52
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

  • Upload
    dothien

  • View
    217

  • Download
    2

Embed Size (px)

Citation preview

Page 1: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

An Overview of Biometrics

Dr. Charles C. Tappert

Seidenberg School of CSIS, Pace University

Page 2: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

What are Biometrics?

Biometrics refers to identification of humans by their characteristics or traits Physical traits

Fingerprint, Face, Iris Behavioral traits

Signature/handwriting, Voice Keyboard and mouse input

Websites and videos http://www.biometrics.gov/ Biometric Security

Page 3: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Technologies Used in Biometrics

Pattern Recognition Machine Learning Artificial Intelligence Data Mining

Beer and Diapers Target Figured Out A Teen Girl Was Pregnant

Before Her Father Did

Page 4: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Pattern RecognitionWhat is pattern recognition?

The act of taking in raw data and taking an action based on the “category” of the pattern

We gain an understanding and appreciation for pattern recognition in the real world – visual scenes, noises, etc. Human senses: sight, hearing, taste, smell, touch

Recognition not an exact match like a password

Page 5: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Pattern RecognitionAn Introductory Example

“Sorting incoming Fish on a conveyor according to species using optical sensing”

Sea bassSpecies

Salmon

Page 6: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Set up a camera and take some sample images to extract features Length Lightness Width Number and shape of fins Position of the mouth, etc…

Pattern RecognitionProblem Analysis

Page 7: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Preprocessing Segment (isolate) fishes from one another and

from the background

Feature Extraction Reduce the data by measuring certain features

Classification Divide the feature space into decision regions

Pattern RecognitionPattern Classification System

Page 8: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and
Page 9: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Initially use the length of the fish as a possible feature for discrimination

Pattern RecognitionClassification

Page 10: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and
Page 11: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

The length is a poor feature alone!

Select the lightness as a possible feature

Pattern RecognitionFeature Selection

Page 12: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and
Page 13: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Adopt the lightness and add the width of the fish to the feature vector

Fish xT = [x1, x2]

Lightness Width

Pattern RecognitionFeature Vector

Page 14: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Pattern RecognitionStraight line decision boundary

Page 15: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Pattern Recognition Stages

Sensing Use of a transducer (camera or microphone) PR system depends on the bandwidth, the

resolution sensitivity distortion of the transducer What A Drone Can See From 17,000 Feet

Preprocessing Segmentation and grouping - patterns should be

well separated and not overlap

Page 16: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Feature extraction Discriminative features Ideally invariant wrt translation, rotation, scale

Classification Use the feature vector provided by a feature

extractor to assign the object to a category

Post Processing Exploit context-dependent information to

improve performance

Pattern Recognition Stages (cont)

Page 17: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

The following sentence has many spelling errors. Right click on a word to get suggested correct spelling choices.

We cant allign teh wonds corektly in htis sentance. On right clicking, most of correct spellings of the

words are listed as first choice. Now, type the sentence above with the spelling

errors into Microsoft Word. Many of the misspelled words are almost

instantaneously auto-corrected.

Pattern RecognitionPost Processing – for example, OCR

Page 18: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Michigan State University Secret Lock

Back to Biometrics

Page 19: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Biometrics Information Sources

The images and material contained here are from:

Guide to BiometricsBolle, Connell, Pankanti, Ratha, and Senior, Springer 2004

and our conference/journal/book publications

Page 20: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

What is Biometrics?

Definition from Bolle, et al. – the science of identifying, or verifying the identity of, a person based on physiological or behavioral characteristics

Note: biometric systems employ pattern recognition (machine learning) technology

Page 21: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Traditional Modes of Person Authentication

Possessions – what you have Keys, passports, smartcards, etc.

Knowledge – what you know Secret information: passwords, etc.

Biometrics – what you are/do Characteristics of the human body and

human actions that differentiate people from each other

Page 22: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Authentication Methods:Examples and Properties

most widely used

Page 23: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Most Common & Other Biometrics

Most Common Other Biometrics

Page 24: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Universality every person has the biometric characteristic

Uniqueness no two persons have the same biometric characteristic

Permanence biometric characteristic invariant over time

Collectability measurable with a sensing device

Acceptability user population and public in general should have no strong

objections to measuring/collecting the biometric

Attributes Necessary to Make a Biometric Practical

Page 25: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

System performance (accuracy)

Computational speed (DNA slow)

Exception handling (difficult to predict)

System cost (high for DNA)

Security (can system be compromised?)

Privacy (data confidentiality)

System Performance and Design Issues

Page 26: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Identification versus Verification

Identification1-of-n

Verificationaccept/reject

Page 27: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Identification versus Verification

Identification1-of-n

Verificationaccept/reject

Page 28: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Acquisition Single 2D image Video sequence 3D image via stereo imaging, etc.

Michigan State University – Anil Jain http://biometrics.cse.msu.edu/Presentations/A

nilJain_FaceRecognition_KU10.pdf

Face Biometric

Page 29: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Acquisition Inked finger impressions, scanners, etc.

Problem – elastic distortion Features

Fingerprint Biometric

Page 30: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Acquisition Offline (static information) – scanned images Online (static and dynamic info) – digitizers

Categories of forger sophistication Zero-effort, home-improved, over-the-shoulder,

professional

Signature Biometric

Page 31: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Acquisition Microphone – inexpensive, ubiquitous

Features from segmented “My name is”

Speech Biometric – Voiceprint

Page 32: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Basic Authentication System Matching Errors

True negative(True Reject)

False negative(False Reject, Miss)

b

False positive(False Accept, False Alarm)

True positive(True Accept, Hit)

w

bw

Pred

icte

d

Actual

FAR

FRR

w = within class (same person), b = between class (different people)

Page 33: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

0 5 10 15 20 25 300

0.05

0.1

0.15

0.2withinbetween

FRRFAR

taccept reject

FAR = False Accept Rate, FRR = False Reject Rate

Basic Authentication System Matching Errors

Page 34: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Receiver Operating Characteristic (ROC) Curve

Low Security/High Convenience (liberal) can be too open

Low Convenience/High Security (conservative) can be too restrictive

FAR = False Accept Rate Requires imposter testing

FRR = False Reject Rate EER = Equal Error Rate

Page 35: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Biometric System Evaluation Types

Technical Evaluation Simulation tests – usual for academic studies

Scenario Evaluation Testing facility that simulates the actual

installation

Operational Evaluation Actual installation testing – most realistic

Page 36: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Typical Error Rates

Page 37: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Biometric Zoo

Sheep Dominant group, systems perform well for them

Goats Weak distinctive traits, produce many False Rejects

Lambs Easy to imitate, cause “passive” False Accepts

Wolves Good at imitating, cause “active” False Accepts

Chameleons Easy to imitate and good at imitating others

Page 38: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Fingerprint Verification

Page 39: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Each person has a unique face?

Face Recognition

Page 40: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

?Query

Face DB

Face Recognition: System

Page 41: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Inspirational Portrait of Individuality

Page 42: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Face Recognition: National Security

Page 43: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Man

Woman

Train

Test

Train

Test

Left Right

Iris Authentication: Data

Page 44: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Biometric Authentication

A robot identifies a suspect, from the movie “Minority Report.”

Page 45: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Speaker Individuality: “My name is …”

Page 46: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Biomouse Fingerprint scanner

DigitalCamera

LCD Pentablet

Microphone

Multi-modality Biometric Authentication

Embeded & Hybrid User Verification system

System that requires user verification

Page 47: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Keystroke Biometrics

Based on idea that generated patterns are unique to individuals and difficult to duplicate

Appeal of keystroke over other biometrics Not intrusive, inexpensive, continual user verification

The keystroke biometric is one of the less-studied behavioral biometrics

Page 48: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Earlier Keystroke Biometric Studies

Most external studies have been on short input of a few seconds Commercial products on hardening passwords

Most Pace University studies have been on long text input of several minutes

This study is unique: soft touch-screen keyboards capture more info than mechanical keyboards Location region of press on individual keys

Area of finger press on individual keys

Page 49: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Importance of Keystroke & Mouse BiometricsContinual Authentication of Computer Users

U.S. DoD wants to continually authenticate all government computer users, both military and non-military DARPA Active Authentication Phase 1

2010 and 2012 – authenticate on desktops/laptops

Requirement – detect intruder within minutes

DARPA Active Authentication Phase 2

2013 and 2015 – authenticate on mobile devices

Requirement – detect intruder within fraction of minute

Authentication of students taking online tests U.S. Higher Education Opportunity Act of 2008

Page 50: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Possible Broader Intrusion Detection Plan Multi-biometric System

Motor control level – keystroke + mouse movement Linguistic level – stylometry (char, word, syntax) Semantic level – target likely intruder commands

Intruder

Keystroke + Mouse

Stylometry

Motor ControlLevel

LinguisticLevel

SemanticLevel

Page 51: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

Verizon Funding – 2015 Reduce UID/Password Dependency

Most people have many UID/Passwords for access Bank accounts, smartphone/computer, social websites, etc.

Location Near Field Communication (NFC)

Near-field communication uses electromagnetic induction between two loop antennas located within each other's near field

Geofencing Uses the global positioning system (GPS) or radio frequency identification (RFID) to

define geographical boundaries

Biometrics Explore the use of several biometrics for use in this problem area

Page 52: An Overview of Biometrics - SEIDENBERG SCHOOL …csis.pace.edu/~lchen/pcap15/2015march-Biometrics.pdfTechnologies Used in Biometrics Pattern Recognition ... System Performance and

DNA Generated Face

New York Times science section article Building a Face, and Case, on DNA – March 2015

http://www.nytimes.com/2015/02/24/science/dna-generated-faces.html?_r=0