Combating Accuracy Issues in Biometric Solutions

Similar documents
NeoFace Watch. High Performance Face Recognition. John Smith. Eva Christina. Missing Person. Person of Interest

Introduction to Bio-IDiom. NEC biometric authentication Bio-IDiom. April, 2018 Safer City Solutions Division Corporate Marketing Division NEC

NIST Tests Supporting Biometric Identification Applications

Biometric Security Roles & Resources

Introduction to NEC s Public Safety Solutions

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Role of Biometrics in Cybersecurity. Sam Youness

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

Identification or Verification? Advanced Identification Technology

Advanced Biometric Access Control Training Course # :

Biometrics Technology: Multi-modal (Part 2)

Biometrics. Overview of Authentication

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Biometrics Our Past, Present, and Future Identity

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Creating Innovation through the Digitalization of Ekimachi Spaces

Quick Start Guide (External Preview Version)

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

An introduction on several biometric modalities. Yuning Xu

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)

Biometric Center of Excellence (BCOE)

Disabling facial unlocking using facial expression

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

An Overview of Biometric Image Processing

IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY

Human Identification Using Biometry

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Advances in Stand-off Biometrics

Palm Vein Technology

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Biometrics: The Password You ll Never Forget

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

PALM VEIN TECHNOLOGY

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

BioEnable Iris Recognition Solutions

FFP Fingerprint USB Flash Drive User Manual

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Introduction of Toshiba Face Recognition Software Toshiba Corporation 1

Biometric Data Acquisition using MATLAB GUIs

Access Control Biometrics User Guide

USE CASES. See how Polygon s Biometrid can be used in different usage settings

Biometric authorization of Internet services users Online demo

Chapter 6. Multibiometrics

Information Security Identification and authentication. Advanced User Authentication II

A Contactless Palmprint Recognition Algorithm for Mobile Phones

Biometric Use Case Models for Personal Identity Verification

Biometrics Hybrid System Based Verification

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

The need for secure biometric devices has been increasing over the past

EasiSign. Application Software. User Manual. Version

Keywords Palmprint recognition, patterns, features

Eaget Fingerprint Flash Drive

FSN-PalmSecureID-for ATM Machines

TECHNOLOGY UPDATE STOCKHOLM, NOVEMBER

Voice, Face and Behavioural Biometrics

Authentication: Beyond Passwords

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

6. Multimodal Biometrics

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.

Brunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print)

Identity & security CLOUDCARD+ When security meets convenience

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

NEXT BIOMETRICS NB-3020-U2 WINDOWS 10 INSTALLATION GUIDE VERSION: 1.0

Table of Contents. 1. Before You Start AH650 Fingerprint Flash Drive at a Glance System Partition Safety Instructions...

Face ID Security. November 2017

(12) United States Patent

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

ThinkVantage Fingerprint Software

EMERGING TRENDS AROUND AUTHENTICATION

Face RFID Fingerprint Recognition Reader Sensor Fanless Touch 24/7 VESA

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

INTUS 1600PS Palm Vein Authentication

Put Identity at the Heart of Security

Match On Card MINEX 2

Discovering Computers Living in a Digital World

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.

Now there is: Asignio web-based signature authentication.

CAN WE ESCAPE PASSWORDS?

Mobile ID, the Size Compromise

NFC Identity and Access Control

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

CAS Sign On for Windows

MediaTek Natural User Interface

A Study on Different Challenges in Facial Recognition Methods

Exam Scheduling Instructions

Smart Mobile Identity. Revolutionizing biometric identity verification

Biometrics and Image processing

Biometric Palm vein Recognition using Local Tetra Pattern

Setting PSE 15 Preferences

Robust Biometrics Based on Palmprint

Transcription:

NEC Smart City Forum (KL) Combating Accuracy Issues in Biometric Solutions Christopher Lam Deputy Head and Senior Director NEC Laboratories Singapore (NLS) 1 NEC Corporation 2018

Biometric Authentication Technology 2 NEC Corporation 2018

NEC s suite of Biometrics Solutions Bio-IDiom Contactless Contact-based Fingerprint/ Palmprint Finger vein Ear Acoustics Authentication Iris Face Voice 3 NEC Corporation 2018

Characteristics of Different Biometric Authentication Fingerprint recognition offers great convenience with high accuracy and ease of use. Face recognition is highly convenient in that it does not require any special actions Walk-through entry/exit while holding your luggage, etc. High DNA Iris Vein Finger print Contact-based Contactless Accuracy Palm print Otoacoustic Face Low Low 4 NEC Corporation 2018 Hand writing Convenience Voice NEC s key technology High *Source: Addition to Biometrics Market White Paper 2007 version Yano Research Institute, Ltd.

Facial Authentication in Biometrics Authentication Facial authentication is an authentication method similar to how a person identifies another person な認証方式 1. Natural Feeling We usually recognize person by face. Less resistance for user 3. Ease of Verification It's possible for a human operator to verify the correctness by comparing the photos. 2. No Special Action No special action like touching devices, at the most look at the camera. Convenience 4. No special devices No special devices, just a camera (with or without infrared). Easy for a human to verify Even webcam can be used 5 NEC Corporation 2018

History of NEC s Face Technology 1963 Started character recognition technology R&D 1989 2002 2009 Started face recognition R&D Application of pattern recognition technology established through character recognition R&D Commercialized face recognition SDK NeoFace Ranked No.1 in NIST *1 Evaluation 3 consecutive wins in Still Image Matching 2017 NIST FIVE No.1 2013 2017 1963 Character R&D 2009(MBGC *2 ), 2010(MBE *3 ), 2013(FRVT *4 ) Newly ranked No.1 in Video Face Evaluation NIST Face in Video Evaluation (FIVE *5 ) Evaluation under various environmental conditions 1989 Face R&D 2009 2010 2013 NIST Evaluation 3 Consecutive Wins Still Image Matching Video Face *1 US Institute of Standards and Technology *2 MBGC (Multiple Biometric Grand Challenge) *3 MBE(Multiple Biometrics Evaluation) *4 FRVT(Face Vendor Test) *5 FIVE (Face In Video Evaluation) 6 NEC Corporation 2018

Facial 1-to-1 Matching Are You who You said You are? 2 1) Input Identity 2) Input Picture Facial System Matching Score (0.89) =? > Threshold (0.85) 1 ID/Face Database Photo used during Enrollment 7 NEC Corporation 2018

Facial 1-to-N Matching Who are You? Facial System Distant Top from the rest =? Input Picture Face/ID Database 8 NEC Corporation 2018

Facial N-to-N Matching Who is present at the Scene? Distant Top from the rest Facial System =? Video Frames Face/ID Database 9 NEC Corporation 2018

Difference from Still Image Matching Video Face is far more difficult OK OK OK High Speed (real time) Simultaneous recognition Distance from camera (low resolution) Various face angles Various lighting OK OK OK Still Image Cooperative Cooperative Video Non-Cooperative 10 NEC Corporation 2018

Different Modes of Operation for Facial Modes of Operation Accuracy Measurement 1-1 Matching No. of times, the system accurately agrees that the subject is who he/she says he/she is 1-N Matching N-N Matching No. of times, the system accurately points out that the subject is the correct person registered in the database No. of times the system accurately flags out that the correct registered persons are present (There can be missed detections also) Among the above modes, the first one is the simplest and has the highest chance of achieving high accuracy because of the 2 nd factor But identical twins may still fool the system 11 NEC Corporation 2018

Garbage-In-Garbage-Out (GIGO) Any System 12 NEC Corporation 2018

Factors contributing to the accuracy of Facial Cooperativeness of Subjects Quality of Enrollment Photo Camera Specs & Settings Quality of Input Image/Video Camera Positions & Lighting Factors contributing to the Accuracy of Facial Size of Database Facial Algorithm 15 NEC Corporation 2018

Compensate for the High Accuracy Facial System, How? Compensate for the non-cooperativeness non-cooperativeness of Subjects of Subjects Suitable cameras and proper settings Use Good Quality Photo for Enrollment (where possible) Capture Good Quality Face Images How to implement a High Accuracy Facial System? Use proven FR technologies like NEC s NeoFace Suitable camera positions & lighting to capture faces at good angles Limit size of Database (where possible) 16 NEC Corporation 2018

Multi-modal Biometrics NEC の生体認証 Iris Face Finger vein Fingerprint/ Palmprint Voice Ear acoustic 17 NEC Corporation 2018

Other ways to identify a Person from a Distance Head Person Head/ Silhouette Face (Shape) Head Upper Body Upper Clothing Body Color MAC Address Lower Body Lower Clothing Body Color Lower Body Walking Clothing Style Color 18 NEC Corporation 2018

NLS on LinkedIn https://www.linkedin.com/company/nec-laboratories-singapore Follow us on LinkedIn and keep up to date with the news, articles and opportunities available 20 NEC Corporation 2018