Biometric Technologies Introduction to Biometrics Fingerprint Recognition Eye – Retinal or Iris Recognition Dynamic Signature Face Recognition Summary of Biometrics Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang Introduction to Biometrics History of Biometrics Biometrics is the study of biological “data” Biometrics has a very long tradition The Egyptians used the length of a person’s forearm to determine their identification for wage payment There are many different biometrics used for identification: Fingerprints Eye – Retinal or Iris Facial Recognition Voice Signature Dental DNA www.biometricscatalog.org Iris and Retinal Scanning The Basics of Human Eye Rationales How do the Technologies Work? Applications Performance Metrics Pros and Cons Commercial Products The Basics of Human Eye Iris – •The Shutter of our biological camera •The plainly visible colored ring underneath cornea. •Iris surrounds the pupil Retina – •The film of the camera •A muscular structure which controls the amount of light entering into the eye, and it has very intricate details such as colors, striations, pits and furrows. •Located in the back of the eye where the Optic nerve connects. •The blood vessels pattern in the retina are unique to each individual. Source: http://www.stlukeseye.com/Anatomy.asp Rationales for Use Iris contains intricate details such as striations, pits and furrows. Two Iris’s are not alike. There is no detailed correlation between the patterns of identical twins or even between the left and right eye of the same individual. Expressed by the Individual’s Phenotype, Not Genotype Iris Collage Retinal Image - Twin 1 Retinal Image -Twin 2 The patterns of blood vessels in the retina is extremely unique to individuals. There is no detailed correlation between the patterns of identical twins or even between the left and right eye of the same individual. Source of images: http://www.cl.cam.ac.uk/users/jgd1000/ How does Iris Recognition Works? A picture of the eye is taken from within 1< meter distance and Iris portion is extracted An Iris code of 512 Bytes is generated using functions called 2-D wavelets. This code is unique to one eye of one individual. Iris code is then compared to other Iris codes that are stored in the database Source of images: http://www.iridiantech.com/ History of Iris Recognition •1936 – Idea proposed by ophthalmologist Frank Burch 1949 - The idea documented in an ophthalmology textbook by James Doggarts 1980's - The idea had appeared in James Bond films, but it still remained science fiction and conjecture. 1987 - two ophthalmologists, Aran Safir and Leonard Flom, patented this idea 1989 - John Daugman (then teaching at Harvard University) try to create actual algorithms for iris recognition John Daugman algorithms patented in 1994, are the basis for all current iris recognition systems and products Commercial Applications -Iris The major applications of this technology so far have been: •Aviation security and controlling access to restricted areas at airports London Heathrow, Amsterdam Schiphol, Frankfurt, Athens, and several Canadian airports, Charlotte/Douglas International Airport in North Carolina •Database access and computer login •Access to buildings and homes •Hospital settings, including mother-infant pairing in maternity wards •Border control "watch list" database searching at border crossings On the Pakistan Afghanistan border, the United Nations High Commission for Refugees uses these algorithms for anonymous identification of returning Afghan refugees receiving cash grants at voluntary repatriation centres •Other law enforcement agency programs such Jail Security Prisoner Identification – 1994 - Lancaster County Prison in Pennsylvania became the first correctional facility to employ the technology. Performance Comparison Method Coded Pattern Misidentification rate Security Applications Iris/Retinal Recognition Iris code / Blood vessel pattern 1/1,200,000 High High-security facilities Fingerprinting Fingerprints 1/1,000 Medium Universal Hand Shape Size, length and thickness of hands 1/700 Low Low-security facilities Facial Recognition Outline, shape and distribution of eyes and nose 1/100 Low Low-security facilities Signature Shape of letters, writing order, pen pressure 1/100 Low Low-security facilities Voiceprinting Voice characteristics 1/30 Low Telephone service Source: AIM Japan, Automatic Identification Seminar, Sept.14, 2001 Pros and Cons Iris Scanning The uniqueness of Irises, even between the left and right eye of the same person, makes iris scanning very powerful for identification purposes. The likelihood of a false positive is extremely low and its relative speed and ease of use make it a great potential biometric. The only drawbacks are the potential difficulty in getting someone to hold their head in the right spot for the scan if they are not doing the scan willingly. Retina Scanning Retina scan devices are probably the most accurate biometric available today. The continuity of the retinal pattern throughout life and the difficulty in fooling such a device also make it a great longterm, high-security option. The high cost of the proprietary hardware as well as the inability to evolve easily with new technology make retinal scan devices a bad fit for most situations. It also has the stigma of consumer's thinking it is potentially harmful to the eye, and in general, not easy to use. Commercial Products and Vendors Iris scanning (very accurate, expensive) Argus Solutions (Australia) http://www.argus-solutions.com Aurora Computer Services Ltd (Northampton, U.K.) Eye Ticket Corp. (Virginia, U.S.A.) Iridian Technologies [(formerlyIriScan, Inc.) Marlton, NJ, U.S.A. and Geneva, Switzerland Saflink (Redmond, WA, U.S.A.)] Retinal scanning (very accurate, very expensive) Retinal is more intrusive than iris recognition. Eyedentify, Inc. (Delaware, U.S.A.) Microvision, Inc. (WA, U.S.A.) (RSD = Retinal Scanning Display) Retinal Technologies, Inc. (MA, U.S.A.) Face Recognition Background Algorithms FERET/FRVT Research Commercial Products Face Recognition: The Basics In simplistic form, A signature is created from a sensor’s observation An algorithm normalizes the signature A matcher compares the normalized structure to the database. The Algorithms Eigenfaces Standard Principle Components Analysis (PCA) PCA & LDA LDA: Linear Discriminant Analysis Combination based on the University of Maryland algorithm tested in FERET. Baysian An Intrapersonal/Extrapersonal Image Distance Classifier based on the MIT algorithm tested in FERET. Elastic Bunch Graphing Based on the USC algorithm tested in FERET Uses localized landmark features represented by Gabor jets Elastic Bunch Graphing FERET and FRVT FERET DARPA and Army Research Laboratory 1994-1996 A unified means of testing algorithms for easier comparison FRVT Designed by Govt and Law enforcement agencies 2000 and 2002 Tested ability to compare images to those stored in a database Females and younger people were harder to recognize Current Research 3-D morphable models Not as affected by lighting and pose as is 2-D MERL (Mitsubishi) and Ohio State U Identical twin Israeli students Created a 3-D scanner that uses light to scan the image Algos measure the distances between points and compare to database images Factors False positives Privacy issues Environment – lighting, movement, etc Commercial Product FaceIT (from Visionics / Identix) $100 Developed from an algorithm out of Rockefeller University Viisage From MIT algorithm based on eigenfaces TrueFace (from Miros then acquired by Sol Universe) FaceOK – (from Titanium Technology) $89 PC user security Introduction to Fingerprint Recognition Fingerprint is the most referred biometric mechanism used today. Fingerprint has the uniqueness feature – the studies shows that chance of same fingerprint between two individuals (even in twins) is one in one billion. Fingerprint has been widely adopted (low cost) for authentication, identification and criminal investigation. Uniqueness of Fingerprint Fingerprint is unique because of the two distinct feature Persistence – the basic characteristic of fingerprint do not change in time. Individuality – one over 1 billions !! Fingerprints are comprised of various types of ridge patterns: left loop, right loop, arch, whorl and tented arch. The discontinuities that interrupt these smooth ridge patterns are called Minutia. Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern Fingerprint Capturing and Analysis Fingerprint Matching Minutae-based Correlation based - requires precision location of registration point Fingerprint Classification The technique to assign a fingerprint into one of the several pre-specified types already established with indexing mechanism Fingerprint Enhancement It is essential to incorporate a fingerprint enhancement algorithm with respect to the quality of the fingerprint images in the minutiae extraction module in order to ensure the accuracy of automatic fingerprint identification/verification The Identification Workflow of Fingerprint Device Demonstration Identix BioTouch® 200 USB Fingerprint Reader Hardware BioTouch® 200 USB Fingerprint Reader Software - BioLogon for Windows Dynamic Signature Verification What is It? Uses Advantages Disadvantages Future What is It? On-line vs Off-line signature Verification Vision-Based, Non-Vision Dynamic Signature – unique as DNA Measures speed, pressure of the pen Captures x, y, z location of the writing Uses Point of Sale applications Workflow automation Security Authentication – replaces password, PIN, keycards, identification card Financial – account opening, withdrawal Wireless device security Advantages Signatures already accepted as a means of identification so people willing to accept electronic signature. Changes in signing are consistent and have recognizable pattern. Is not forgotten, lost, or stolen, so simple and natural way for enhanced computer security and document authorization. unique to an individual and almost impossible to duplicate. Disadvantages Secured authentication Difficult to segment strokes as writing styles are varied and have no set standard Electronic tablets or digitizers are bulky and complex. Future Administrative Simplification (AS) of the Health Insurance Portability and Accountability Act (HIPAA) IT expenditures Frost & Sullivan - $5.7M in 2003 up to $123.3M by 2009 Mobile phones, Internet, tablet PC’s PC/Network Access, e-Commerce and telephony, physical access and surveillance businesses Thank You Have any questions or comments? Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang