Sie sind auf Seite 1von 41

Field Supervisor

First Supervisor
Outline
1. The Basics
2. Biometric Technologies
3. Multi-model Biometrics
4. Performance Metrics
5. Biometric Applications
Section I: The Basics
Why Biometric Authentication?
Frauds in industry
Identification vs. Authentication
What is Biometrics?
The automated use behavioral and physiological
characteristics to determine or veiry an identity.

Rapid!

Know

Be Have
Frauds in industry happens in the
following situations:
Safety deposit boxes and vaults
Bank transaction like ATM withdrawals
Access to computers and emails
Credit Card purchase
Purchase of house, car, clothes or jewellery
Getting official documents like birth certificates or passports
Obtaining court papers
Drivers licence
Getting into confidential workplace
writing Checks
Why Biometric Application?
To prevent stealing of possessions that
mark the authorised person's identity e.g.
security badges, licenses, or properties
To prevent fraudulent acts like faking ID
badges or licenses.
To ensure safety and security, thus decrease
crime rates
Identification vs. Authentication
Identification Authentication

It determines the identity of It determines whether the


the person. person is indeed who he
claims to be.
No identity claim Identity claim from the user
Many-to-one mapping. One-to-one mapping.
Cost of computation The cost of computation is
number of record of users. independent of the number of
records of users.

Captured biometric signatures Captured biometric signatures


come from a set of known may be unknown to the
biometric feature stored in the system.
system.
Section II: Biometric
Technologies
Several Biometric Technologies
Desired Properties of Biometrics
Comparisons
Types of Biometrics
Fingerprint
Face Recognition Session III
Hand Geometry
Iris Scan
Voice Scan Session II
Signature
Retina Scan
Infrared Face and Body Parts
Keystroke Dynamics
Gait
Odour
Ear
DNA
Biometrics
2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics
Fingerprint
Fingerprint Extraction and Matching
Hand Geometry

Captured using a CCD camera, or LED


Orthographic Scanning
Recognition Systems Crossover = 0.1%
IrisCode
Face
Principal Component Analysis
Desired Properties
Universality
Uniqueness
Permanence
Collectability
Performance
Users Accpetability
Robustness against Circumvention
Comparison
Biometric Type Accuracy Ease of Use User Acceptance

Fingerprint High Medium Low

Hand Geometry Medium High Medium

Voice Medium High High

Retina High Low Low

Iris Medium Medium Medium

Signature Medium Medium High

Face Low High High


Section III: A Multi-model
Biometrics
Multi-modal Biometrics
Pattern Recognition Concept
A Prototype
Multimodal Biometrics
Pattern Recognition Concept

Sensors Extractors Classifiers Negotiator


Image- and
signal- pro. Threshold
algo.
Decision:
Biometrics Data Rep. Feature Scores Match,
Voice, signature 1D (wav), Vectors Non-match,
acoustics, face, 2D (bmp,
Inconclusive
fingerprint, iris, tiff, png)
hand geometry, etc
Enrolment Training

Submission
An Example:
A Multi-model System
Sensors Extractors Classifiers Negotiator

ID Accept/
Reject
Face Face Face
Extractor Feature MLP

2D (bmp) AND
Voice Voice Voice
Extractor Feature MLP
1D (wav)

Objective: to build a hybrid and expandable biometric app. prototype


Potential: be a middleware and a research tool
Abstraction
Negotiation Logical AND
Diff. Combination Strategies.
e.g. Boosting, Bayesian

Learning-based
Voice MLP Face MLP Cl-q
Classifiers NN, SVM,
Extractors Voice Ex Face Ex Ex-q
Different Kernels (static or dynamic)

{LPC, FFT, Wavelets, {Fitlers, Histogram Equalisation,
Basic Operators data processing} Clustering, Convolution, Moments}
Signal Processing, Image Procesing

Data Representation 1D 2D 3D

Biometrics Voice,
signature acoustics
Face, Fingerprint,
Iris, Hand Geometry, etc.
Face
An Extractor Example: Wave
Processing Class
fWaveProcessing

cWaveProcessing cWaveOperator
1 1
Operators
1 1 1 1 1 1

Output data
Input data
cWaveStack cPeripherique cFFT cFFilter cWavelet cLPC cDataProcessing
Audio

Operants
1 1
* cWaveObject
LSIIT, CNRS-ULP, Groupe de Recherche en Intelligence Artificielle

System Architecture in Details


Normalisation Apprentissage et
Visage Dtection des yeux + Codage Reconnaissance

-50 -50
Moment
Dcision
40 30 20 10 0 50 40 30 20 10 0
0 0

Grey Scale
50

100 In te nsity
50

100
Vert
Bleu
150 150

200
200

250
250

Hue
A verage In tensity of each row s
Intensity

Filtre de Trouver Trouver Inondation + Saturation


base Y X Convolution Intensit Rseau des
Extraction neurones w1

Accepter,
Identit Base des donnes Rejeter

Voix Transformation de londelette


Normalisation Apprentissage et
+ Codage Reconnaissance
w2
Frquence

C0 C1 C2 C3 C4 C5 C6 C7
Effacer les
silences C9 C10 C11 C12

C13 C14

C15
Temps Rseau des
neurones

Pour plus de renseignements : Pr J. Korczak, Mr N. Poh <jjk, poh>@dpt-info.u-strasbg.fr


Section IV: Performance Metrics
Confusion Matrix
FAR and FRR
Distributed Analysis
Threshold Analysis
Receiver Operating Curve
Testing and Evaluation:
Confusion Matrix
ID-1 ID-2 ID-3

Correct
Cl-1 0.98 0.01 0.05
Wrong
0.01 0.90 0.78
Cl-2 Threshold =
0.50
Cl-3
False Accepts

False Rejects
A Few Definitions
Total False Acceptence
FAR
Total False Attempts
Total False Rejection
FRR
Total True Attempts
EER is where FAR=FRR
Crossover = 1 : x
Where x = round(1/EER)

Failure to Enroll, FTE

Ability to Verify, ATV = 1- (1-FTE) (1-FRR)


Distribution Analysis

A = False Rejection
B = False Acceptance

A typical wolf and a sheep distribution


Distribution Analysis: A Working
Example
Before learning After learning

Wolves and Sheep Distribution


Threshold Analysis

Minimum
cost

FAR and FRR vs. Threshold


Threshold Analysis : A Working
Example
Face MLP Voice MLP

Combined MLP
Receiver Operating Curve (ROC)
ROC Graph : A Working
Example
0,20
0,18 FAR=FRR
0,16
0,14
0,12
0,10
0,08
0,06
0,04
0,02
0,00
0,00 0,20 0,40 0,60 0,80

FRR

Face Voice
0,20
0,18
0,16
FAR=FRR
0,14
0,12
0,10
0,08
0,06
0,04
0,02
0,00
0,00 0,20 0,40 0,60 0,80

FRR Equal Error Rate


Face : 0.14
Face Voice Combined Voice : 0.06
Combined : 0.007
Section V: Applications
Authentication Applications
Identification Applications
Application by Technologies
Commercial Products
Biometric Applications
Identification or Authentication (Scalability)?
Semi-automatic or automatic?
Subjects cooperative or not?
Storage requirement constraints?
User acceptability?
Biometrics-enabled
Authentication Applications
1. Cell phones, Laptops, Work Stations,
PDA & Handheld device set.

2. Door, Car, Garage Access

3. ATM Access, Smart card

Image Source : http://www.voice-security.com/Apps.html


Biometrics-enabled Identification
Applications
1. Forensic : Criminal Tracking
e.g. Fingerprints, DNA Matching

2. Car park Surveillance

3. Frequent Customers Tracking


Application by Technologies
Biometrics Vendors Market Applications
Share

Fingerprint 90 34% Law enforcement; civil


government; enterprise
security; medical and
Hand Geometry - 26% financial
Time andtransactions
attendance systems,
physical access

Face 12 15% Transaction authentication;


Recognition picture ID duplication
prevention; surveillance
Voice 32 11% Security, V-commerce
Authentication

Iris Recognition 1 9% Banking, access control


Commercial Products
The Head
The Eye The Face The Voice
Eye-Dentify iNTELLiTRAK
Visionics
IriScan QVoice
Miros
Sensar VoicePrint
Viisage
Iridian Nuance
The Hand
The Fingerprint Hand Geometry Behavioral
Identix
BioPassword
BioMouse Advanced Biometrics
CyberSign
The FingerChip Recognition Systems
PenOp
Veridicom
Other Information

Bertillonage
International Biometric Group
Palmistry
Main Reference
[Brunellietal,1995]R.Brunelli,andD.Falavigna,"Personalidentificationusingmultiplecues,"IEEETrans.onPattern
AnalysisandMachineIntelligence,Vol.17,No.10,pp.955966,1995

[Bigun,1997]Bigun,E.S.,J.Bigun,Duc,B.:ExpertconciliationformultimodalpersonauthenticationsystemsbyBayesian
statistics,InProc.1stInt.Conf.OnAudioVideoBasedPersonalAuthentication,pp.327334,CransMontana,Switzerland,1997

[Dieckmannetal,1997]Dieckmann,U.,Plankensteiner,P.,andWagner,T.:SESAM:Abiometricpersonidentification
systemusingsensorfusion,InPatternRecognitionLetters,Vol.18,No.9,pp.827833,1997

[Kittleretal,1997]Kittler,J.,Li,Y.,Matas,J.andSanchez,M.U.:Combiningevidenceinmultimodalpersonalidentity
recognitionsystems,InProc.1stInternationalConferenceOnAudioVideoBasedPersonalAuthentication,pp.327344,CransMontana,
Switzerland,1997

[MaesandBeigi,1998]S.MaesandH.Beigi,"Opensesame!Speech,passwordorkeytosecureyourdoor?",InProc.3 rd

AsianConferenceonComputerVision,pp.531541,HongKong,China,1998

[Jainetal,1999]Jain,A.,Bolle,R.,Pankanti,S.:BIOMETRICS:Personalidentificationinnetworkedsociety,2 nd
Printing,
KluwerAcademicPublishers(1999)

[Gonzalez,1993]Gonzalez,R.,andWoods,R.:"DigitalImageProcessing",2ndedition,AddisonWesley,1993.

Das könnte Ihnen auch gefallen