http://www.csudh.edu/univadv/dateline/archives/20080725/facstaffnews/branding_03.jpg

  • 2
  • People’s identity are verified and identified by three basic means:
  • The strongest authentication involves a combination of all three.
  • 3
  • Identifying fellow human beings has been crucial to the fabric of human society
  • the early days of civilization, people lived in small communities and everyone knew each other
  • With the population growth and increase in mobility, we started relying on documents and secrets to establish identity
  • Person identification is now an integral part of the infrastructure needed for diverse business sectors such as banking, border control, law enforcement.
  • 4
  • Different means of automatic identification:
  • Possession-based (credit card, smart card)
  • Knowledge-based (password, PIN)
  • Biometrics-based (biometric identifier)
  • 5
  • Card may be lost, stolen or forgotten
  • of people seem to write their PIN on their ATM card
  • Estimates of annual identity fraud damages:
  • The traditional approaches are unable to differentiate between an authorized person and an impostor
  • 6
  • Identity Theft: Identity thieves steal PIN (e.g., date of birth) to open credit card accounts, withdraw money from accounts and take out loans
  • 3 million identity thefts in U.S. in 2010; 6.7 million victims of credit card fraud
  • 7
  • Surrogate representations of identity such as passwords and ID cards no longer suffice
  • Biometrics – science, which deals with the automated recognition of individuals (or plants/animals) based on biological and behavioral characteristics
  • Biometry – mathematical and statistical analysis of biological data
  • Biometric system – a pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric)
  • Anthropometry–measurement techniques of human body and its specific parts
  • Forensic (judicial) anthropometry–identification of criminals by these measurement techniques
  • 8
  • 10
  • 11
  • Universality
  • Uniqueness
  • Performance
  • Collectability
  • Acceptability
  • 12
  • Biological traces
  • Biological (physiological) characteristics
  • Behavioral characteristics
  • Combined
  • 13
  • Bertillon system (1882) took a subject's photograph, and recorded height, the length of one foot, an arm and index finger
  • Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900
  • FBI set up a fingerprint identification division in 1924
  • AFIS installed in 1965 with a database of 810,000 fingerprints
  • First face recognition paper published in 1971 (Goldstein et al.)
  • FBI installed IAFIS in ~2000 with a database of 47 million 10 prints; average of 50,000 searches per day; ~15% of searches are in lights out mode; 2 hour response time for criminal search
  • 14
  • Emphasis now is to automatically perform reliable person
  • identification in unattended mode, often remotely (or at a distance)
  • 15
  • dna_bases_nhgri_large

  • 16
  • 18
  • 19
  • 21
  • 22
  • 23
  • 24
  • 26
  • 27
  • 28
  • The History of Biometrics: From the 17th Century to Nowadays | RecFaces

  • 29
  • 30
  • One-dimensional unique code for one’s individuality, but identical twins have identical DNA patterns
  • Issues limiting the utility of DNA
  • 31
  • Physical Characteristics
  • Behavioral Characteristics
  • 32
  • 33
  • 34
  • 35
  • 37
  • 38
  • Every eye has its own totally unique pattern of blood vessels.
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • Airbus Has Boeing's Back Against the Wall, Seek Opportunities in Supply Chain | Seeking Alpha

  • 46
  • 47
  • 48
  • 49
  • How multimodal biometrics improves border control security
    Biometrics Play New Role In Passport Technology : NPR
    Newark, NJ - Kiosks Arrive At Newark Airport To Speed Customs

  • K. to consider national biometric ID cards,
  • database
  • Laura Rohde, COMPUTERWORLD (Nov 29, 2003)-
  • The U.K. government is set to consider legislation next year
  • for the establishment of compulsory biometric identity cards
  • and a central database of all U.K. subjects, it was announced
  • the government this week.
  • The information that the government is considering for
  • inclusion on the card includes personal details such as a
  • person's home address and telephone number, his National
  • Insurance number (the equivalent of the U.S. Social Security
  • number), medical information and criminal convictions, as
  • well as the biometric information, most likely in the form of
  • iris, fingerprint or palm print scan.
  • 50
  • 51
  • 52
  • Video Surveillance (On-line or off-line)
  • 53
  • “Galp Energia SGPS SA of Lisbon
  • won the technology innovation
  • award for developing a payment
  • system in which gasoline-station
  • customers can settle their bills
  • simply by pressing a thumb against
  • glass pad. Scanning technology
  • identifies the thumbprint and sends
  • the customer's identification
  • information into Galp's back-office
  • system for payment authorization.”
  • THE WALL STREET JOURNAL, November 15, 2004
  • 54
  • The Nine Zero hotel in Boston just installed a new
  • system which uses digital photos of the irises of
  • employees, vendors and VIP guests to admit them to
  • certain areas, the same system used in high-security
  • areas at airports such as New York's JFK.
  • 55
  • “Foreigners entering the United
  • State in three cities, including
  • Port Huron, were fingerprinted,
  • photographed and subjected to
  • background checks on Monday
  • a test of a program that will
  • eventually be extended to
  • every land border crossing
  • nationwide.”
  • Lansing State Journal, Nov. 16, 2004
  • 56
  • 57
  • The new passports have an embedded
  • contactless (ISO 14443) “smart-card” chip that stores personal information and a biometric template. Two problems: reliability and privacy
  • Beepcard, a company in California, has designed a credit card that works only when it recognizes the voice of its rightful owner. Enclosed in the card is a tiny microphone, a loudspeaker and a speech recognition chip that compares the spoken password with a recorded sample. If the voices match, the card emits a set of beeps that authorize a transaction over the telephone or the Internet. If the voices do not match, the card will not beep.
  • 58
  • The system tolerates some variations in voice to accommodate cold or background noise. But it might not work if there is a blaring music in the background.
  • Automatic personalization of vehicle settings:
  • URLs at your fingertips
  • 59
  • 60
  • Data Snapshot: Biometrics in the workplace commonplace, but are they secure? - Spiceworks
  • 62
  • 63
  • 64
  • Biometric Template Security
    2
  • Depending on when they are generated, templates can be referred to as enrollment templates or match templates.
  • biometric-ver
  • 67
  • 68
  • 69
  • fd-min
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • The user submits a sample (biometric data) via an acquisition device (for example, a scanner or camera)
  • This biometric is then processed to extract information about distinctive features to create a trial template or verification template
  • Templates are large number sequences. The trial/match template is the user’s “password.”
  • Trial/match template is compared against the reference template stored in biometric database.
  • Biometric
  • Acquisition Device
  • Sample
  • Feature Extracted
  • Iris
  • Infrared-enabled video camera, PC camera
  • Black and white iris image
  • Furrows and striations of iris
  • Fingerprint
  • Desktop peripheral, PC card, mouse chip or reader embedded in keyboard
  • Fingerprint image (optical, silicon, ultrasound or touchless)
  • Location and direction of ridge endings and bifurcations on fingerprint, minutiae
  • Voice
  • Microphone, telephone
  • Voice Recording
  • Frequency, cadence and duration of vocal pattern
  • Signature
  • Signature Tablet, Motion-sensitive stylus
  • Image of Signature and record of related dynamics measurement
  • Speed, stroke order, pressure and appearance of signature
  • Face
  • Video Camera, PC camera, single-image camera
  • Facial image (optical or thermal)
  • Relative position and shape of nose, position of cheekbones
  • Hand
  • Proprietary Wall-mounted unit
  • D image of top and sides of hand
  • Height and width of bones and joints in hands and fingers
  • Retina
  • Proprietary desktop or wall mountable unit
  • Retina Image
  • Blood vessel patterns and retina
  • Strengths
  • Weakness
  • Usability
  • Iris
  • Very stable over time
  • Uniqueness
  • Potential user resistance
  • Requires user training
  • Dependant on a single vendor’s technology
  • Information security access control, especially for
  • Federal Institutions and government agencies
  • Physical access control (FIs and government)
  • Kiosks (ATMs and airline tickets)
  • Fingerprint
  • Most mature biometric technology
  • Accepted reliability
  • Many vendors
  • Small template (less than 500 bytes)
  • Small sensors that can be built into mice, keyboards or portable devices
  • Physical contact required (a problem in some cultures)
  • Association with criminal justice
  • Vendor incompatibility
  • Hampered by temporary physical injury
  • access control
  • Physical access control
  • Automotive
  • Most proven over time
  • Temperature stable
  • Large physical size
  • Latent prints
  • CCD coating erodes with age
  • Durability unproven
  • 79
  • Strengths
  • Weakness
  • Usability
  • Small physical size
  • Cost is declining
  • Requires careful enrollment
  • Unproven in sub optimal conditions
  • Most accurate in sub optimal conditions
  • New technology, few implementations
  • Unproven long term performance
  • Voice
  • Good user acceptance
  • Low training
  • Microphone can be built into PC or mobile device
  • Unstable over time
  • Changes with time, illness stress or injury
  • Different microphones generate different samples
  • Large template unsuitable for recognition
  • Mobile phones
  • Telephone banking and other automated call centers
  • Signatures
  • High user acceptance
  • Minimal training
  • Unstable over time
  • Occasional erratic variability
  • Changes with illness, stress or injury
  • Enrollment takes times
  • Portable devices with stylus input
  • Applications where a “wet signature” ordinarily would be used.
  • 80
  • Strengths
  • Weakness
  • Usability
  • Face
  • Universally present
  • Cannot distinguish identical siblings
  • Religious or cultural prohibitions
  • Physical access control
  • Hand
  • Small template (approximately 10 bytes)
  • Low failure to enroll rate
  • Unaffected by skin condition
  • Physical size of acquisition device
  • Physical contact required
  • Juvenile finger growth
  • Hampered by temporary physical injury
  • Physical access control
  • Time and attendance
  • Retina
  • Stable over time
  • Uniqueness
  • Requires user training and cooperation
  • High user resistance
  • Slow read time
  • Dependent on a single vendor’s technology
  • access control, especially for high security government agencies
  • Physical access control (same as IS access control)
  • 81
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • roc2
  • False rejection rate
  • True acceptance rate
  • Legitimate users get accepted.
  • Legitimate users get rejected.
  • Cost/benefit analysis of decision making.
  • Tradeoff b/w true acceptance rate and false rejection rate.
  • Biometrics_error
    Biometric_comparisons