Uploaded by Sunawar Khan

BiometricRecognition

advertisement
MACHINE LEARNING
SunawaR KhaN
Islamia University of Bahawalpur
Bahawalnagar Campus
Contents
What is Biometrics?
Types of Biometric Recognition
Applications of Biometric Systems
Types of Authentication
Constraints on Biometrics
Biometric Research at Clemson
‫سنور خان‬
Biometric Recognition
Introduction
• The term biometric comes form the Greek words bios(life) and
metrikos(measure).
• It is well known that humans intuitively use some body characteristics
such as face, gait or voice to recognize each other.
• It is the study of physical or behavioral characteristics used for
identification of a person.
• For many applications of biometric, the system uses the password as well as
biometrics for authentication.
‫سنور خان‬
Biometric Recognition
What is Biometrics
Automated method for recognizing
individuals based on measurable
biological and behavioral
characteristics
‫سنور خان‬
Biometric Recognition
Two meanings of biometrics
• Biometrics as a part of Computer Science
• measurement of physical of behavioral properties of human beings
• aim of the measurement defined: automatic identity recognition
• Biometrics = use of physical or behavioral properties of human beings for
automatic identity recognition
‫سنور خان‬
Biometric Recognition
Problem with Current Security Systems
• Based on Passwords, or ID/Swipe cards
• Can be Lost.
• Can be forgotten.
• Worse! Can be stolen and used by a thief/intruder to access your data, bank accounts, car
etc
• With increasing use of IT technology and need to protect data, we have multiple
accounts/passwords.
• We can only remember so many passwords, so we end up using things we know
to create them (birthdays, wife/girlfriends name, dog, cat…)
• Its is easy to crack passwords, because most of our passwords are weak!
• If we create strong passwords (that should be meaningless to us) we will forget
them! And there is no way to remember multiple such passwords
‫سنور خان‬
Biometric Recognition
Some statistics on User/Passwords
• Case Study: Telesis Community Credit Union(CA), a California based financial services
provider that manages $1.2 billion in assets.
• The VP of IT, lead a team to run a network password cracker as part of an enterprise
security audit last year to see if employees were following Telesis’ password policies.
• Result: They were far from doing so….
• In fact within 30 seconds the team was able to identify 80% of people’s passwords!
• The team asked employees to change their passwords and comply with password
policies.
• A few days later, the IT team run their password cracking exercise again….
• This time they still were able to crack 70% of the passwords!
‫سنور خان‬
Biometric Recognition
Example
• The identification of a person is becoming highly important as the ID
cards, punch, secret password and PIN are used for personal
identification.
• The ID can be stolen; passwords can be forgotten or cracked.
• The biometric identification overcomes all the above.
• Additional security barriers can be provided using any one of the
biometrics features.
• The features like fingerprints, face, hand geometry, voice, and iris.
• These biometrics features can be used for authentication purpose in
computer based security systems.
‫سنور خان‬
Biometric Recognition
Some Examples of Different Biometris
• Here are few
• Face
• Fingerprint
• Voice
• Palmprint
• Hand Geometry
• Iris
• Retina Scan
• Voice
• DNA
• Signatures
• Gait
• Keystroke
‫سنور خان‬
Biometric Recognition
Applications + Terminology
• Identification:
– Match a person’s biometrics against a database to figure out his identity by
finding the closest match.
– Commonly referred to as 1:N matching
– ‘Criminal Watch-list’ application scenario
• Verification:
– The person claims to be ‘John’, system must match and compare his/hers
biometrics with John’s stored Biometrics.
– If they match, then user is ‘verified’ or authenticated that he is indeed ‘John’
– Access control application scenarios.
– Typically referred as 1:1 matching.
‫سنور خان‬
Biometric Recognition
Types
• Biometrics measures biological characteristics for identification or
verification purposes of an individual.
• Since IDs and passports can be forged, more sophisticated methods
needed to be put into place to help protect companies and individuals.
• There are two types of biometric methods.
• One is called Physiological biometrics used for identification or verification
purposes. Identification refers to determining who a person is. This method is
commonly used in criminal investigations.
• Behavioral biometrics is the other type. It is used for verification purposes.
Verification is determining if a person is who they say they are. This method looks
at patterns of how certain activities are performed by an individual.
‫سنور خان‬
Biometric Recognition
Figure
‫سنور خان‬
Biometric Recognition
Finger Print Recognition
• Minutiae
• Pattern Matching
• Problems: sometimes
unusable
‫سنور خان‬
Biometric Recognition
Vascular Pattern Matching
• LED infrared light
• Fingers and back of hand
• Not completely viable
‫سنور خان‬
Biometric Recognition
Iris Recognition
• Uses infrared light
• Converts Images to vectors
• Needs further development
‫سنور خان‬
Biometric Recognition
Iris Recognition
• Hand geometry systems produce estimates of certain measurements of
the hand such as the length and the width of fingers.
• Various methods are used to measure the hand.
• These methods are most commonly based either on mechanical or optical
principle.
• The latter ones are much more common today.
• The hand geometry is used for identification and recognition of a person.
‫سنور خان‬
Biometric Recognition
Facial Recognition
• Location and position of
facial features
• Dependent on background
and lighting conditions
‫سنور خان‬
Biometric Recognition
Facial Recognition
• Facial recognition is the most natural means of biometric identification.
The approaches to face recognition are based on shape of facial attributes,
such as eyes, eyebrows, nose, lips, chin and the relationships of these
attributes.
• As this technique involves many facial elements; these systems have
difficulty in matching face images
‫سنور خان‬
Biometric Recognition
D.N.A.
• DNA(Deoxyribonucleic Acid) sampling is rather intrusive at present and
requires a form of tissue, blood or other bodily sample.
• This method of capture still has to be refined.
• So far the DNA analysis has not been sufficiently automatic to rank
the DNA analysis as a biometric technology.
• The analysis of human DNA is now possible within 10 minutes.
• As soon as the technology advances so that DNA can be matched
automatically in real time, it may become more significant.
• At present DNA is very entrenched in crime detection and so will remain
in the law enforcement area for the time being
‫سنور خان‬
Biometric Recognition
Voice Verification
• Factors: pitch, intensity,
quality and duration
• Text dependent
• Text independent
• Problems: include
background noise
‫سنور خان‬
Biometric Recognition
Voice Recognition
• The features of an individual's voice are based on physical characteristics such
as vocal tracts, mouth, nasal cavities and lips that are used in creating a sound.
• These characteristics of human speech are invariant for an individual, but the
behavioral part changes over time due to age, medical conditions and emotional
state.
• Voice recognition techniques are generally categorized according to two
approaches:
1) Automatic Speaker Verification (ASV) and
2) Automatic Speaker Identification (ASI).
• Speaker verification uses voice as the authenticating attribute in a two-factor
scenario.
‫سنور خان‬
Biometric Recognition
Hand Geometry
• Scan both sides of hand
• Primarily used for
verification
• Not as accurate as other
methods
‫سنور خان‬
Biometric Recognition
Dynamic Signature
• Factors: velocity,
acceleration and speed
• Mainly used for
verification
• Problems: forgers could
reproduce
‫سنور خان‬
Biometric Recognition
Signature Verification
• The way a person signs his or her name is known to be characteristic of that
individual.
• Signature is a simple, concrete expression of the unique variations in human
hand geometry.
• Collecting samples for this biometric includes subject cooperation and requires
the writing instrument.
• Signatures are a behavioral biometric that change over a period of time and are
influenced by physical and emotional conditions of a subject.
• In addition to the general shape of the signed name, a signature recognition
system can also measure pressure and velocity of the point of the stylus
across the sensor pad.
‫سنور خان‬
Biometric Recognition
Retina Recognition
• One of the most secure
means of biometrics
• Unique to each person
• Unique to each eye
• Problems: require effort on
the part of subjects
‫سنور خان‬
Biometric Recognition
Other Types
• Keystroke
• Gait
• DNA
• Odor
‫سنور خان‬
Biometric Recognition
Commercial Applications
• Computer login
• Electronic Payment
• ATMs
• Record Protection
‫سنور خان‬
Biometric Recognition
Government Applications
• Passport control
• Border control
• Access Control
‫سنور خان‬
Biometric Recognition
Forensic Applications
• Missing Persons
• Corpse identification
• Criminal investigations
‫سنور خان‬
Biometric Recognition
Type of Authentication
• Authentication
• 1:1
• Verification
• 1:N
‫سنور خان‬
Biometric Recognition
Constraints on Biometrics
• Typical “Constrained”
Image
• Constraints:
•
•
•
•
•
•
Lighting
Distance
Pose
Expression
Time Lapse
Occlusion
‫سنور خان‬
Biometric Recognition
Constraints on Biometrics
• “Unconstrained” Image
‫سنور خان‬
Biometric Recognition
Keystroke
• Keyboard- is the part that helps us to communicate with computer.
• People use keyboard in different ways. Some people type fast, some slow.
The speed of the typing also depends on the mood of a person and a time
of a day.
• Biometric keystroke recognition – is a technology of recognizing people
from the way they are typing.
• It is rather important to understand that this technology does not deal
with “what” is written but “how” it is written.
‫سنور خان‬
Biometric Recognition
Biometrics Research at Clemson
• Biometric and Pattern
Recognition Lab
• Goals:
1. Usable Biometrics
2. Unconstrained
Biometrics
‫سنور خان‬
Biometric Recognition
Biometrics Research at Clemson
• Aging Research
‫سنور خان‬
Biometric Recognition
Biometrics Research at Clemson
• Demographics
• Older vs. Younger
• Males vs. Females
• Geographic origin of
algorithms
‫سنور خان‬
Biometric Recognition
Biometrics Research at Clemson
• Periocular Region
Recognition
• Texture, color, eye shape
• Overcome facial occlusion
‫سنور خان‬
Biometric Recognition
Biometrics Research at Clemson
• Ear Recognition
• Not affected by aging or
expression
• Covert collection of images
• Little research performed
‫سنور خان‬
Biometric Recognition
Download