Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use?...
-
Upload
lydia-snow -
Category
Documents
-
view
217 -
download
0
Transcript of Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use?...
![Page 1: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/1.jpg)
BiometricsTasanawan Soonklang
![Page 2: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/2.jpg)
2
Bio
metrics
• Biometrics – what is?
• Applications – who use?
• Operation – how does it work?
• Types – what are the different?
• Issues – how to choose? , accuracy, concerns
• IT r elated to biometrics
• Movies – some fun
• R eferences – s ome more readings & links
![Page 3: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/3.jpg)
3
Biometrics
![Page 4: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/4.jpg)
4
What is ?
• A term derived from ancient Greek
bio = lifemetric = to measure
• “Measurement of physiological and behavioral characteristics to automatically identify people.”
![Page 5: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/5.jpg)
5
Definitio
n
• “The automated approach to authenticate the identity of a person using the individual’s unique physiological or behavioral characteristics.” – Yau Wei Yun (2003)
• “Biometrics deals with identification of individuals based on their biological or behavioral characteristics” – Jain et al (1999)
![Page 6: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/6.jpg)
6
Ch
ara
cteristics
• Physical/biological characteristics– Face – Fingerprint – DNA – Hand and finger geometry – Eye structure – Iris – Retina – Ear – Vascular patterns – Odor– Voiceprint
![Page 7: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/7.jpg)
7
Ch
ara
cteristics
• Behavioral characteristics– Signature – Gait – Handwriting – Keystroke – Voice pattern
![Page 8: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/8.jpg)
8
Iden
tifica
tion
• Identification – associating an identity with an individual
• Verification (authentication)– The problem of confirming or denying a
person’s claimed identity (1: 1)– Am I who I claim I am?
• Recognition (identification)– The problem of establishing a subject’s
identity (1: Many)– Who am I?
![Page 9: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/9.jpg)
9
Iden
tifica
tion M
eth
od
s
• Traditional– Something you know : PIN, password ...– Something you have: key, token, card...
But does not insure that you are here and the real owner .
• Biometrics – Something you are: a biometric.
![Page 10: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/10.jpg)
10
Applications
![Page 11: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/11.jpg)
11
Why u
se ?
• Accurate identification of a person could deter – crime and fraud– streamline business processes – save critical resources
![Page 12: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/12.jpg)
12
Who u
ses ?
• Government
• Military
• Schools
• Commerce
• Law Enforcement
• Others ?
![Page 13: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/13.jpg)
13
Where
are
it use
d ?
• Many products such as PC are already using fingerprints .
• Another big class, historically the first, is the identification for police application .
• Now, some countries are using biometrics for immigration control in airport/border
patrol. • Banks are now proposing some ATMs.
• Payment using biometrics is more and more used in stores.
• Identification of the student in schools.• Identification of the mother/newborn in
hospitals.
![Page 14: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/14.jpg)
14
Operation
![Page 15: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/15.jpg)
15
Enrollment
CaptureCapture ProcessProcess StoreStore
How
does it w
ork ?
Verification
ProcessProcess
No MatchNo Match
MatchMatch
CaptureCapture
Compare
?
![Page 16: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/16.jpg)
16
Exam
ple
Original source : Anil Jain and Arun Ross (1999)
![Page 17: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/17.jpg)
17
Types
![Page 18: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/18.jpg)
18
Exam
ple
s
• Fingerprinting • Palm print• Iris scan • Retinal scan • Facial recognition • Voice recognition • Handwriting recognition • DNA
![Page 19: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/19.jpg)
19
Fingerp
rint
• Strength– Proven Technology Capable of High
Level of Accuracy– Range of Deployment Environments– Ergonomic, Easy-to-Use Device– Ability to Enroll Multiple Fingers
• Weakness– Inability to Enroll Some Users– Performance Deterioration over Time– Association with Forensic Application– Need to Deploy Specialized Devices
![Page 20: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/20.jpg)
20
Palm
prin
t
• Strength– Ability to Operate in Challenging
Environment– Established, Reliable Core Technology– General Perception as Non-intrusive– Relatively Stable Physiological
Characteristic as Basis– Combination of Convenience and
Deterrence
• Weakness– Inherently Limited Accuracy– Form Factor That Limits Scope of
Potential Applications– Price
![Page 21: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/21.jpg)
21
Iris
• Strength– Resistance to False Matching– Stability of Characteristic over Lifetime– Suitability for Logical and Physical
Access
• Weakness– Difficulty of Usage– False Non-matching and Failure-to-
Enroll– User Discomfort with Eye-Based
Technology– Need for a Proprietary Acquisition
Device
![Page 22: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/22.jpg)
22
Retin
a
• Strength– it is not easy to change or replicate the
retinal vasculature.– Supposed to be the most secure
biometric
• Weakness– The image acquisition involves
cooperation of the subject– entails contact with the eyepiece– requires a conscious effort on the part
of the user.
![Page 23: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/23.jpg)
23
Face
• Strength– Ability to Leverage Existing Equipment
and Image Processing– Ability to Operate without Physical
Contact or User Complicity– Ability to Enroll Static Images
• Weakness– Acquisition Environment Effect on
Matching Accuracy– Changes in Physiological Characteristics
That Reduce Matching Accuracy– Potential for Privacy Abuse Due to Non-
cooperative Enrollment and Identification
![Page 24: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/24.jpg)
24
Voice
• Strength– Ability to Leverage Existing Telephony
Infrastructure– Synergy with Speech Recognition and
Verbal Account Authentication– Resistance to Imposters– Lack of Negative Perceptions
Associated with Other Biometrics
• Weakness– Effect of Acquisition Devices and
Ambient Noise on Accuracy– Perception of Low Accuracy– Lack of Suitability for Today’s PC Usage
![Page 25: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/25.jpg)
25
Sig
natu
re
• Strength– Resistant to Imposters– Leverages Existing Processes– Perceived as Non-invasive– Users Can Change Signatures
• Weakness– Inconsistent Signatures Lead to
Increased Error Rates– Users Unaccustomed to Singing on
Tablets– Limited Applications
![Page 26: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/26.jpg)
26
DN
A
• DNA (DeoxyriboNucleic Acid) is the 1D ultimate unique code for one’s individuality.
• Identification for forensic applications only.
• Three factors limit the utility of this biometric for other applications– Contamination and sensitivity– Automatic real-time identification
issues– Privacy issues
![Page 27: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/27.jpg)
27
Issues
![Page 28: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/28.jpg)
28
Com
pariso
n
• Universality – each person should have the characteristic.
• Uniqueness – is how well the biometric separates individuals from another .
• Permanence – measures how well a biometric r esists aging.
• Collectability – ease of acquisition for measurement .
• Performance – accuracy, speed, and robustnes s of technology used.
• Acceptability – degree of approval of a technology .
• Circumvention – ease of use of a substitute.
![Page 29: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/29.jpg)
29
Com
pariso
n
Original source : Yau Wei Yun (2003)
![Page 30: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/30.jpg)
30
How
to ch
oose
?
• How to choose– Size of user group– Place of use and the nature of use– Ease of use and user training required– Error incidence such as due to age,
environment and health condition– Security and accuracy requirement
needed– User acceptance level, privacy and
anonymity– Long term stability including technology
maturity, standard, interoperability and technical support
– Cost
![Page 31: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/31.jpg)
31
Accu
racy
• Failure to Enroll Rate (FTE)– % of data input is considered invalid and fails to i
nput into the system.
• False Acceptance Rate (FAR) – % of invalid users who are incorrectly accepted
as genuine users.
• False Rejection Rate (FRR)– % of valid users who are rejected as imposters.
• Equal Error Rate (EER)– The rate at which both accept and reject error
are equal
![Page 32: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/32.jpg)
32
FTE
![Page 33: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/33.jpg)
33
Sco
res &
Th
resh
old
• scores – to express the similarity between a pattern and a biometric template .
![Page 34: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/34.jpg)
34
FAR
& FR
R
![Page 35: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/35.jpg)
35
Rela
tion
The more lower EER, the more accuracy
Original source : http://www.bioid.com/sdk/docs/About_EER.htm
![Page 36: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/36.jpg)
36
Con
cern
s
• Identify theft and privacy– Using two-factor solution – Biometrics are purely based on matching– Using encryption for matching template– Scanned live biometric data maybe
stolen
• Sociological concerns– Physical harm to an individual– Personal information through biometric
methods can be misused or sold
![Page 37: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/37.jpg)
37
Related to
![Page 38: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/38.jpg)
38
Exam
ple
• Database– Storing matching templates– Querying templates– Database management– Security issues
![Page 39: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/39.jpg)
39
Exam
ple
• Image processing– Assessing the quality– Enhancing the image
![Page 40: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/40.jpg)
40
Exam
ple
• Image processing
a) The originalb) A close-up of the originalc) After 1st stage of thinningd) After 2nd stage of thinninge) After applying algorithm,
showing bifurcations (black) and endpoints (grey)
Original source : http://www.ee.ryerson.ca/opr/research_projects/graph_fingerprint.html
![Page 41: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/41.jpg)
41
Exam
ple • Intelligent system
– Pattern classification & recognition– Decision rules
![Page 42: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/42.jpg)
42
Exam
ple
• Pattern classification & recognition– Training and testing data– Machine learning
Original source : Anil Jain and Arun Ross (1999)
![Page 43: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/43.jpg)
43
Exam
ple • Information retrieval
– Retrieval templates for recognition– Scoring– Evaluation
Recognition
![Page 44: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/44.jpg)
44
Movies
![Page 45: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/45.jpg)
45
Som
e fu
n
• Hollywood is using biometrics for years.
• some truth inside, but sometimes , it i s wrong…
• Must see– Gattaca (1997)
• It was wrong– The Island (2005)
![Page 46: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/46.jpg)
46
Som
e fu
n
• Others– James bond– The Bourne– Minority report– etc. (see the first website in reference)
• Use of some and public concerns• Physical biometric for identification
or authentication person is the most widely seen.
• Behavioral biometric much less
![Page 47: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/47.jpg)
47
References
![Page 48: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/48.jpg)
48
More
readin
gs &
links
Publications• Yun, Yau Wei. (2003) The ‘123 ’ of Biometric Technology.
- Retrieved from www.• Jain, Anil, Bolle, Ruud, and Pankanti, Sharath. (1999)
Introduction to biometrics. In: Biometrics, Personal Identification in Networked Society, pp. 1-41, Springer.
• Jain, Anil, and Ross, Arun. (1999) Introduction to biometrics. In: Handbook of Biometrics, pp
Lecture notes• Ioannis Pavlidis. (2003) Introduction to biometrics. In
course cosc6397. Department of Computer Science, University of Houston.
• Rawitat Pulum. (2006) Introduction to Biometrics. In course 510670. Faculty of Science, Silpakorn University.
Website• http://pagesperso-orange.fr/fingerchip/biometrics/
biometrics.htm• http://en.wikipedia.org/wiki/Biometrics• http://www.bioid.com/sdk/docs/About_EER.htm
![Page 49: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/49.jpg)
49
Rela
tion
![Page 50: Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?](https://reader033.fdocuments.in/reader033/viewer/2022051620/56649eef5503460f94bffc83/html5/thumbnails/50.jpg)
50
Rela
tion
The more lower EER, the more accuracy