An Overview of Biometrics

advertisement

Access Control

An Overview of

Biometrics

2

Contents Biometric Systems

1. Introduction

2. Biometric identifiers

3. Classification of biometrics methods

4. Biometric system architecture

5. Performance evaluation

SECURITY INNOVATION ©2003

3

Contents Biometric Systems

6. Signature recognition

7. Voice recognition

8. Retinal scan

9. Iris scan

10. Face-scan and facial thermograph

11. Hand geometry

SECURITY INNOVATION ©2003

4

Personal Identification

Association of an individual with an identity:

• Verification (or authentication): confirms or denies a claimed identity.

• Identification (or recognition): establishes the identity of a subject (usually from a set of enrolled persons).

SECURITY INNOVATION ©2003

5

Personal Identification Objects

• Token-based:

“something that you have”

• Knowledge-based:

“something that you know”

• Biometrics-based:

“something that you are”

SECURITY INNOVATION ©2003

6

Biometrics

• Bio + metrics:

The statistical measurement of biological data.

• Biometric Consortium definition:

Automatically recognizing a person using distinguishing traits.

SECURITY INNOVATION ©2003

7

Application Domains (I)

Access control

– to devices

• cellular phones

• logging into a computer, laptop, or PDA

• cars

• guns

– to local services

• money from a ATM machine

• logging in to computer

• accessing data on smartcard

– to remote services

• e-commerce

• e-business

SECURITY INNOVATION ©2003

Application Domains (II)

8

• Physical access control

– to high security areas

– to public buildings or areas

• Time & attendance control

• Identification

– forensic person investigation

– social services applications, e.g. immigration or prevention of welfare fraud

– personal documents, e.g. electronic drivers license or ID card

SECURITY INNOVATION ©2003

9

Biometric Identifiers

Ideal Properties

• Universality

• Uniqueness

• Stability

• Quantitative

Considerations

• Performance

• Acceptability

• Forge resistance

SECURITY INNOVATION ©2003

10

Biometric Technologies

• Covered in ISO/IEC 27N2949:

– recognition of signatures,

– fingerprint analysis,

– speaker recognition,

– retinal scan,

– iris scan,

– face recognition,

– hand geometry.

SECURITY INNOVATION ©2003

11

Other Biometric Methods

• Found in the literature:

– vein recognition (hand),

– keystroke dynamics,

– palm print,

– gait recognition,

– ear shape.

SECURITY INNOVATION ©2003

12

Classification of Biometric

Methods

• Static:

– fingerprint

– retinal scan

– iris scan

– hand geometry

• Dynamic:

– signature recognition

– speaker recognition

SECURITY INNOVATION ©2003

13

Biometric System Architecture

• Basic modules of a biometric system:

– Data acquisition

– Feature extraction

– Matching

– Decision

– Storage

SECURITY INNOVATION ©2003

14

Biometric System Model

Data collection

Raw data

Signal processing

Extracted features matching template storage score

Application

Authentication decision decision

SECURITY INNOVATION ©2003

15

Data Acquisition Module

• Reads the biometric info from the user.

• Examples: video camera, fingerprint scanner/sensor, microphone, etc.

• All sensors in a given system must be similar to ensure recognition at any location.

• Environmental conditions may affect their performance.

SECURITY INNOVATION ©2003

16

Feature Extraction Module

• Discriminating features extracted from the raw biometric data.

• Raw data transformed into small set of bytes – storage and matching.

• Various ways of extracting the features.

• Pre-processing of raw data usually necessary.

SECURITY INNOVATION ©2003

17

Matching Module

• The core of the biometric system.

• Measures the similarity of the claimant’s sample with a reference template.

• Typical methods: distance metrics, probabilistic measures, neural networks, etc.

• The result: a number known as match score.

SECURITY INNOVATION ©2003

18

Decision Module

• Interprets the match score from the matching module.

• Typically a binary decision: yes or no.

• May require more than one submitted samples to reach a decision: 1 out of 3.

• May reject a legitimate claimant or accept an impostor.

SECURITY INNOVATION ©2003

19

Storage Module

• Maintains the templates for enrolled users.

• One or more templates for each user.

• The templates may be stored in:

– a special component in the biometric device,

– conventional computer database,

– portable memories such as smartcards.

SECURITY INNOVATION ©2003

20

Enrolment

• Capturing, processing and storing of the biometric template.

• Crucial for the system performance.

• Requirements for enrolment:

– secure enrolment procedure,

– check of template quality and “matchability”,

– binding of the biometric template to the person being enrolled.

SECURITY INNOVATION ©2003

21

Possible Decision Outcomes

• A genuine individual is accepted.

• A genuine individual is rejected (error).

• An impostor is rejected.

• An impostor is accepted (error).

SECURITY INNOVATION ©2003

22

Errors

• Balance needed between 2 types of error:

Type I: system fails to recognize valid user (‘false non-match’ or ‘false rejection’).

Type II: system accepts impostor (‘false match’ or

‘false acceptance’).

• Application dependent trade-off between two error types.

SECURITY INNOVATION ©2003

23

Tolerance Threshold

• Error tolerance threshold is crucial and application dependent.

• Tolerance too large gives Type II error (admit impostors).

• Tolerance too small gives Type I errors (reject legitimate users).

• Equal error rate for comparison: false nonmatch equal to false match.

SECURITY INNOVATION ©2003

24

Biometric Technologies

• Signature recognition

• Voice recognition

• Retinal scan

• Iris scan

• Face biometrics

• Hand geometry

SECURITY INNOVATION ©2003

25

Signature Recognition

• Signatures in wide use for many years.

• Signature generating process a trained reflex imitation difficult especially ‘in real time’.

• Automatic signature recognition measures the dynamics of the signing process.

SECURITY INNOVATION ©2003

26

Dynamic Signature Recognition

• Variety of characteristics can be used:

– angle of the pen,

– pressure of the pen,

– total signing time,

– velocity and acceleration,

– geometry.

SECURITY INNOVATION ©2003

Dynamic Signature Verification

(I)

27

Electronic pen [LCI-SmartPen]

SECURITY INNOVATION ©2003

Dynamic Signature Verification

(II)

28

Digitising tablet by

Wacom Technologies

Digitising tablet [Hesy Signature Pad by BS Biometric Systems GmbH]

SECURITY INNOVATION ©2003

29

Signature Recognition:

Advantages / Disadvantages

• Advantages:

– Resistance to forgery

– Widely accepted

– Non-intrusive

– No record of the signature

• Disadvantages:

– Signature inconsistencies

– Difficult to use

– Large templates (1K to 3K)

SECURITY INNOVATION ©2003

30

Fingerprint Recognition

• Ridge patterns on fingers uniquely identify people.

• Classification scheme devised in 1890s.

• Major features: arch, loop, whorl.

• Each fingerprint has at least one of the major features and many ‘small’ features.

SECURITY INNOVATION ©2003

Features of Fingerprints

31

SECURITY INNOVATION ©2003

32

Fingerprint Recognition (cont.)

• In a machine system, reader must minimize image rotation.

• Look for minutiae and compare.

• Minor injuries a problem.

• Automatic systems can not be defrauded by detached real fingers.

SECURITY INNOVATION ©2003

33

Fingerprint Authentication

• Basic steps for fingerprint authentication:

– Image acquisition,

– Noise reduction,

– Image enhancement,

– Feature extraction,

– Matching.

SECURITY INNOVATION ©2003

34 c e a

Fingerprint Processing b f d a) Original b) Orientation c) Binarised d) Thinned e) Minutiae f) Minutia graph

SECURITY INNOVATION ©2003

35

Fingerprint Recognition

• Sensors

– optical sensors

– ultrasound sensors

– chip-based sensors

– thermal sensors

• Integrated products

– for identification – AFIS systems

– for verification

SECURITY INNOVATION ©2003

Fingerprint Recognition:

Sensors (I)

36

Electro-optical sensor

[DELSY® CMOS sensor modul]

Optical fingerprint sensor

[Fingerprint Identification Unit

FIU-001/500 by Sony]

Capacitive sensor

[FingerTIP™ by Infineon]

SECURITY INNOVATION ©2003

Fingerprint Recognition:

Sensors (II)

37

E-Field Sensor

[FingerLoc™ by Authentec]

SECURITY INNOVATION ©2003

Thermal sensor

[FingerChip™ by ATMEL

(was: Thomson CSF)]

Fingerprint Recognition:

Integrated Systems (I)

[BioMouse™ Plus by American Biometric Company]

38

Physical Access Control System

[BioGate Tower by Bergdata]

SECURITY INNOVATION ©2003

[ID Mouse by Siemens]

Fingerprint Recognition:

Integrated Systems (II)

39

[TravelMate 740 by Compaq und Acer]

SECURITY INNOVATION ©2003

Keyboard [G 81-12000 by Cherry]

System including fingerprint sensor, smartcard reader and display by DELSY

40

Fingerprint Recognition:

Advantages / Disadvantages

• Advantages:

– Mature technology

– Easy to use/non-intrusive

– High accuracy

– Long-term stability

– Ability to enrol multiple fingers

• Disadvantages:

– Inability to enrol some users

– Affected by skin condition

– Association with forensic applications

SECURITY INNOVATION ©2003

41

Speech Recognition

• Linguistic and speaker dependent acoustic patterns.

• Speaker’s patterns reflect:

– anatomy (size and shape of mouth and throat),

– behavioral (voice pitch, speaking style).

• Heavy signal processing involved (spectral analysis, periodicity, etc)

SECURITY INNOVATION ©2003

42

Speaker Recognition Systems

• Text-dependent: predetermined set of phrases for enrolment and identification.

• Text-prompted: fixed set of words, but user prompted to avoid recorded attacks.

• Text-independent: free speech, more difficult to accomplish.

SECURITY INNOVATION ©2003

43

Speaker Recognition:

Advantages/ Disadvantages

• Advantages:

– Use of existing telephony infrastructure

– Easy to use/non-intrusive/hands free

– No negative association

• Disadvantages:

– Pre-recorded attack

– Variability of the voice

– Affected by noise

– Large template (5K to 10K)

SECURITY INNOVATION ©2003

44

Eye Biometric

• Retina:

– back inside of the eye ball.

– pattern of blood vessels used for identification

• Iris:

– colored portion of the eye surrounding the pupil.

– complex iris pattern used for identification .

SECURITY INNOVATION ©2003

45

Retinal Pattern

• Accurate biometric measure.

• Genetically independent: identical twins have different retinal pattern.

• Highly protected, internal organ of the eye.

• May change during the life of a person.

SECURITY INNOVATION ©2003

Retinal Recognition

46

Retinal recognition system [Icam 2001 by Eyedentify]

SECURITY INNOVATION ©2003

47

Retinal Scan:

Advantages / Disadvantages

• Advantages:

– High accuracy

– Long-term stability

– Fast verification

• Disadvantages:

– Difficult to use

– Intrusive

– Limited applications

SECURITY INNOVATION ©2003

48

Iris Properties

• Iris pattern possesses a high degree of randomness: extremely accurate biometric.

• Genetically independent: identical twins have different iris pattern.

• Stable throughout life.

• Highly protected, internal organ of the eye.

• Patterns can be acquired from a distance (1m).

• Patterns can be encoded into 256 bytes.

SECURITY INNOVATION ©2003

49

Iris Recognition

• Iris code developed by John Daugman at Cambridge.

• Extremely low error rates.

• Fast processing.

• Monitoring of pupils oscillation to prevent fraud.

• Monitoring of reflections from the moist cornea of the living eye.

SECURITY INNOVATION ©2003

The Iris Code

50

SECURITY INNOVATION ©2003

Iris Recognition

System for passive iris recognition by Sensar

51

System for active iris recognition by

IrisScan

SECURITY INNOVATION ©2003

52

Iris Recognition:

Advantages / Disadvantages

• Advantages:

– High accuracy

– Long term stability

– Nearly non-intrusive

– Fast processing

• Disadvantages:

– Not exactly easy to use

– High false non-match rates

– High cost

SECURITY INNOVATION ©2003

53

Face-scan and Facial

Thermographs

• Static controlled or dynamic uncontrolled shots.

• Visible spectrum or infrared (thermographs).

• Non-invasive, hands-free, and widely accepted.

• Questionable discriminatory capability.

SECURITY INNOVATION ©2003

54

Face Recognition

• Visible spectrum: inexpensive.

• Most popular approaches:

– eigen faces,

– Local feature analysis.

• Affected by pose, expression, hairstyle, makeup, lighting, eyeglasses.

• Not a reliable biometric measure.

SECURITY INNOVATION ©2003

Face Recognition

55

Face recognition system

[TrueFace Engine by Miros]

Face recognition system

[One-to-One

™ by Biometric Access Corporation]

SECURITY INNOVATION ©2003

56

Face Recognition:

Advantages / Disadvantages

• Advantages:

– Non-intrusive

– Low cost

– Ability to operate covertly

• Disadvantages:

– Affected by appearance/environment

– High false non-match rates

– Identical twins attack

– Potential for privacy abuse

SECURITY INNOVATION ©2003

57

Facial Thermograph

• Captures the heat emission patterns derived from the blood vessels under the skin.

• Infrared camera: unaffected by external changes (even plastic surgery!) or lighting.

• Unique but accuracy questionable.

• Affected by emotional and health state.

SECURITY INNOVATION ©2003

58

Facial Thermograph:

Advantages / Disadvantages

• Advantages:

– Non-intrusive

– Stable

– Not affected by external changes

– Identical twins resistant

– Ability to operate covertly

• Disadvantages:

– High cost (infrared camera)

– New technology

– Potential for privacy abuse

SECURITY INNOVATION ©2003

59

Hand Geometry

• Features: dimensions and shape of the hand, fingers, and knuckles as well as their relative locations.

• Two images taken: one from the top and one from the side.

SECURITY INNOVATION ©2003

Hand Geometry Reading

Hand geometry reader by Recognition Systems

60

Hand geometry reader for two finger recognition by BioMet Partners

SECURITY INNOVATION ©2003

61

Hand Geometry:

Advantages / Disadvantages

• Advantages:

– Not affected by environment

– Mature technology

– Non-intrusive

– Relatively stable

• Disadvantages:

– Low accuracy

– High cost

– Relatively large readers

– Difficult to use for some users (arthritis, missing fingers or large hands)

SECURITY INNOVATION ©2003

62

Multimodal Biometric Systems

• Combination of biometric technologies

– Fingerprint and face recognition

– Face recognition and lip movement

– Fingerprint recognition and dynamic signature verification

• Increase the level of security achieved by the system

• Enlarge the user base

SECURITY INNOVATION ©2003

63

How good are biometric products?

• How can we find out, how good a biometric product is?

– Empirical tests of the product

• There have been independent tests on a series of biometric products

– in Japan

– in Germany

SECURITY INNOVATION ©2003

64

Different Threat Scenarios

1.

Regular biometric sensor using artificially generated biometric data

2.

Replay attack of eavesdropped biometric data

3.

Manipulation of stored biometric reference data

SECURITY INNOVATION ©2003

65

Japanese Test

• Tsutomu Matsumoto, a Japanese cryptographer working at Yokohama

National University

• 11 state-of-the-art fingerprint sensors

• 2 different processes to make gummy fingers

– from live finger

– from latent fingerprint

Gummy fingers fooled fingerprint sensors

80% of the time

SECURITY INNOVATION ©2003

66

Test in Germany (I)

• 11 biometric sensors

– 9 fingerprint sensors,

– 1 face recognition system, and

– 1 iris scanner

• Fingerprint sensors –

– reactivate latent fingerprints (optical and capacitive sensors)

– apply latex finger (thermal sensor)

• Face recognition system –

– down- (up-) load biometric reference data from (to) hard disk

– no or only weak life detection

SECURITY INNOVATION ©2003

Test in Germany (II)

• Iris recognition –

– picture of iris of enrolled person with cut-out pupil, where a real pupil is displayed

67

All tested biometric systems could be fooled, but the effort differed considerably

SECURITY INNOVATION ©2003

68

Choosing the Biometrics

• Does the application need identification or authentication?

• Is the collection point attended or unattended?

• Are the users used to the biometrics?

• Is the application covert or overt?

SECURITY INNOVATION ©2003

69

Choosing the Biometrics (cont.)

• Are the subjects cooperative or noncooperative?

• What are the storage requirement constraints?

• How strict are the performance requirements?

• What types of biometrics are acceptable to the users?

SECURITY INNOVATION ©2003

Conclusions

70

• Biometric technology has great potential

• There are many biometric products around, regarding the different biometric technologies

• Shortcomings of biometric systems due to

– manufacturers ignorance of security concerns

– lack of quality control

– standardisation problems

• Biometric technology is very promising

• Manufacturers have to take security concerns serious

SECURITY INNOVATION ©2003

Download