Sie sind auf Seite 1von 43

BIOMERTICS

Why the Interest in Biometrics?


Convenient Passwords are not user-friendly Perceived as more secure The increasing mobility of the workforce May actually be more secure means you can't be sure who's really at the May be useful as a deterrent other end of the network link. It's clear that simple user ID and password logons are no Passive identification longer sufficient.

HISTORY
This process dates back to 1882, Frenchman Alphonse Bertillion proposed a forensic system of identifying people based on the size of their bodies, heads and limbs. fingerprint analysis (dactyloscopy) was described in the late 1800s by Sir Francis Galton and Sir Edward Henry. Adopted by Scotland Yard in 1901

WHAT IS BIOMETRICS ???


Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

Uses of Biometrics
Simple: Verification Is this who he claims to be? Identification who is this? Advanced: Detecting multiple identities Patrolling public spaces

Modality Categorizations
Physical vs. Behavioral Interactive vs. Passive Overt vs. Covert Close up vs. Distant

BIOMETRICS
PHYSIOLOGICAL BEHAVIORAL

FACE

KEYSTROKE

FINGERPRINT

SIGNATURE

HAND

VOICE

IRIS

DNA

Basic characteristics
Universality: Every person should have the characteristic. Uniqueness: No two people have identical characteristics. Exception- identical twins Permanence: The characteristics should not vary with time. A person's face, for example, may change with age. Collectibility: The characteristics must be easily collectible and measurable. Performance: The method must deliver accurate results under varied environmental circumstances. Acceptability: The general public must accept the sample collection routines. Non intrusive methods are more acceptable. Circumvention: The technology should be difficult to deceive.

PROCESS
Enroll Biometric devices consist of a reader or

scanning device software that converts the Capture Process Extract DB gathered information into digital form, and a database that stores the biometric data with comparison with existing records.
Capture Process Extract Compare Adapt

Verify
Match / No match

Modes
Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison. Verification Mode: In this mode biometric system authenticates a persons claimed identity from their previously enrolled pattern.

Enrollment
Enrollment is a critical process in a biometric system. The basis of biometrics: a biometric sample linked to a known person

Enrollment(continued)
Capture Obtaining the biometric sample: Scanning a finger. Taking a picture of an iris Taking a picture of a fingerprint left at the scene of a crime. Recording someone talking Etc. Also referred to as Acquire

Enrollment(continued)
Process Some reasons for pre-processing: Sub-optimal lighting conditions. Eyelashes covering iris. Dirty or dry fingers. Person isnt looking straight ahead. Contact lenses causing glare. Many faces in one photo. Background noise in a recording.

Enrollment(continued)
Extract Obtain properties of the sample that are suitable for computer storage and comparison.
The result is referred to as a template. The form and size of a template is dependent on the modality and the approach being used.

Verification
Compare A biometric system can be thought of as a complex pattern recognition machine.
Automating this step accurately is very difficult never an exact match. The method of comparison is biometricdependent.

Fingerprint Recognition
For fingerprint Recognition look at: Friction ridges. Core.

Crossover.
Delta. Island. Ridge Ending. Pore.

LOOP, ARCH AND WHORL

Minutiae
Uses ridge endings ,bifurcations on a persons finger to plot points know as Minutiae. The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger.

Finger Image

Finger Image + Minutiae

Minutiae

Face Recognition
It involves recognizing people by there: Facial features. Face geometry.

Principle: Analysis of unique shape, pattern and positioning of facial features.

Face Recognition(continued)
It is mainly software-driven and, therefore relatively cheap and can operate on any sort of live digital image.
It's even being used by UK police to scan live surveillance feeds for wanted persons.

Iris Recognition
Iris: It is the coloured area of the eye that surrounds the pupil. It is a protected internal organ whose random texture is stable throughout life. The iris patterns are obtained through a video-based image acquisition system .

Iris Recognition(continued)
Users just position their eye a few centimetres in front of the device and a pulse of light does all the measuring instantly.

DNA IDENTIFICATION
RFLP - Restriction Fragment Length Polymorphism Widely accepted for crime scenes Twin problem

Voice Recognition
Voice recognition is not the same as speech recognition, it is speaker recognition. Considered both physiological and behavioral.
Popular and low-cost, but less accurate and sometimes lengthy enrollment.

Signature Verification
Static/Off-line: the conventional way. Dynamic/On-line: using electronically instrumented device. Principle: The movement of the pen during the signing process rather than the static image of the signature. Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.

Consequence of a Match
Comparison output: Yes / No, On / Off, Match / No-match Results: Green light / Red light Unlock door / Keep door locked Login / Keep out

Potential Matching Errors


False Reject Also known as False Non-Match Also known as Type I Error Important measure: FRR False Accept Also known as False Match Also known as Type II Error Important measure: FAR

Potential Matching Errors (continued)


false accept rate or false match rate (FAR or FMR) the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false non-match rate (FRR or FNMR) the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected.

The possible outcomes


Genuine Accept False Accept Genuine Reject False Reject

Which is the worst outcome and why ???

working
How can computers do the equivalent comparison for complex patterns? The rough answer: statistics

Example
Assume the following are two templates (enrolled and claimant).
Enrolled biometric Claimant Comparison Result 11100101100110110010110101011010 11000111100110010001100101011011 00100010000000100011010000000001

Continued
In the previous example, if two templates of the same person are compared we can say that the genuine score is 7.
If two templates of different people are compared we can say the imposter score is 7. To restate: is 7 a score that should be considered a match?

How do we decide whether the previous templates are a match?

There is typically a value referred to as a threshold value above/below which it is considered a match.

The Relationships
Threshold and FAR and FRR are dependent values. If an algorithm threshold is changed so that the FAR goes down, then the FRR will most likely go up. There is no perfect biometric that has a 0% FAR and 0% FRR.

relative operating characteristic (ROC)


Threshold Comparison

Imposter

Genuine

Score

ROC plot is a visual characterization of the trade-off between the FAR and the FRR.

Advantages
Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly. Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .

Disadvantages
The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication. Data obtained during biometric enrollment could be used in ways the enrolled individual does not consent to. When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access. Biometrics is an expensive security solution.

One advantage of passwords over biometrics is that they can be re-issued. Cancelable or a password is lost or stolen, it can be If a token biometrics is a way in which to cancelled and replaced by a newer version. This is incorporate protection and biometrics. If someones not naturally available in the replacement features into biometrics. face is compromised from a database, they cannot cancel or reissue it. It was first proposed by Ratha et al.
The first fingerprint based cancelable biometric system was designed and developed by Tulyakov.

Cancelable biometrics as a solution to previous problem

Biometric application
Biometric Time Clocks -Which are being increasingly used in various organisations to control employee timekeeping. Biometric safes and biometric locks- Provides security to the homeowners. Biometric access control systems Providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities.

Biometric application(continued)
Wireless biometrics for high end security and providing safer transactions from wireless devices like PDA's, etc. Identifying DNA Patterns of biometrics technology in identifying DNA patterns for identifying criminals, etc. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.

conclusion
As the technology becomes pervasive, users will quickly become used to it and will most likely appreciate its benefits one of which is that they no longer need to remember various passwords. As secure, biometric-enabled data storage and access tracking become the rule of the day, companies will be able to expand coverage of the technology to their business partners.This helps to facilitate e-business

Das könnte Ihnen auch gefallen