Biometrics Our Past, Present, and Future Identity

Similar documents
Palm Vein Technology

Advanced Biometric Access Control Training Course # :

A Review of Emerging Biometric Authentication Technologies

Biometrics: The Password You ll Never Forget

Role of Biometrics in Cybersecurity. Sam Youness

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

An Overview of Biometric Image Processing

Access Control Biometrics User Guide

Bio-FactsFigures.docx Page 1

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

Biometric Cryptosystems: for User Authentication

In this unit we are continuing our discussion of IT security measures.

Human Identification Using Biometry

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 5: Face image data

Biometrics: The Future of Mobile Phones

Study of Face-Recognition Parameters and its finding using DSP Software

Biometric Security Roles & Resources

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Vision-Based Technologies for Security in Logistics. Alberto Isasi

Secure and Private Identification through Biometric Systems

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Authentication Objectives People Authentication I

PALM VEIN TECHNOLOGY

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Authentication: Beyond Passwords

INTUS 1600PS Palm Vein Authentication

Highly Secure Authentication Scheme: A Review

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

BIOMETRIC PRINTER SECURITY SYSTEM

Information Security Identification and authentication. Advanced User Authentication III

Biometrics Hybrid System Based Verification

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)

CAS Sign On for Windows

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

NCRD s Technical Review : e-journal, Volume 1, Issue 1 (Jan-Dec 2015) ISSN: X

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Digital Vision Face recognition

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

User Authentication and Human Factors

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

TOPIC : FINGERPRINT RECOGNITION

A quick guide to iris recognition. Click on blue squares to navigate

UltraMatch. Standalone Iris Recognition System

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

Identification or Verification? Advanced Identification Technology

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Touch screen. Uses of Touch screen: Advantages of Touch screen: Disadvantages of Touch screen:

6. Multimodal Biometrics

Biometrics problem or solution?

FINGERPRINT BIOMETRICS

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

An introduction on several biometric modalities. Yuning Xu

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

Biometrics and Network Security

An approach for Fingerprint Recognition based on Minutia Points

Chapter 3: User Authentication

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

Find Pretend Biometric Mistreatment Image Quality Assessment for animateness Detection

Fingerprint Recognition using Fuzzy based image Enhancement

Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System

Lecture 9 User Authentication

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Passwords. EJ Jung. slide 1

Multimodal Biometric System in Secure e- Transaction in Smart Phone

MDR-1 Mobile Document Reader

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM

Biometrics Technology: Multi-modal (Part 2)

Information Security Identification and authentication. Advanced User Authentication II

Implementation of Easy Fingerprint Image Authentication with Traditional Euclidean and Singular Value Decomposition Algorithms

The Future of Authentication

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Discovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB

Fingerprint Security and Access Tracking System

International Journal of Advanced Research in Computer Science and Software Engineering

Secure Authentication for Internet environment using Biometric and One-Time Password

Touchless Fingerprint recognition using MATLAB

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Mobile Identity. Revolutionizing biometric identity verification

NIST Tests Supporting Biometric Identification Applications

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Zodiac Max OPERATOR GUIDE

Biometric Technologies Signature

Biometric Quality on Finger, Face and Iris Identification

Analysis of a Hand Geometry-Based Verification System

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018.

Transcription:

Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti Teknologi Malaysia

Outline General Information on Biometrics Why Biometrics Market Trends How it works Examples of Biometrics Modalities Standards Concluding Remarks

What is Biometric Biometric literally means life measurement. Measurement of an individual for either: Identification who you are (one to many) Authentication (Verification) you are who you are (one to one).

What is Biometric Biometric is the key. Biometric System is the lock

Types of Biometrics Physiological Fingerprint Face Iris DNA Finger Vein Palm Print Hand Geometry Behavioral Voice Signature Typing Rhythm Gait

Why Biometrics Harder to fake unlike identity cards or passports. Can t be guessed unlike a password Can t be misplaced/loss unlike an access card or ID cards. Can t be forgotten unlike password

Market Trend http://fingerchip.pagesperso-orange.fr/biometrics/applications.htm

Market Trend

Market Trend http://www.prism-magazine.org/oct04/briefings.htm

How Biometric Works

How Biometric Works User s Identity or Non-User Identified

Fingerprint Most widely used Very established Matching techniques Minutiae-based most popular Correlation-based eg. Phase information Graph-based based on minutiae topology

Fingerprint

Fingerprint

Fingerprint Types of Sensors Optical sensors with CCD or CMOS cameras Ultrasonic sensors not common, big size, deer Solid state temperature sensors Solid state capacitive sensors - smartphone RF sensors (Latest) Types of Reader/Sensing Static fingerprint reader Swipe fingerprint reader

Fingerprint Thanks to the smartphone industries 2013 first smartphone shipped with fingerprint scanner (Iphone 5s) followed by Samsung S5 In 2020 the market will be $14.35 billion

Fingerprint Current Applications Entry Access Device Access Security Control Access

Fingerprint Advantages Very high accuracy. Is the most economical biometric PC user authentication technique. It is one of the most developed biometrics Easy to use. Small storage space required for the biometric template, reducing the size of the database memory required It is standardized.

Fingerprint Disadvantages Very intrusive to some people - related to criminal identification. Error prone for dry or dirty finger skin. Aging effect - not appropriate with children.. Large memory for higher resolution. For a 500 dpi fingerprint image at 8 bits per pixel requires approximately 240 Kbytes Compression required (a factor of 10 approximately).

Face Based on some facial features or landmarks known as nodal points Each face has about 80 nodal points some of them Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw line These nodal points will create a numerical code called faceprint and stored in the database.

Face

Face http://atmega32-avr.com/how-facial-recognition-systems-work/

Face New technology 3D face scanner Biometric face recognition surface skin texture Problems Significant glare on eyeglasses Hair obscuring central part of the face Poor lighting that causes the face to be over- or under-exposed Lack of resolution (face too far from camera) Head pose, illumination, facial expression, cosmetic Still low accuracy for in the wild environment.

Face Users Law Enforcment Custom & Immigration

Iris Not a retinal scan Relatively new technology Fast response Based on Iris Code collected from at least 200 points rings, furrow, freckles, corona etc

Iris http://resources.infosecinstitute.com/notes-biometric-template-security/

Iris Scanners Near Infrared wavelength dark brown eyes Visible wavelength

Iris Currently more expensive than other biometric scanning systems. Mainly used at some European airports for frequent travelers, and UAE

Iris Advantages Stable - remains unchanged throughout one's lifetime Unique - the probability of two rises producing the same code is nearly impossible Flexible - easily integrates into existing security systems or operates as a standalone Reliable - not susceptible to theft, loss or compromise Non-Invasive - non-contact and quick, offering excellence accuracy from distances as far as 3" to 10"

DNA DNA - Deoxyribonucleic acid with double helix shape Very unique impossible to fake (actually 99.9% similar, only 0.1% is different. Longer processing time with intricate procedures

DNA DNA Fingerprinting process

DNA Mainly used to Find out who a person s parent or siblings are family tree. Solve crimes in finding the criminal Identify a body especially if badly decomposed

DNA Parent/Sibling Matching http://www.scq.ubc.ca/a-brief-tour-of-dna-fingerprinting/

DNA Criminal Search http://geneed.nlm.nih.gov

Who s baby? DNA

DNA Limitations Possibility of incorrect results due to errors such as cross-contamination of samples. DNA profiles can only offer statistical probability (for example, one in a million), rather than absolute certainty. DNA evidence is easily planted at a crime scene.

Comparison

Finger Vein Exploit the hidden structure of vein pattern or vein network. Either from one finger or entire palm

Finger Vein

Finger Vein

Finger Vein Capturing Palm vein

Applications Finger Vein

Palm Print based on the aggregate of information presented in a friction ridge impression

Palm Print Matching technique Minutiae-based most widely used Correlation-based template matching Ridge-based matching used ridge pattern landmark features and geometric characteristic alternative to minutiae.

Voice Process acoustic information rather than image frequency and pitch. 2 type of voice biometric Speaker Verification Speaker Identification Combines voice biometric and speech recognition Reference voice voice prints

Speaker Verification Voice

Voice Speaker Identification http://www.rapidsoftsystems.com/mobile-voice-biometrics-platform.html

Voice Problems Human voices do not stay the same all the time e.g a person with a cold has a different voice Quality of microphones Background noise Can be easily recorded and used for unauthorized PC or network Low accuracy

Signature Online or Dynamic Analyze shape, speed, stroke, pen pressure and timing information during the act of signing. Only the original signer can recreate the changes in timing and X, Y, and Z (pressure). Needs special pen and tablet. Offline or Static Use image processing technique. Look for certain features in the signature.

Signature

Signature Strength High level of resistance to imposters - although it is quite easy to forge a signature, it is very difficult to mimic the behavioral patterns associated with the signature. Noninvasive tool. Unlike physiological biometrics, signature can be changed in case of stolen template

Signature Weakness Inconsistency prone to increase the error. Inconveniency of using tablet increase error.

Other Biometrics Gait - Style of walking Typing Rhythm Hand geometry Multimodal Biometrics

Standards Important from 2 aspects 1. Manufacturers Compatibility Sustainability 2. End Users Portability Reliability

Standards Involves Framework of the System Format of the Data Testing of System Data Quality

Standards Under ISO/IEC SC37 (Data Part) Part 1 Framework Part 2 Finger Minutiae Part 3 Finger Pattern Spectral Data Part 4 Finger Image Part 5 Face Image Part 6 Iris Part 7 Signature/Sign Time Series

Standards Under ISO/IEC SC37 (Data Part) Part 8 Finger Pattern Skeletal Part 9 Vascular Image Part 10 Hand Geometry Silhoutte Part 11 Signature/Sign Processed Dynamic Part 12 Part 13 Voice Data Part 14 DNA

Future of Biometric Will be the future form of identification Technology will make biometric more matured. Sophisticated algorithms will be fast with high accuracy and little chance to spoof. Hardware devices will be smaller but able to work afar. However, the system won t be perfect and constraints by limitations

Thank You For Your Attention