Professional Documents
Culture Documents
Positive Identification
To prove you are who you say you are.
Negative Identification
To prove you are not who you say you are
not.
Types of Biometrics
Face recognition Iris scanning Retina scanning Fingerprinting Hand geometry Voice recognition Signature verification Keystroke Dynamics
Source: www.hsme.memphi s.edu
Types of Biometrics
o
Currently in Vogue o Iris o Thumbprint o Hand Geometry o Voice o Face Special Case o DNA
BIOMETRIC PROCESS
ENROLLMENT
Present Biometric Capture Process
STORE
NO MATCH
VERIFICATION
Present Biometric Capture Process
COMPARE
MATCH
Physically Supervised
Remote
Fingerprint Patterns
6 classes of patterns
Fingerprint Patterns
Minutiae
Crossover: two ridges
cross each other Core: center Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w 2 spaces Delta: space between ridges Pore: human pore
Fingerprint Patterns
Feature Extractor
Core of fingerprint technology
Capture and enhance image Remove noise by using noise reduction
Coherence caluculation
Feature Extraction
Feature Extractor
applications
Points of bifurcation Ridge endings
Feature Extractor
Minutiae Coordinate and Angle are calculated
Core is used as center of reference (0,0)
Minutiae Extraction
Matcher
Used to match fingerprint Trade-off between speed and performance Group minutiae and categorize by type
Large number of certain type can result in faster searches
A minutia mj in I and a minutia mi in T are considered to be matched if their spatial and orientation differences are within specified thresholds ro and o.
The matching algorithm returns a percentage match score, which is then used to take the match-no match decision based on the security criterion.
database
Security
Accuracy
97% will return correct results
100% deny intruders
Image
Minutiae is retrieved and template created Encrypted data Image is discarded Cannot reconstruct the fingerprint from data
Comparision
Method Iris Recognition Fingerprinting Hand Shape Coded Pattern Iris pattern Fingerprints Size, length and thickness of hands
Outline, shape and Facial distribution of eyes and Recognition nose Signature Shape of letters, writing order, pen pressure
Low-security facilities
Low-security facilities Telephone service
Overview of Biometrics
Biometric Iris Acquisition Device Infrared-enabled video camera, PC camera Desktop peripheral, PC card, mouse chip or reader embedded in keyboard Microphone, telephone Sample Black and white iris image Feature Extracted Furrows and striations of iris Location and direction of ridge endings and bifurcations on fingerprint, minutiae Fingerprint Fingerprint image (optical, silicon, ultrasound or touchless)
Voice
Voice Recording
Frequency, cadence and duration of vocal pattern Speed, stroke order, pressure and appearance of signature Relative position and shape of nose, position of cheekbones Height and width of bones and joints in hands and fingers Blood vessel patterns and retina
Signature
Signature Tablet, Motion-sensitive stylus Video Camera, PC camera, singleimage camera Proprietary Wallmounted unit
Image of Signature and record of related dynamics measurement Facial image (optical or thermal)
Face
Hand
Retina
Retina Image
Biometric
Iris
Fingerprint
Most mature biometric technology Accepted reliability Many vendors Small template (less than 500 bytes) Small sensors that can be built into mice, keyboards or portable devices
Physical contact required (a problem in some cultures) Association with criminal justice Vendor incompatibility Hampered by temporary physical injury
Optical
Large physical size Latent prints CCD coating erodes with age Durability unproven
Voice
Good user acceptance Low training Microphone can be built into PC or mobile device
Signatures
Portable devices with stylus input Applications where a wet signature ordinarily would be
IS access control, especially for high security government agencies Physical access control (same as IS access control)
Biometrics Comparison
Face recognition Retina scanning Iris scanning Voice recognition Hand geometry Fingerprinting Accuracy Intrusiveness
Cost
FTE(R)
FTA(R)
FNMR FMR
FAR FRR
ERR [sic]
Authentication
Biometric systems can be hard to compare. Type I Error: False rejection rate. Type II Error: False acceptance rate.
49
Type I Errors
A type I error (false rejection, false positive) is the decision error made by rejecting the null hypothesis when it is actually true One specifies the type I error rate, a, that one considers tolerable This error rate is called the significance level By default, a is often taken to be 0.05
In hypothesis testing, the critical value is the threshold value for the test statistic that is used to choose between the null and alternative hypotheses The term has been borrowed, with only a slight change in definition, to denote the threshold value to which a measured value is compared in the lab to make a detection decision
Type II Errors
A type II error (false acceptance, false negative) is the decision error made by failing to reject the null hypothesis when it is actually false The probability of a type II error depends on the amount of analyte in the sample Generally the type II error rate, b, goes down as the concentration of analyte goes up (more statistical power)
The hardest problem is the false alarms .... Suppose this magically effective face-recognition software is 99.99% accurate. That is, if someone is a terrorist, there is a 99.99% chance that the software indicates "terrorist," and if someone is not a terrorist, there is a 99.99% chance that the software indicates "non-terrorist." Assume that 1 in 10 million flyers, on average, is a [known!] terrorist. Is the system any good? No. It will generate 1000 false alarms for every 1 real terrorist. And every false alarm still means that all the security people go through all of their security procedures. Because the population of nonterrorists is so much larger than the number of terrorists, the test is useless.
for 95%, the system gives a true negative for 5%, the system gives a false positive
Across 10 million passengers, there will be 500,000 false alarms That will delay people and planes, infuriate everyone, and result in the system being ignored most of the time