Human Identification Using Biometry

Similar documents
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Biometrics Our Past, Present, and Future Identity

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

INTUS 1600PS Palm Vein Authentication

Fingerprint Recognition

Biometric Security Roles & Resources

FVC-on Going Test Result for Union Community. on 9 Sep 2009

Biometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet

6 facts about GenKey s ABIS

Role of Biometrics in Cybersecurity. Sam Youness

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Fingerprint Mosaicking &

Development of an Automated Fingerprint Verification System

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

Palm Vein Technology

Authentication Technologies

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

FINGERPRINT BIOMETRICS

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

BioPassport TM Enterprise Server

Advances in Stand-off Biometrics

Advanced Biometric Access Control Training Course # :

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Minutiae Based Fingerprint Authentication System

Secure and Private Identification through Biometric Systems

Mobile Fingerprint Authentication Solution

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Biometric Technology

Verwelkoming. 20 September Fort Lent

Biometrics: The Password You ll Never Forget

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT

Multimodal Biometric Authentication using Face and Fingerprint

Identification or Verification? Advanced Identification Technology

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

World s Best Mobile Fingerprint Authentication Algorithm

Fingerprint Recognition using Fuzzy based image Enhancement

An introduction on several biometric modalities. Yuning Xu

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

Biometrics. Overview of Authentication

Implementation of Easy Fingerprint Image Authentication with Traditional Euclidean and Singular Value Decomposition Algorithms

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Combating Accuracy Issues in Biometric Solutions

NIST Tests Supporting Biometric Identification Applications

Put Identity at the Heart of Security

Encryption of Text Using Fingerprints

Ageing Effects in Fingerprint Recognition

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

Discovering Computers Living in a Digital World

Homeschool Enrichment. Input & Output

Design of Biometric Fingerprint Image Enhancement Algorithm by using Iterative Fast Fourier Transform

Fingerprint Authentication for SIS-based Healthcare Systems

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

A quick guide to iris recognition. Click on blue squares to navigate

Computer Security 4/15/18

UltraMatch. Standalone Iris Recognition System

Authentication: Beyond Passwords

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

16F Parkview Tower, Jeongja, Seongnam, Gyeonggi, , Korea T F E

MSc-IT 1st semester Fall

Introduction to Information & Communication Technologies

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

CAS Sign On for Windows

PALMPRINT AUTHENTICATION BASED ON GABOR WAVELET USING SLIDING WINDOW APPROACH

Keystroke Dynamics: Low Impact Biometric Verification

DIGITAL IMAGE PROCESSING APPROACH TO FINGERPRINT AUTHENTICATION

Fingerprint Recognition using Texture Features

Fingerprint Matching using Gabor Filters

A Survey on Security in Palmprint Recognition: A Biometric Trait

Finger Print Enhancement Using Minutiae Based Algorithm

An approach for Fingerprint Recognition based on Minutia Points

IDEX ASA, Annual General Meeting 8/ Ralph W. Bernstein CEO/CTO

PALM VEIN TECHNOLOGY

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Biometric Technologies Signature

234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004

MORPHOSMART CBM SERIES

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

Fingerprint Recoginition for user Authentication to Implement ATM Security

Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System

A Contactless Palmprint Recognition Algorithm for Mobile Phones

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Hand-based biometrics and Signature Verification

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

Local Correlation-based Fingerprint Matching

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Sample images can be independently regenerated from face recognition templates

Fingerprint Verification applying Invariant Moments

ROAR, the University of East London Institutional Repository:

Transcription:

Human Identification Using Biometry

by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional.

Fundamentals of Biometrics

Biometry Definition Generic therm that describes a characteristic or a process As a characteristic......refers to a biological or behavioral measure that can be used for automated recognition.

Biometry Definition Generic therm that describes a characteristic or a process As a process......relates to methods of automated recognition of the individual measures based on biological and behavioral characteristics Source: NSTC Biometrics Glossary

Behavioral Traits Speak Walk Signature/Scribbling

Behavioral Traits - Others Digital Fingerprint Palm Hand Geometry Veins Face Iris DNA

Behavioral Traits - Others Thermograph y Brain Waves Cardiac Sounds Odor Skin Texture

History 60 s - Physiology of speech production; - Semi-automatic face recognition; - Automatic fingerprint recognition; - Automatic signature recognition; 70 s - Behavioral components of speech; - Semi-automatic face recognition; - Automatic fingerprint recognition; - Automatic signature recognition; 80 s - Development of Continuous Assistance; - Iris recognition concept; - Standards for the exchange of fingerprints; - Face recognition new methods.

History 90 s - Support of Government (Biometric Consortium US); - Iris recognition; - Face recognition FERET Commercial Systems; - Palm print recognition; - Forensic DNA databank; - IAFIS FBI (face & fingerprints) 2000 - Search methods (Vins, FRGC, iris patent); - Applications; - Rules and institutions support (Universities, ISO/IEC)

Desirable Biometrics Characteristics - Universality; - Uniqueness; - Permanency; - Collectability; - Performance; - Acceptance; - Resistance to counterfeiting

Biometric Recognition Patterns Fingerprints

Topics - Identification X Verification; - Fingerprint; - Image Capture; - Image Processing; - Fingerprint Differences; - Indexing; - Usage; - Examples; - Neokoros Technology Differentials

Identification (1 to n) (1:N) 1 Subject provides biometric trait; 2 The system searches on biometric database; 3 The system identifies subject Copyright 2002 2013 Neokoros Brazil Ltd

Verification (1 to n) (1:N) 1 Subject provides previous identification; 2 Subject provides biometric trait; 3 The system checks biometric pattern. Copyright 2002 2013 Neokoros Brazil Ltd

A F I S Automated Fingerprint Identification System Automated Fingerprint Identification System

Fingerprint - Formed by papillae of the skin (finger); - Unique and persistent; - Papillae have ends and bifurcations; - Singularities: cores and deltas

AFIS Stages

AFIS Stages Capture Image 3 - Several different technologies devices - FBI 500 DPI - Divided in millions of pixels (picture elements); - Each pixel is a sensor detecting the amount of incident light; - Result is a number matrix.

AFIS Stages Capture Image 3 GAM 110 IMAGE CAPTURE Fingerprint reader Digital image (number matrix)

AFIS Stages Image Processing Apply numerical operations on pixel values procing a sharper image 122 101 85 122 65 32 152 125 98 213 125 67 210 160 118 255 220 118

AFIS Stages Extract Minutiae - Find the minutiae (edges, bifurcations and singularities); - For each minutiae calculate papillae direction.

AFIS Stages Register Fingerprints - A set of minutia is represented as numbers and called a template. - Images are not stored. Just the templates. TEMPLATE REGISTER BIOMETRIC DATABASE

AFIS Stages Compare Minutiae

AFIS Stages Compare Fingerprints Differences in Positioning (and oclusion)

AFIS Stages Compare Fingerprints Rotation Differences 110º 140º

AFIS Stages Compare Fingerprints Very Dry Finger

Search 1:N False - Browse sequentially the biometric database - Compare patterns one by one; -Slow to be applied where the flow of people is great; - Strategy is very slow for large databases (2000+ impressions); - Several commercial systems with this standard.

Search 1:N Real Neokoros Divided in two modules (algorithm). Module N : - Able to search and select MILLION samples in tenths of seconds; - Form geometric patterns with the extracted minutiae (triangles); - Perform a biometric search using indexing mechanism for quick search through patterns; - The search returns a list of candidates with the highest level of similarity to the research sample. Copyright 2002 2013 Neokoros Brazil Ltd

Search 1:N Real Neokoros Find matching geometric patterns

Search 1:N Real Neokoros K Module - Detailed analysis of each candidate fingerprint to determine any matching with the researched fingerprint; - Consider the maximum possible rotation, the minutiae displacement and other measurable parameters; - Calculate a comparison score; - Inform about the highest score fingerprint; - Can use any algorithm based on a 1:1 minutiae - Currently we re using Neurotechnologija and or Testech for verification. Both ranked two of four bests algorithms in the world according 2004 FVC (Fingerprint Verification Competition 2004).

Search 1:N Real Neokoros Process/Show Results When a fingerprint is found, fetch data associated with subject This action is relevant to the kind of application. Examples: - Show subject name - Activate door, turnstile, locks; - Register passage; - Allow access to a software. Copyright 2002 2013 Neokoros Brazil Ltda.

Technology Practical Usage - General public service - Industries - Commercial enterprises; - Services enterprises; - Commercial or residential buildings; - Clubs and recreation centers; - Schools; - Ports; - Banks and financial institutions - Public safety; - Airports - Universities; - Theaters; - Thematic parks -Hospitals and health centers - Credit card operators; - Food tickets enterprises Copyright 2002 2013 Neokoros Brazil Ltd.

Technology Practical Usage...or any application requiring human recognition in real time.

Differential -Clustering support; - Supports mirroring; - Self learning; - Proprietary file format with AES encryption; - Uses TCP/IP as native protocol to SDK; - Easy to use, based in events: (no biometric knowledge needed by users); - Biometric system runs as service or application in Windows and Linux; -Stable software (24/7 without interruptions); - VEIA Very Enhanced Images Algorithm improves fingerprint quality for children and elderly

Neokoros X Neurotechnologija

Thank You. Neokoros Brazil Ltd. Rua 86 N 455 Setor Sul Cep 74083-385 Goiânia-GO 55 62 3541-3230 www.neokoros.com info@neokoros.com