Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.
-
Upload
jordan-french -
Category
Documents
-
view
216 -
download
0
Transcript of Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.
![Page 1: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/1.jpg)
Introduction to Biometric Systems
Ruomu Guo
CSPC 620—Computer Security
![Page 2: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/2.jpg)
OverviewIdentification Person’s body && identity
Applications: Fingerprint, Iris, Retina Recognition,
Face Detection, Hand Geometry.
Relationship between Biometric System and certain topics in the area of computer security.
![Page 3: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/3.jpg)
OverviewRefers to the use of mathematical statistical
methods to analyze biological behaviors or characteristics.
Biometric System mainly consists of four modules—Sensor, Feature Extraction, Matcher, System Database Storage.
Difficulties: Accuracy, Speed, Resource Requirements, Harmless to human beings, Robust to fraudulent attacks.
![Page 4: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/4.jpg)
Measurement of Biometric System
Fig: The relationship between FAR, FRR, and Threshold Value
![Page 5: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/5.jpg)
Fingerprint RecognitionFingerprint Recognition, because of its lifetime
invariance, uniqueness and convenience, is becoming an important method for biometric identification.
Finger skin ridge and valley forms a regular array of different pattern types. Valley, ridge combined with point and bifurcation point, are called the fingerprint minutiae points (minutiae).
By comparing different fingerprint minutiae, person’s identity can be recognized or identified.
![Page 6: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/6.jpg)
Fingerprint Recognition
Fig: Block Diagram of Fingerprint Recognition Processes
![Page 7: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/7.jpg)
Fingerprint Recognition Sense: off-line fingerprint acquisition, live-scan sensing.
Feature Extraction: singular region, local ridge orientation
Matching: Correlation-based matching, Minutiae-based matching,
Ridge feature-based matching
Database Storage: update periodically
![Page 8: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/8.jpg)
Face DetectionFace Detection is also a popular method of
biometric system for recognition and identifies individual’s identity.
Advantages: widely accept as a identifier, least intrusive.
Disadvantages: illumination, disguise for circumvention, and incompatible with pure identification protocol.
![Page 9: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/9.jpg)
Face DetectionPrimary methods for detecting faces
1. Knowledge-based methods
2. Feature invariant approaches
3. Template matching methods
4. Appearance-based methods
![Page 10: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/10.jpg)
Face DetectionThe technique for face recognition can be
classified as following three groups:
1. Feature Methods:
2. Holistic Methods:
3. Hybrid Methods:
![Page 11: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/11.jpg)
PCA ApplicationPCA (Principal Component Analysis)
A face image usually defines a point in the high-dimensional image space.
PCA is used to simplify the required process of analysis by reducing the dimensional spaces or subspaces.
![Page 12: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/12.jpg)
ConclusionBiometric System is not independent as a
module for entire computer security area.
Some ticklish problems in computer security will be solved appropriately such as authentication for each person’s identity before they will enter or access to other systems.
Scientists are still trying to exploit other methods to improve the performance of biometric system with more enhancement of computer security.
![Page 13: Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security.](https://reader036.fdocuments.in/reader036/viewer/2022081811/56649ddf5503460f94ad8154/html5/thumbnails/13.jpg)
Reference 1. A. K. Jain, A. Ross and S. Prabhakar, An Introduction to
Biometric System IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, pp. 4-20, January 2004.
2. A. Jain, R. Bolle, and S. Pankanti, Introduction to Biometrics: Personal Identification in Networked Society (A. Jain, R. Bolle, and S. Pankanti, Eds. ), pp. 1-41, Boston, MA: Kluwer Academic, 1999.
3. D. Maltoni. A tutorial on Fingerprint Recognition: In M. Tistarelli, J. Bigun, and E. Grosso, editors, Biometrics School 2003, LNCS 3161, pages 43-68. Springer Verlag, Berlin, Heidelberg, 2005.
4. Description of Face Detection at Wikipedia: http://en.wikipedia.org/wiki/Face_detection.