW warping path in a n-by-m matrix is the path
which has min cumulative cost. - The unmarked area is the constrain that path is
allowed to go.
22Iris Recognition
Sharbat GulaThe Afghan Girl
Iriscode used to verify the match
23Iris Recognition
Iris Image
Choosing the bits
Gabor Kernel
24Collage
25Hand Geometry
26Evaluation of Biometric Systems
- Technology Evaluation
- Compare competing algorithms
- All algorithms evaluated on a single database
- Repeatable
- FVC2002, FRVT2002, SVC2004 etc.
- Scenario Evaluation
- Overall performance
- Each system has its own device but same subjects
- Models real world environment
- Operational Evaluation
- Not easily repeatable
- Each system is tested against its own population
27System Errors
- FAR/FMR(False Acceptance Ratio)
- FRR/FNMR(False Reject Ratio)
- FTE(Failure to Enroll)
- FTA(Failure to Authenticate)
Genuine (w1) Impostor (w2)
Genuine No error False Reject
Impostor False Accept No error
Confusion matrix
28Performance Curves Score Distribution
29Performance curves FAR/FRR
30Performance curves ROC
31State of the art
Biometrics State of the art Research Problems
Fingerprint 0.15 FRR at 1 FAR (FVC 2002) Fingerprint Enhancement Partial fingerprint matching
Face Recognition 10 FRR at 1 FAR (FRVT 2002) Improving accuracy Face alignment variation Handling lighting variations
Hand Geometry 4 FRR at 0 FAR (Transport Security Administration Tests) Developing reliable models Identification problem
Signature Verification 1.5(IBM Israel) Developing offline verification systems Handling skillful forgeries
Voice Verification lt1 FRR (Current Research) Handling channel normalization User habituation Text and language independence
Chemical Biometrics No open testing done yet Development of sensors Materials research
32Thank You
- ssc5_at_cedar.buffalo.edu