Upload
r-balakrishnan
View
225
Download
0
Embed Size (px)
Citation preview
8/9/2019 Biometric Devices Overview
1/58
1
8/9/2019 Biometric Devices Overview
2/58
DEFINITIONBiometrics - (Classical Definition) Identification of living things based on physiological and/orbehavioral characteristicsBiometrics - (ISO Definition) A measurable,physical characteristic or personal behavioral traitused to recognize the identity, or verify the
claimed identity, of an enrollee.Biometric System (ISO Definition) An automatedsystem capable of: capturing a biometric sample from an end user; extracting biometric data from that sample; comparing the biometric data with that contained in
one or more reference templates; deciding how well they match; and indicating whether or not an identification or
verification of identity has been achieved.2
8/9/2019 Biometric Devices Overview
3/58
HISTORY OF BIOMETRICS Used since ma n f irst walk ed up right
We all u se facial recognition on a da ily ba sis We use voice recognition during con vers a tions to
identi fy the other pa rty (e.g. Te le phone) Finger prints hav e been used in f orensics f or over 100ye a rs by p olice investig a torsBab ies registered a t birth using palm/f oot prints
Dental records a nd X-r ay s hav e long been used to identi fydeco mp osed bodiesThe ha nd written sign a ture is a f or m of beh av ior albiometric identi f ica tion
DNA is one of the latest a dva nces used in identi f ica tion
3
8/9/2019 Biometric Devices Overview
4/58
4Your body as password??
8/9/2019 Biometric Devices Overview
5/58
H OW BIOMETRIC DEVICES WORK Withall b iometric s yste ms there a re 3 ste ps :
Da ta Cap ture All biometrics start with a piece of raw analoguedata (e.g. fingerprint, voice sample,face/hand/retina image)
S ign al P rocessing
This raw data is digitized so that computers canprocess itThe computer software extracts the criticalfeatures (e.g. minutiae) and discards those
elements that are irrelevant to making asuccessful comparison (i.e. creates template)
DecisionThe stored and live templates are compared and
if they match (i.e. within set threshold) user willbe accepted5
8/9/2019 Biometric Devices Overview
6/58
6
8/9/2019 Biometric Devices Overview
7/58
BIOMETRIC APPLICATIONSD epending on the application, biometrics can be used for security, privacy, convenience, fraud reduction, or to deliver
enhanced services. Applications include: Physical security and access control (e.g. borders, airports) Computer/Network logins (e.g. laptops with fingerprint
sensors built in) Business transactions (e.g. ATM withdrawals)
Credit and debit card protection Voting Receiving government benefits (e.g. welfare, pension) Healthcare services (e.g. patient I D ) Law enforcement (e.g. drivers licenses, vehicle registration,
smart guns, criminal identification systems) Identification D ocuments (e.g. Visas, passports, SIN cards,
Military/Govt/Corporate I D cards) Registering race horses, research animals, pets and other
wildlife D ata protection (e.g. biometric tokens) 7
8/9/2019 Biometric Devices Overview
8/58
FINGER/THU MB PRINT READERS
Most widely usedMost systems rely on classifyingthe differences between ridgesand valleys in the patterns of the print and at ridge
bifurcations or ridge endings(i.e. minutiae)Produces one of the largesttemplates (aprox 1KByte)depending on the method usedDevices are very reliable in usebut in some cases othertechniques may be requiredSeveral types (e.g. optical,capacitive, ultrasound, RF)
8
8/9/2019 Biometric Devices Overview
9/58
FINGERPRINT (continued)
Finger print ma tching techniq ues ca n be pla ced into two ca tegories : m inutia e -ba sed a nd corre la tion ba sed. Minutia e -ba sed techniq ues f irst f ind minutia e points a nd
then map their re lative pla ce ment on the f inger. Howe ver,
there a re so me diff iculties when using this app roa ch. It is difficult to extract the minutiae points accuratelywhen the fingerprint is of low quality.Also this method does not take into account the
global pattern of ridges and furrows.More subject to wear and tear, and false minutiae.
9
8/9/2019 Biometric Devices Overview
10/58
10
The corre la tion -ba sed method is abl e to overco me so me of the diff iculties of the minutia e -ba sed app roa ch. Howe ver, it ha s so m e of its own shortco mings.
Correlation-based techniques (i.e. patternmatching) require the precise location of aregistration point and are affected by imagetranslation and rotation.Larger templates (often 2 3 times larger than
minutiae-based)
8/9/2019 Biometric Devices Overview
11/58
FINGERPRINT (continued)Intrusive procedureIn 199 7 the stamp-sized fingerprint reader ona microchip was introduced which has led tothe potential for many new applications (e.g.securing smartcards)A much smaller scrolling sensor is nowavailable which has made even moreapplications possible and has addressed someof the security concerns with latent prints
Some more advanced readers can differentiatebetween live and dead tissue by checking for pulse by sensing oxygen level
by checking capacitance of the biometric sample 11
8/9/2019 Biometric Devices Overview
12/58
Issues and Concerns
With Biometrics becoming available, individualscould:
Plant DNA at the scene of a crime
Fool a fingerprint detector with a piece of tape Fool an iris detector with a picture of an eye Break into the system and make a fail code a
pass code
8/9/2019 Biometric Devices Overview
13/58
Matsumoto s Technique
Only a few dollars worth of materials13
8/9/2019 Biometric Devices Overview
14/58
8/9/2019 Biometric Devices Overview
15/58
15
Ha nd geo metr y is a f or m of physio logic al b iometrics tha t uses the sh ap e of the ha nd f or au thentic a tion pu r poses. Va rious tr a its of the ha nd, s uch a s f inger length, width a nd cur va ture, a s we ll a s uniq ue f e a tures may b e used f or identi f ica tion. [1] Ha nd geo metr y
sc a n req uire tha t users pla ce their ha nds onto a s ur face with 5pegs. This al igns the ha nd so tha t the sc a nner ca n get aconsistent re a ding on e a ch sc a n. The sc a n is then co mpa red to the da taba se f or veri f ica tion. A typical sc a n will tak e two pictures of the ha nd : one of the top a nd one of the side.
8/9/2019 Biometric Devices Overview
16/58
16
Ha nd geo metr y is not a u niq ue f or mof biometric sec urity. More tha n one person may hav e the s am e or ver ysimilar ha nd sh ap es. This limits the use fulness of ha nd geo metr y to veri f ica tion, not identi f ica tion.
Comb ining ha nd geo metr y w ith a nother f or m of biometric sec urity, s uch a s f inger print biometrics , would provide a v er y sec ure identi f ica tion s yste m. A s yste m w here ha nd geo metr y wa s used to veri fy the f inger print inpu t would a dd a n a ddition al lay er of sec urity a nd cre a te a v er y e ff ecti ve identi f ica tion s yste m.
8/9/2019 Biometric Devices Overview
17/58
8/9/2019 Biometric Devices Overview
18/58
HOW IT WORKS
Takes snapshot of palm veinsConverts into algorithmCompares with database
18
8/9/2019 Biometric Devices Overview
19/58
AccuracyTECH NOLOGY FALSE ACCEPTANCE RATE FALSE REJECTION RATE
Palm Secure .00008% .01%
Fingerprint 1-2% 3 %
Iris .0001% - . 9 4 % .99 % - .2%
Voice 2% 10%
Vein patterns
Distinctive and unique to individuals, even left and right
hands. Difficult to steal or forgeFalse acceptance rate : A rate at which someone otherthan the actual person is falsely recognized.False rejection rate : A rate at which the actual person isnot recognized accurately. 19
8/9/2019 Biometric Devices Overview
20/58
Practical Application
Portable M ouse
ATM M achine
Palm Secure is now widelyused in various fields. ATM
9 2% of all Japanese ATMs
18,000+ ATM machines for
Bank of Tokyo - Mitsubishi School ID, Entry Key to
private property, Log-in toPCs or servers
Potential is limitless
PalmSecure mouse with abuild-in sensor in 200 7 easily installed to personal
computer.
20
8/9/2019 Biometric Devices Overview
21/58
FACIAL RECOGNITIONConsidered by some as an intrusive systemU ses high resolution cameras (several types) to takepictures of the face for comparisonThe four primary methods traditionally employedby facial scan vendors to identify and verify subjectsinclude eigenfaces, feature analysis, neuralnetwork, and automatic face processingNew systems are being developed that measure
three dimensional characteristics of the faceOne of the fastest growing areas in biometricindustry
21
8/9/2019 Biometric Devices Overview
22/58
FACIAL (continued)Source: MIT Face Recognition Demo Page
S ource : b iometrics.cse. ms u.ed u/ inf o.ht ml
22
8/9/2019 Biometric Devices Overview
23/58
FACIAL (continued)Eigen face : "one's own face, " a techno log y pa tented a t MIT tha t uses 2D global gr ay sc ale ima ges re presenting distincti ve ch a r a cteristics of a fa cial ima ge. Most faces ca n be reconstr ucted by co mb ining f e a tures of 100-125 eigen faces. During enro llment, the user's eigen face is mapp ed to a series of numb ers (coe ff icients). Upon a 1:1ma tch, a "l ive " te mpla te is ma tched a ga inst the enro lled te mpla te to obta in a coe ff icient va ria tion. This va ria tion either a cce pts or rejects the user.
Local F e a ture Analysis (LF A): also a 2 D techno log y, tho ugh m ore capabl e of a cco mm od a ting ch a nges in app e a r a nce or facial a s pect (e.g., s m iling, f rowning). LF A uses dozens of f e a tures f rom diff erent regions of the face; incor por a tes the loc a tion of these f e a tures. Re lative dist a nces a nd a ng les of the "bu ilding bloc ks " of the face a re m e a s ured. LF A ca n a cco mm od a te 25- degree a ng les in the horizont alpla ne a nd 15 degrees in the vertic al pla ne. LF A is a deri va tive of the eigen face m ethod a nd wa s de ve loped by Visionics, Cor p.
23
8/9/2019 Biometric Devices Overview
24/58
FACIAL (continued) Automa tic Fa ce P rocessing ( AFP ): This 2D techno log y u ses dist a nces a nd dist a nce r a tios bet ween e yes, nose, a nd corners of m outh. Not a s robu st a s the other techno logies, bu t may b e more aff ecti ve in dimly l it, f ront al ima ge cap ture sit ua tions.
Neur al Net wor ks : use algorith ms tha t use a s mu ch
of the face a s possi ble. These algorith ms r un a s the huma n br a in would in cognition to le a rn ab out facial f e a tures. Ne ur al net wor ks a re a ste p up f romLF A.
24
8/9/2019 Biometric Devices Overview
25/58
FACIAL (continued) New Volum etric -ba sed 3D P rocessing Sy ste ms : Cre a te a
te mpla te of the face tha t is ba sed on tens -of-tho us a nds of points on the face, thus f or ming a v er y high -reso lution inter pret a tion of the s ub ject.
A 3D laser cam er a tak es a p icture of the face a nd re presents it within a v irtual cub e. The input starts as a digital image and does notneed to be converted
The secret to a tr ue 3D method lies in the ab ility to use direct me a s ure ments to co mpa re individual s.
That is, rather than the traditional method of anindirect search for facial features on an image,these systems look at specific points within a
millimeter apart.. 25
8/9/2019 Biometric Devices Overview
26/58
Eye biometricRetina:
back inside of the eye ball.
pattern of blood vesselsused for identification.
Iris:
coloured portion of theeye surrounding the pupil.
complex iris pattern used
for identification. 26
8/9/2019 Biometric Devices Overview
27/58
RetinaThe retina is a thin layer of ce lls a t the ba ck of the e ye ballof verte br a tes.It is the pa rt of the e ye which con verts light into ner vous sign als.The retin a cont a ins photorece ptor ce lls (rods a nd cones) which recei ve the light; the res ulting ne ur al sign als then
undergo co mpl ex processing by other ne urons of the retin a , a nd a re tr a ns f or med into a ction potenti als in retin alga ng lion ce lls whose a xons f or m the optic ner ve. The retin a not on ly detects light, it also play s a signi f ica nt pa rt in visual p erce ption.
In e mb r yonic de ve lopm ent, the retin a a nd the optic ner ve origin a te a s outgro wths of the br a in.The uniq ue str ucture of the blood vesse ls in the retin a ha s been used f or biometric identi f ica tion.
27
8/9/2019 Biometric Devices Overview
28/58
II. Retina recognition
The pattern of blood vessels that emanatefrom the optic nerve and disperse throughoutthe retina depends on individuals and neverchanges.No two retinas are the same, even in identicaltwins.Commercial products: Retinal Technologies
28
8/9/2019 Biometric Devices Overview
29/58
RETINA SCANNERSRely on the uniqueness of the pattern of bloodvessels lining the retinaU sers place their eyes a few inches from anincandescent light beam and the sensor maps thecapillary pattern by measuring reflected lightPeople with high blood pressure, diabetes orglaucoma may give inconsistent readingsTemplate aprox 35 Bytes and extremely reliablePrimary use is in high security access control
29
8/9/2019 Biometric Devices Overview
30/58
RETINA SCANNERS (continued)
CameraCamera Enrollment deviceEnrollment device
Source: Biometrics Store Website
3 0
8/9/2019 Biometric Devices Overview
31/58
RETINA SCANNERS (continued)
Main retina featuresMain retina features Actual photo of retinaActual photo of retina
Source: American Academy of Ophthalmology
3 1
8/9/2019 Biometric Devices Overview
32/58
3 2
Iris sc a ns off er so me ma r ked imp rove ment over retin al sc a ns. The iris ha s a m esh -like text ure with ma ny over lays tha t prod uce cr ypts, furro ws, ridges, stri a tions, a nd other uniq ue ch a r a cteristics tha t over all p rovide auniq ue blu e print of the iris. Un like retin a s, which ca n ch a nge with a ge due to dise a ses
s uch a s diab etes or glau co ma , the iris does not ch a nge during a p ersons lif etime.
8/9/2019 Biometric Devices Overview
33/58
33
Iris recognition is beco ming ver y p opula r in sec urity appl ica tions bec au se of its e a se of
use, a cc ur a cy, a nd s af et y bu t also bec au se the techno log y on ly tak es a f e w seconds to de liver res ults, where a s DNA or f inger print identi f ica tion will tak e wee ks or e ven months. An iris pa ttern is extre me ly a cc ur a te bec au se it uses more tha n 240 p oints of re f erence in a ba sis f or a ma tch where a s af inger print on ly u ses se ven to 24re f erences. We a ring glasses or cont a ct
lenses does not ch a nge or aff ect the ima ging res ults or the identi f ica tion process. Ma nya ir ports a nd schoo ls a re testing the iris sc a n a s a pa rt of their sec urity s yste ms.
8/9/2019 Biometric Devices Overview
34/58
IRIS SCANNERSH igh resolution cameras capture image from up to 3 feet away (usually 10 to 12 inches)Converts picture of the distinctive fibers, furrows,flecks, crypts, rifts, pits and coronas of the iris into abar-code like identifierTemplate around 2 56 Bytes in sizeH uman iris is distinct with 2 5 0 differentiating featuresThe recognition of irises by their IrisCodes is basedupon the failure of a test of statistical independence. Any given IrisCode is statistically guaranteed to pass a test
of independence against any IrisCode computed from adifferent eye; but it will uniquely fail this same test againstthe eye from which it was computed. Thus the key to irisrecognition is the failure of a test of statisticalindependence.
34
8/9/2019 Biometric Devices Overview
35/58
Iris properties
Iris pattern possesses a high degree of randomness:extremely accurate biometric.Genetically independent: identical twins havedifferent iris pattern.Stable throughout life.H ighly protected, internal organ of the eye.
Patterns can be acquired from a distance (1m).Patterns can be encoded into 2 56 bytes.
35
8/9/2019 Biometric Devices Overview
36/58
IRIS (continued)Idea for iris scanning has been around since 1 9 36Processing time is very quick (less than 2 secs)Does not use any special beams or lighting insteaduses a camera with a high quality lens
Works well with people wearing contact lenses orglasses and at night with normal lightingAdvances in refractive and cataract surgery andcornea transplants don't change iris aspects
Note: New contact lenses with artificial iris patterns, etc. have potential to defeat these systems, however, security mechanismscan be built in to protect against these attacks (i.e. performliveness tests) 36
8/9/2019 Biometric Devices Overview
37/58
IRIS (continued)
Condo miniumresidents in Tokyo ga in entr y to the bu ilding by their iris
pa tterns, a nd the e le va tor is au toma ticallycalled a nd
progr amm ed to bring the m to their residenti al floor.
S ource : b iometrics.cse. ms u.ed u/inf o.ht ml37
8/9/2019 Biometric Devices Overview
38/58
IRIS (continued)Freq uent Flyers a t S chi pho l Air port (NL) may enro ll in the "Privium" p rogr amm e,
en abl ing the m to enter The Nether lands witho ut pa ss port present a tion. Inste a d the y a re recognised bya n iris cam er a , av oiding lines a nd de lays a t Imm igr a tion Contro l.
S ource : b iometrics.cse. ms u.ed u/ inf o.ht ml
3 8
8/9/2019 Biometric Devices Overview
39/58
I. DNADNA has been called the ultimate identifier
Identify information from every cell in the body in adigital formN ot yet fully automated, not fast and expensiveTheoretical limitation: Identical twins have the same
DNAP rivacy issue DNA contains information about race,
paternity, and medical conditions for certain disease
3 9
8/9/2019 Biometric Devices Overview
40/58
DNA TESTINGPerhaps the ultimate identifier (what about
twins/clones?) Recent cloning experiments raise questions about itssuitability as a unique identifier
Identical twins have identical DNA
Obviously very intrusiveNot practical for everyday authentication orverification, only for very high stakes situations Criminal forensics
PaternityProcess is currently not automatedTime intensive Process takes from 2- 4 hours
4 0
8/9/2019 Biometric Devices Overview
41/58
4 1
How D NA recognition works?The ce lls tha t cont a in DNA sh a re genetic
ma teri al ( inf or ma tion) thro ugh chro moso mes. Huma ns hav e 23 chro moso mes tha t ho use apersons DNA a nd their genes. Of the 46 totalchro moso mes, 23 co me f rom e a ch pa rent of a n off s pring. 99 .7% of a n off s prings DNA is sh a red with their pa rents. The re ma ining .3% of a n individual s DNA is va riabl e re petitive coding uniq ue to a n individual . This re petitive coding is the ba sis of DNA biometrics. DNA
recognition uses genetic prof iling, also called genetic f inger printing, to iso late a nd identi fythese re petitive DNA regions tha t a re uniq ue to e a ch individual to either identi fy or veri fy apersons identit y.
8/9/2019 Biometric Devices Overview
42/58
VOICE VERIFICATIONA completely non-intrusive techniqueExamines tonal wave patterns that cannot beimitated by other individuals (voice patterns of impersonators are different than the real voicepattern)Analog recordings cannot reproduce accurate tone
patterns, but digital recordings may be able to do so Random question and answer techniques, and patternmatching (i.e. comparing successive voice samples)may help to prevent reply attacks based on digitalvoice recordings
Most appropriate method for telephone use
People with colds & laryngitis can affect FRR although slight variations can be compensated forSignal quality can introduce errors (e.g. bad phoneline, noise in background)
4 2
8/9/2019 Biometric Devices Overview
43/58
VOICE VERIFICATION (continued)
It is these well-formed, regularpatterns that are unique toevery individual. These patternsare created from the size andshape of the physical structure
of a person's vocal tract. Sinceno two vocal tracts are exactlythe same, no two signalpatterns can be the same.
A complete signal has anoverall pattern, as well as amuch finer structure, calledthe frame. This frame is theessence of voice verificationtechnology.
8/9/2019 Biometric Devices Overview
44/58
VOICE VERIFICATION (continued)These unique featuresconsist of cadence,pitch, tone, harmonics,and shape of vocal tract.
The image at right shows howcharacteristics of voiceactually involve much
more of the body than just the mouth.
44
8/9/2019 Biometric Devices Overview
45/58
8/9/2019 Biometric Devices Overview
46/58
SIGNATU RE ANALYSIS (continued)Bu ilt-in sensors register the dynam ics of the a ct of writing. These dynam ics
inc lude the 3D-f orces tha t a re appl ied, the s peed of writing, a nd the a ng les in va rious directions.
This signing pa ttern is uniq ue f or e a ch individual , a nd thus allows f or strong au thentic a tion. It al so protects a ga inst f r au d since it is pr a ctic ally imp ossi ble to dupl ica te "ho w" so meone signs.
Source: Biometrics Store Website and Smart Pen
46
8/9/2019 Biometric Devices Overview
47/58
KEYSTROKE DYNAMICS
These devices sample typing patterns up to onethousand times per second and continuously keeptrack of the speed, sequence and rhythm of a userstyping
Both NIST and the National Science Foundationstudies have shown that typing patterns are uniqueVerification occurs seamlessly as the person typesStill in research and development phase
User typing pa tternSp eedP ress a nd Re le a se Ra teUnique pa tterns a re gener a tedcompa risons
47
8/9/2019 Biometric Devices Overview
48/58
8/9/2019 Biometric Devices Overview
49/58
IX. Body odor
Its absolutely clear that people withdiffering immunity genes producedifferent body odors
E lectronic/artificial noses: developed asa system for the automated detection andclassification of odors, vapors, gases.
P rometheus ( A lpha Mos) ,an example of electronicnose
Schematic Diagram of Artificial nose
A rtificial nosesare not yetsophisticatedenough to do all
the job 4 9
8/9/2019 Biometric Devices Overview
50/58
VI. Ear recognition
Ea r geo metr y recognition uses the sh ap e of the e a r to per f or midenti f ica tion Su ggestions hav e been ma de tha t the sh ap es a nd ch a r a cteristics of the huma n e a r a re wide ly diff erent
An inf r a red ima ge ca n be used to e limina te ha ir Might be recognized a t adist a nce
5 0
8/9/2019 Biometric Devices Overview
51/58
5 1
in the future your e a r may b eco me your ne wpa ss word? A ltho ugh recent ly re ports hav e st a rted to
discredit e a r imp rints a s a val id f or m of biometric identi f ica tion there is a nother a s pect of the e a r tha t see ms to be uniq ue to individual s. Mammal ia n, a nd hence huma n, e a rs e mit noises in res ponse to
cert a in types of au dio stimul i; these e mitted noises, called optoa co ustic e missions (O AE), may b e used to disting uish individual s bec au se the y a re tho ught to be uniq ue.
8/9/2019 Biometric Devices Overview
52/58
VII. Skin reflection
Lumidigm Inc. has established that the absorptionspectrum of the skin depends on the individuals.
In a range of wavelengths over 6 mm patch,several LEDs send light into the skin, andphotodiodes read the scattered light, which isanalyzed to perform the authentication.
5 2
8/9/2019 Biometric Devices Overview
53/58
VIII. Lip motion
Compa res the ch a r a cteristic lip m otions of peo ple while the y s pe ak .
He lps identi f ica tion a ssoci a ted with s pe ak er recognition.
Diff erent ima ging conditions : Inf r a red (high sec urity & cost) a nd Ne a r Inf r a red (che ap , nor mally u sed f or a ctive sensing)
53
8/9/2019 Biometric Devices Overview
54/58
54
8/9/2019 Biometric Devices Overview
55/58
NEGATIVE ISSU ES
Some opthamologists warn that a simple retina scancould indicate that a person has AIDS or uses drugs,which may have severe privacy impactThe prospect of interoperable networked databases of
biometric data raises concerns that our templates canbe bought and sold like SIN and credit card numbers,but unlike those, we cannot change our biometriccharacteristics if they become compromisedBelief that biometric systems are way to difficult andexpensive to implementFears that criminals, etc., will cut off victim s fingersand hands or take out eyeballs to defeat systemsbased on these technologies
55
8/9/2019 Biometric Devices Overview
56/58
NEGATIVE ISSU ESIn any large scenario some portion of the general
population is likely to be physiologically unable to useone or more techniqueCertain cultures and religions prohibit or look withgreat disfavor upon photographing of individuals.One of the most frightening concerns is that thesesystems will be used to constantly track us asindividuals by govt., police, etc.People value their privacy and fear this technology willinhibit their ability to preserve their anonymity whileundertaking certain transactions (e.g. buying XXXvideos)Biometrics may lead to personal profiling bymarketing and other groups
56
8/9/2019 Biometric Devices Overview
57/58
REFERENCES
8/9/2019 Biometric Devices Overview
58/58
REFERENCES http://www .biometrics.org
http://www .biometricid f or um .org /www.recogs ys.co mwww.irisc a n.co mwww.inf osec urityma g.co m
http:// ioso f twa re.co mwww.biodigest.co mwww.biometritech.co mwww.ibia .org
http://www .n a tion alb iometric.org / http://www .biometrics.dod. mil/ http://www .biometricgro up .co m/ http://www .s peechtech ma g.co m/