30
Biometric Biometric Technologies Technologies Introduction to Biom etrics FingerprintRecognition Eye – Retinal orIris Recognition Dynam ic Signature Face Recognition Sum m ary ofBiom etrics Team 3: Team 3: Steven Steven Golikov Golikov Barbara Barbara Edington Edington Melanie Melanie Johnson Johnson Bashir Amhed Bashir Amhed

Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Embed Size (px)

Citation preview

Page 1: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Biometric TechnologiesBiometric Technologies

Introduction to Biometrics Fingerprint Recognition

Eye – Retinal or Iris Recognition Dynamic Signature

Face Recognition Summary of Biometrics

Team 3:Team 3:Steven GolikovSteven Golikov

Barbara EdingtonBarbara EdingtonMelanie JohnsonMelanie Johnson

Bashir AmhedBashir AmhedBorming ChiangBorming Chiang

Page 2: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Introduction to BiometricsIntroduction to Biometrics

History of BiometricsHistory of BiometricsBiometrics is the study of biological “data”Biometrics is the study of biological “data”Biometrics has a very long traditionBiometrics has a very long tradition The Egyptians used the length of a person’s forearm to The Egyptians used the length of a person’s forearm to

determine their identification for wage paymentdetermine their identification for wage payment There are many different biometrics used for identification:There are many different biometrics used for identification:

FingerprintsFingerprintsEye – Retinal or IrisEye – Retinal or IrisFacial RecognitionFacial RecognitionVoiceVoiceSignatureSignatureDentalDentalDNADNAwww.biometricscatalog.orgwww.biometricscatalog.org

Page 3: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Iris and Retinal ScanningIris and Retinal Scanning

The Basics of Human EyeThe Basics of Human Eye

RationalesRationales

How do the Technologies Work?How do the Technologies Work?

ApplicationsApplications

Performance MetricsPerformance Metrics

Pros and ConsPros and Cons

Commercial ProductsCommercial Products

Page 4: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

The Basics of Human EyeThe Basics of Human EyeIris –

•The Shutter of our biological camera

•The plainly visible colored ring underneath cornea.

•Iris surrounds the pupil

•A muscular structure which controls the amount of light entering into the eye, and it has very intricate details such as colors, striations, pits and furrows.

Retina –

•The film of the camera

•Located in the back of the eye where the Optic nerve connects.

•The blood vessels pattern in the retina are unique to each individual. Source: http://www.stlukeseye.com/Anatomy.asp

Page 5: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Rationales for UseRationales for UseIris contains intricate details such as striations, pits and furrows.

Two Iris’s are not alike. There is no detailed correlation between the patterns of identical twins or even between the left and right eye of the same individual.

Expressed by the Individual’s Phenotype, Not Genotype

The patterns of blood vessels in the retina is extremely unique to individuals.

There is no detailed correlation between the patterns of identical twins or even between the left and right eye of the same individual.

Source of images: http://www.cl.cam.ac.uk/users/jgd1000/

Iris Collage

Retinal Image - Twin 1 Retinal Image -Twin 2

Page 6: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

How does Iris Recognition Works?How does Iris Recognition Works?

A picture of the eye is taken from within 1< meter A picture of the eye is taken from within 1< meter distance and Iris portion is extracteddistance and Iris portion is extractedAn Iris code of 512 Bytes is generated using An Iris code of 512 Bytes is generated using functions called 2-D wavelets. functions called 2-D wavelets. This code is unique This code is unique to one eye of one individual.to one eye of one individual.Iris code is then compared to other Iris codes that are Iris code is then compared to other Iris codes that are stored in the databasestored in the database

Source of images: http://www.iridiantech.com/

Page 7: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

History of Iris RecognitionHistory of Iris Recognition

•1936 – Idea proposed by ophthalmologist Frank Burch1936 – Idea proposed by ophthalmologist Frank Burch1949 - The idea documented in an ophthalmology 1949 - The idea documented in an ophthalmology

textbook by James Doggartstextbook by James Doggarts

1980's - The idea had appeared in 1980's - The idea had appeared in James Bond filmsJames Bond films, , but it still remained science fiction and conjecture.but it still remained science fiction and conjecture.

1987 - two ophthalmologists, Aran Safir and Leonard 1987 - two ophthalmologists, Aran Safir and Leonard Flom, patented this ideaFlom, patented this idea

1989 - John Daugman (then teaching at Harvard 1989 - John Daugman (then teaching at Harvard University) try to create actual algorithms for iris University) try to create actual algorithms for iris recognitionrecognition

John Daugman algorithms patented in 1994, are the John Daugman algorithms patented in 1994, are the basis for all current iris recognition systems and basis for all current iris recognition systems and productsproducts

Page 8: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Commercial Applications -IrisCommercial Applications -IrisThe major applications of this technology so far have been:

•Aviation security and controlling access to restricted areas at airports

London Heathrow, Amsterdam Schiphol, Frankfurt, Athens, and several Canadian airports, Charlotte/Douglas International Airport in North Carolina

•Database access and computer login•Access to buildings and homes •Hospital settings, including mother-infant pairing in maternity wards•Border control "watch list" database searching at border crossings

On the Pakistan Afghanistan border, the United Nations High Commission for Refugees uses these algorithms for anonymous identification of returning Afghan refugees receiving cash grants at voluntary repatriation centres

•Other law enforcement agency programs such Jail SecurityPrisoner Identification – 1994 - Prisoner Identification – 1994 - Lancaster County Prison in Pennsylvania became the first correctional became the first correctional facility to employ the technology.facility to employ the technology.

Page 9: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Performance ComparisonPerformance Comparison

Method Coded PatternMisidentification

rateSecurity Applications

Iris/Retinal Recognition

Iris code / Blood vessel pattern

1/1,200,000 HighHigh-security

facilities

Fingerprinting Fingerprints 1/1,000 Medium Universal

Hand ShapeSize, length and

thickness of hands

1/700 LowLow-security

facilities

Facial Recognition

Outline, shape and distribution of eyes and nose

1/100 LowLow-security

facilities

SignatureShape of letters,

writing order, pen pressure

1/100 LowLow-security

facilities

VoiceprintingVoice

characteristics

1/30 LowTelephone

service

Source: AIM Japan, Automatic Identification Seminar, Sept.14, 2001

Page 10: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Pros and ConsPros and ConsIris ScanningIris Scanning

The uniqueness of Irises, even The uniqueness of Irises, even between the left and right eye of between the left and right eye of the same person, makes iris the same person, makes iris scanning very powerful for scanning very powerful for identification purposes. identification purposes.

The likelihood of a false positive is The likelihood of a false positive is extremely low and its relative extremely low and its relative speed and ease of use make it a speed and ease of use make it a great potential biometric. great potential biometric.

The only drawbacks are the The only drawbacks are the potential difficulty in getting potential difficulty in getting someone to hold their head in the someone to hold their head in the right spot for the scan if they are right spot for the scan if they are not doing the scan willingly. not doing the scan willingly.

Retina ScanningRetina ScanningRetina scan devices are probably Retina scan devices are probably the most accurate biometric the most accurate biometric available today. The continuity of available today. The continuity of the retinal pattern throughout life the retinal pattern throughout life and the difficulty in fooling such a and the difficulty in fooling such a device also make it a great long-device also make it a great long-term, high-security option.term, high-security option.

The high cost of the proprietary The high cost of the proprietary hardware as well as the inability to hardware as well as the inability to evolve easily with new technology evolve easily with new technology make retinal scan devices a bad fit make retinal scan devices a bad fit for most situations. for most situations.

It also has the stigma of It also has the stigma of consumer's thinking it is potentially consumer's thinking it is potentially harmful to the eye, andharmful to the eye, and in in general, not easy to use.general, not easy to use.

Page 11: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Commercial Products and VendorsCommercial Products and Vendors

Iris scanning (very accurate, expensive)

Argus Solutions (Australia) http://www.argus-solutions.com Aurora Computer Services Ltd (Northampton, U.K.) Eye Ticket Corp. (Virginia, U.S.A.) Iridian Technologies [(formerlyIriScan, Inc.) Marlton, NJ, U.S.A. and Geneva, Switzerland Saflink (Redmond, WA, U.S.A.)]

Retinal scanning (very accurate, very expensive) - Retinal is more intrusive than iris recognition.

Eyedentify, Inc. (Delaware, U.S.A.) Microvision, Inc. (WA, U.S.A.) (RSD = Retinal Scanning Display) Retinal Technologies, Inc. (MA, U.S.A.)

Page 12: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Face RecognitionFace Recognition

Background Background

AlgorithmsAlgorithms

FERET/FRVTFERET/FRVT

ResearchResearch

Commercial ProductsCommercial Products

Page 13: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Face Recognition: The BasicsFace Recognition: The Basics

In simplistic form, In simplistic form,

A A signature is createdsignature is created from a sensor’s from a sensor’s observationobservation

An An algorithm normalizesalgorithm normalizes the signature the signature

A A matcher comparesmatcher compares the normalized structure the normalized structure to the database.to the database.

Page 14: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

The AlgorithmsThe Algorithms

EigenfacesEigenfaces Standard Principle Components Analysis (PCA)Standard Principle Components Analysis (PCA)

PCA & LDAPCA & LDA LDA: Linear Discriminant AnalysisLDA: Linear Discriminant Analysis Combination based on the University of Maryland algorithm Combination based on the University of Maryland algorithm

tested in FERET.tested in FERET.

BaysianBaysian An Intrapersonal/Extrapersonal Image Distance Classifier based An Intrapersonal/Extrapersonal Image Distance Classifier based

on the MIT algorithm tested in FERET.on the MIT algorithm tested in FERET.

Elastic Bunch GraphingElastic Bunch Graphing Based on the USC algorithm tested in FERETBased on the USC algorithm tested in FERET Uses localized landmark features represented by Gabor jetsUses localized landmark features represented by Gabor jets

Page 15: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Elastic Bunch GraphingElastic Bunch Graphing

Page 16: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

FERET and FRVTFERET and FRVT

FERETFERET DARPA and Army Research LaboratoryDARPA and Army Research Laboratory 1994-19961994-1996 A unified means of testing algorithms for easier A unified means of testing algorithms for easier

comparisoncomparison

FRVTFRVT Designed by Govt and Law enforcement agenciesDesigned by Govt and Law enforcement agencies 2000 and 20022000 and 2002 Tested ability to compare images to those stored in a Tested ability to compare images to those stored in a

databasedatabase Females and younger people were harder to Females and younger people were harder to

recognizerecognize

Page 17: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Current ResearchCurrent Research

3-D morphable models3-D morphable models Not as affected by lighting and pose as is 2-DNot as affected by lighting and pose as is 2-D MERL (Mitsubishi) and Ohio State UMERL (Mitsubishi) and Ohio State U Identical twin Israeli studentsIdentical twin Israeli students

Created a 3-D scanner that uses light to scan the imageCreated a 3-D scanner that uses light to scan the imageAlgos measure the distances between points and compare to Algos measure the distances between points and compare to database imagesdatabase images

FactorsFactors False positivesFalse positives Privacy issuesPrivacy issues Environment – lighting, movement, etcEnvironment – lighting, movement, etc

Page 18: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Commercial ProductCommercial Product

FaceIT (from Visionics / Identix)FaceIT (from Visionics / Identix) $100 $100 Developed from an algorithm out of Rockefeller Developed from an algorithm out of Rockefeller

UniversityUniversity

Viisage Viisage From MIT algorithm based on eigenfacesFrom MIT algorithm based on eigenfaces

TrueFace (from Miros then acquired by Sol TrueFace (from Miros then acquired by Sol Universe) Universe) FaceOK – (from Titanium Technology)FaceOK – (from Titanium Technology) $89$89 PC user securityPC user security

Page 19: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Introduction to Fingerprint Introduction to Fingerprint RecognitionRecognition

Fingerprint is the most referred biometric mechanism Fingerprint is the most referred biometric mechanism used today.used today.

Fingerprint has the uniqueness feature – the studies Fingerprint has the uniqueness feature – the studies shows that chance of same fingerprint between two shows that chance of same fingerprint between two individuals (even in twins) is one in one billion.individuals (even in twins) is one in one billion.

Fingerprint has been widely adopted (low cost) for Fingerprint has been widely adopted (low cost) for authentication, identification and criminal authentication, identification and criminal investigation.investigation.

Page 20: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Uniqueness of FingerprintUniqueness of Fingerprint

Fingerprint is unique because of the two distinct featureFingerprint is unique because of the two distinct feature PersistencePersistence – the basic characteristic of fingerprint – the basic characteristic of fingerprint

do not change in time.do not change in time. IndividualityIndividuality – one over 1 billions !! – one over 1 billions !!

Fingerprints are comprised of various types of ridge Fingerprints are comprised of various types of ridge patterns: left loop, right loop, arch, whorl and tented patterns: left loop, right loop, arch, whorl and tented arch. arch.

The discontinuities that interrupt these smooth ridge The discontinuities that interrupt these smooth ridge patterns are called patterns are called MinutiaMinutia. Minutiae are essentially . Minutiae are essentially terminations and bifurcations of the ridge lines that terminations and bifurcations of the ridge lines that constitute a fingerprint pattern constitute a fingerprint pattern

Page 21: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Fingerprint Fingerprint Capturing and AnalysisCapturing and Analysis

Fingerprint MatchingFingerprint Matching Minutae-based Minutae-based Correlation based - Correlation based - requires precision location requires precision location

of registration pointof registration point

Fingerprint ClassificationFingerprint ClassificationThe technique to assign a fingerprint into one of The technique to assign a fingerprint into one of

the several pre-specified types already established with the several pre-specified types already established with indexing mechanism indexing mechanism Fingerprint EnhancementFingerprint Enhancement

It is essential to incorporate a fingerprint It is essential to incorporate a fingerprint enhancement algorithm with respect to the quality of the enhancement algorithm with respect to the quality of the fingerprint images in the minutiae extraction module in fingerprint images in the minutiae extraction module in order to ensure the accuracy of automatic fingerprint order to ensure the accuracy of automatic fingerprint identification/verificationidentification/verification

Page 22: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

The Identification Workflow of The Identification Workflow of Fingerprint Device Fingerprint Device

Page 23: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

DemonstrationDemonstrationIdentix BioTouch® 200 USB Identix BioTouch® 200 USB

Fingerprint ReaderFingerprint Reader Hardware - Hardware - BioTouch® 200 USB BioTouch® 200 USB Fingerprint ReaderFingerprint Reader

Software - BioLogon Software - BioLogon for Windowsfor Windows

Page 24: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Dynamic Signature Dynamic Signature VerificationVerification

What is It?What is It?

UsesUses

AdvantagesAdvantages

DisadvantagesDisadvantages

FutureFuture

Page 25: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

What is It?What is It?

On-line vs Off-line signature VerificationOn-line vs Off-line signature Verification

Vision-Based, Non-VisionVision-Based, Non-Vision

Dynamic Signature – unique as DNADynamic Signature – unique as DNA

Measures speed, pressure of the penMeasures speed, pressure of the pen

Captures x, y, z location of the writingCaptures x, y, z location of the writing

Page 26: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

UsesUses

Point of Sale applicationsPoint of Sale applications

Workflow automationWorkflow automation

SecuritySecurity

Authentication – replaces password, Authentication – replaces password, PIN, keycards, identification cardPIN, keycards, identification card

Financial – account opening, withdrawalFinancial – account opening, withdrawal

Wireless device securityWireless device security

Page 27: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

AdvantagesAdvantages

Signatures already accepted as a means of Signatures already accepted as a means of identification so people willing to accept electronic identification so people willing to accept electronic signature.signature.

Changes in signing are consistent and have Changes in signing are consistent and have recognizable pattern.recognizable pattern.

Is not forgotten, lost, or stolen, so simple and natural Is not forgotten, lost, or stolen, so simple and natural way for enhanced computer security and document way for enhanced computer security and document authorization.authorization.

unique to an individual and almost impossible to unique to an individual and almost impossible to duplicate.duplicate.

Page 28: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

DisadvantagesDisadvantages

Secured authenticationSecured authentication

Difficult to segment strokes as writing Difficult to segment strokes as writing styles are varied and have no set styles are varied and have no set standardstandard

Electronic tablets or digitizers are bulky Electronic tablets or digitizers are bulky and complex.and complex.

Page 29: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

FutureFuture

Administrative Simplification (AS) of the Health Administrative Simplification (AS) of the Health Insurance Portability and Accountability Act (HIPAA)Insurance Portability and Accountability Act (HIPAA)

IT expendituresIT expenditures

Frost & Sullivan - $5.7M in 2003 up to $123.3M by Frost & Sullivan - $5.7M in 2003 up to $123.3M by 20092009

Mobile phones, Internet, tablet PC’sMobile phones, Internet, tablet PC’s

PC/Network Access, e-Commerce and telephony, PC/Network Access, e-Commerce and telephony, physical access and surveillance businessesphysical access and surveillance businesses

Page 30: Biometric Technologies Team 3: Steven Golikov Barbara Edington Melanie Johnson Bashir Amhed Borming Chiang

Thank YouThank You

Have any questions or comments?Have any questions or comments?

Team 3:Team 3:Steven GolikovSteven Golikov

Barbara EdingtonBarbara EdingtonMelanie JohnsonMelanie Johnson

Bashir AmhedBashir AmhedBorming ChiangBorming Chiang