biometrics

79
CC-9013 Biometrics Dr. C. Saravanan NIT Durgapur [email protected]

Upload: cs1973

Post on 19-Aug-2015

17 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Biometrics

CC-9013 Biometrics

Dr. C. Saravanan

NIT Durgapur

[email protected]

Page 2: Biometrics

Introduction

• Biometrics are automated methods ofrecognizing a person based on a

• Physiological or

• Behavioral characteristic.

• The features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.

Dr. C. Saravanan, NIT Durgapur,

India

Page 3: Biometrics

Fingerprint

Dr. C. Saravanan, NIT Durgapur,

India

Page 4: Biometrics

Iris and Retina

Dr. C. Saravanan, NIT Durgapur,

India

Page 5: Biometrics

Hand Geometry

Dr. C. Saravanan, NIT Durgapur,

India

Page 6: Biometrics

Handwriting

Dr. C. Saravanan, NIT Durgapur,

India

Page 7: Biometrics

Facial Recognition

Dr. C. Saravanan, NIT Durgapur,

India

Page 8: Biometrics

Vein

Dr. C. Saravanan, NIT Durgapur,

India

Page 9: Biometrics

Need

• Security breaches and transaction fraud

increases.

• Biometric technologies are becoming the

foundation of an extensive array of highly

secure identification and personal

verification solutions.

• Confidential financial transactions and

Personal data privacy.

Dr. C. Saravanan, NIT Durgapur,

India

Page 10: Biometrics

Applications

• Biometric-based authentication

applications include

• workstation, network, and domain access,

• single sign-on, application logon,

• data protection,

• remote access to resources,

• transaction security and Web security.

Dr. C. Saravanan, NIT Durgapur,

India

Page 11: Biometrics

Basic Image Operations

• Enhancement

• Filter

• Edge Detection

• Localisation

• Smoothning

• Sharpning

• Thresholding

Dr. C. Saravanan, NIT Durgapur,

India

Page 12: Biometrics

Enhancement

• A process of enhancing the visual quality of images due to nonideal image acquisition process (e.g., poor illumination, coarse quantization etc.)

• No reference (original) image is available for comparison

• Human vision system (HVS) is the JUDGE.

Dr. C. Saravanan, NIT Durgapur,

India

Page 13: Biometrics

Enhanced Image

Dr. C. Saravanan, NIT Durgapur,

India

Page 14: Biometrics

Technique Types

• Point operations

• Histogram Equalization

• Unsharp masking

• Homomorphic filtering

Dr. C. Saravanan, NIT Durgapur,

India

Page 15: Biometrics

Point operations

• Point operations are zero-memoryoperations where a given gray level x∈[0,L] is mapped to another gray level y∈[0,L] according to a transformation.

• Based only on the intensity of single pixels.

• Linear

• Applications - Contract Enhancement / Feature Enhancement

Dr. C. Saravanan, NIT Durgapur,

India

Page 16: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 17: Biometrics

Important point operations

• Image negatives

• Contrast stretching

• Gray-level slicing

• Bit-plane slicing

Dr. C. Saravanan, NIT Durgapur,

India

Page 18: Biometrics

Image negatives

• The transformation is very simple :

s=T(r)

T(r)=(L-1)-r

L is the number of gray levels.

The result of this transformation is that low intensities are made high and vice versa.

Dr. C. Saravanan, NIT Durgapur,

India

Page 19: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 20: Biometrics

Contrast stretching

• Contrast stretching (often called normalization) attempts to improve the contrast in an image by `stretching' the range of intensity values to a desired range of values.

Pout=(Pin-c)((b-a)/(d-c)) + a

8-bit graylevel images the lower and upper limits might be 0 and 255, a & b. lowest and highest pixel values currently present in the image c & d.

Dr. C. Saravanan, NIT Durgapur,

India

Page 21: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 22: Biometrics

Gray-level slicing

• Give a high value for all the gray-levels in

the specified range and a very low value

for all the other gray-levels.

Bit-plane slicing

• The intensity of each pixel of an image is

defined by several bits - highest order bits

are dominant.

Dr. C. Saravanan, NIT Durgapur,

India

Page 23: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 24: Biometrics

Histogram Equalisation

• A histogram with a small spread has low

contrast

• A histogram with a wide spread has high

contrast

• An image with its histogram clustered at

the low end of the range corresponds to a

dark image

Dr. C. Saravanan, NIT Durgapur,

India

Page 25: Biometrics

Histogram Equalisation steps

1. Find the running sum of the histogram values

2. Normalize the values from step 1 by dividing by the total number of pixels

3. Multiply the values from step 2 by the maximum gray level value and round to the closest integer

4. Map the gray level values to the results from step 3 using a one-to-one correspondence

Dr. C. Saravanan, NIT Durgapur,

India

Page 26: Biometrics

Histogram Example

Step 1:

Gray level Number of pixels Running Sum

value (Histogram values)

0 10 10

1 8 10+8=18

2 9 10+8+9=27

3 2 29

4 14 43

5 1 44

6 5 49

7 2 51

Dr. C. Saravanan, NIT Durgapur,

India

Page 27: Biometrics

Example continues ...

Step 2: Normalizing by dividing by the total number of pixels (51) we get 10/51, 18/51, 27/51, 29/51, 43/51, 44/51, 49/51, 51/51

Step 3: Multiply by the maximum gray level value (7) and round we obtain 1, 2, 4, 4, 6, 6, 7, 7

Step 4: Map the original value to the results from step 3

Dr. C. Saravanan, NIT Durgapur,

India

Page 28: Biometrics

Histogram equalisation

Dr. C. Saravanan, NIT Durgapur,

India

Page 29: Biometrics

Unsharp masking

• Combine histogram modification and

filtering operations.

Input Image -> filter -> Histogram

modification -> output image

Dr. C. Saravanan, NIT Durgapur,

India

Page 30: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 31: Biometrics

Homomorphic filter

• Simultaneously normalizes the brightness across an image and increases contrast.

• To make the illumination of an image more even, the high-frequency components are increased and low-frequency components are decreased, because the high-frequency components are assumed to represent mostly the reflectance in the scene (the amount of light reflected off the object in the scene), whereas the low-frequency components are assumed to represent mostly the illumination in the scene.

Dr. C. Saravanan, NIT Durgapur,

India

Page 32: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 33: Biometrics

Frequency Domain Methods

• Compute Fourier Transform of the image

to be enhanced.

• Multiply the result by a filter

• Take the inverse transform to produce the

enhanced image

• Will diminish camera noise, spurious pixel

values, missing pixel values etc.

Dr. C. Saravanan, NIT Durgapur,

India

Page 34: Biometrics

Neighbourhood Averaging

• Smooth Image F(x,y) = Average pixel

value in a neighbourhood of I(x,y)

• For example, 3 x 3 neighbourhood

• Each pixel value is multiplied by 1/9

• Sum of 9 pixel value is the output

Dr. C. Saravanan, NIT Durgapur,

India

Page 35: Biometrics

Edge Preserving

• Also called Median Filtering

• Median of the neighbourhood pixel values

• More like neighbours

• Edges are preserved

Dr. C. Saravanan, NIT Durgapur,

India

Page 36: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 37: Biometrics

Image Sharpening

• Highlighting fine detail in the image

• Enhance detail that has been blurred

Dr. C. Saravanan, NIT Durgapur,

India

Page 38: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 39: Biometrics

Edge Detection

• Identifying and Locating sharp

discontinuities in an image.

• Discontinuities are abrupt changes in pixel

intensity.

• Sobel operator / filter

• Canny edge operator

Dr. C. Saravanan, NIT Durgapur,

India

Page 40: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 41: Biometrics

Sobel Operator

• 3 x 3 convolution kernels convolved with original image.

• * denotes convolution operation

AGx *

101

202

101

AGy *

121

000

121

Dr. C. Saravanan, NIT Durgapur,

India

Page 42: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 43: Biometrics

Canny Edge Operator

1. Smoothing: Blurring of the image to remove noise.

2. Finding gradients: The edges should be marked where the gradients of the image has large magnitudes.

3. Non-maximum suppression: Only local maxima should be marked as edges.

4. Thresholding: Potential edges are determined by thresholding.

5. Edge tracking by hysteresis: Final edges are determined by suppressing all edges that are not connected to a very certain (strong) edge.

Dr. C. Saravanan, NIT Durgapur,

India

Page 44: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 45: Biometrics

Smoothing

24542

491294

51215125

491294

24542

159

1B

The image is first smoothed by applying a Gaussian filter.

Dr. C. Saravanan, NIT Durgapur,

India

Page 46: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 47: Biometrics

Finding gradients

• Finds edges where the grayscale intensity

of the image changes the most.

• These areas are found by determining

gradients of the image

• Gradients at each pixel in the smoothed

image are determined by applying Sobel-

operator

Dr. C. Saravanan, NIT Durgapur,

India

Page 48: Biometrics

Non-maximum suppression

• Convert the blurred edges in the image of the gradient magnitudes to “sharp” edges.

• This is done by preserving all local maxima in the gradient image, and deleting everything else.

1343

3465

6754

4532

Dr. C. Saravanan, NIT Durgapur,

India

Page 49: Biometrics

Thresholding

• The edge-pixels remaining will probably be

true edges in the image.

• But some may be caused by noise or color

variations.

• Discern between these would be to use a

threshold.

• The Canny edge detection algorithm uses

double thresholding, Strong and Weak.

Dr. C. Saravanan, NIT Durgapur,

India

Page 50: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 51: Biometrics

Edge Tracking by Hysteresis

• Strong edges are included in the final

edge image.

• Weak edges are included if and only if

they are connected to strong edges.

Dr. C. Saravanan, NIT Durgapur,

India

Page 52: Biometrics

Biometric Identification

• Biometric identification compares a biometric "signature" to all the records stored in a database to determine if there is a match (1 : N).

• Because it requires comparing each existing record in the database against the new biometric characteristic, it can be slow and is usually not suitable for real-time applications such as access control or time and attendance.

Dr. C. Saravanan, NIT Durgapur,

India

Page 53: Biometrics

Biometric Identification

• Biometric identification used most

frequently in such applications as law

enforcement — for instance, the

comparison of a fingerprint from a crime

scene to a database of prints collected

from convicted criminals.

Dr. C. Saravanan, NIT Durgapur,

India

Page 54: Biometrics

Biometric Verification

• Biometric verification compares a newly-scanned biometric characteristic to a measurement previously collected from that same person to verify that individual's identity (1 : 1).

• For instance, when an employee is hired, that employee's fingerprint will be enrolled into the company's biometric time and attendance system.

Dr. C. Saravanan, NIT Durgapur,

India

Page 55: Biometrics

FAR

False Acceptance Rate (FAR)

• is the measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user.

• is stated as the ratio of the number of false acceptances divided by the number of identification attempts.

Dr. C. Saravanan, NIT Durgapur,

India

Page 56: Biometrics

FRR

False Recognition Rate (FRR)

• is the measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user.

• is stated as the ratio of the number of false rejections divided by the number of identification attempts.

Dr. C. Saravanan, NIT Durgapur,

India

Page 57: Biometrics

Biometric System Design Issues

• System Architecture

– Centralised / Distributed Server

– Client Computer

– Device at User End

• Hardware & Software Implementation

– Sample Acquitision

– User Interface

– Biometric Processing Components

Dr. C. Saravanan, NIT Durgapur,

India

Page 58: Biometrics

BSD Issues (continues...)

– Communication Channels

– Database Design

– Interoperability

• Administration Policy

– Integrety of Enrollment

– Quality of Enrollment Samples

– System Configuration

– Exception Handling

– Privacy Measures

Dr. C. Saravanan, NIT Durgapur,

India

Page 59: Biometrics

Positive / Negative Identification

• False Non-Match Rate (FNMR)

• False March Rate (FMR)

• False Reject Rate (FRR)

• False Accept Rate (FAR)

• False Positive Identification Rate (FPIR)

• False Negative Identification Rate (FNIR)

Dr. C. Saravanan, NIT Durgapur,

India

Page 60: Biometrics

Biometric System Security

• Includes IT Security

• Earlier related financial

• At present, Passports, Visas, etc.

– Biometric Security Evaluation

– Biometric Transaction Security

– Protection of Biometric Data

Dr. C. Saravanan, NIT Durgapur,

India

Page 61: Biometrics

Authentication Protocol

• is a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely.

• AKA, CAVE-based_authentication, Challenge-handshake authentication protocol (CHAP), CRAM-MD5Diameter, Digest, Extensible Authentication Protocol (EAP), Host Identity Protocol (HIP), Kerberos, MS-CHAP, LAN Manager, NTLM, Password-authenticated key agreement protocols, Password Authentication Protocol (PAP), Protected Extensible Authentication Protocol (PEAP), Protocol for Carrying Authentication for Network Access (PANA), RADIUS, Secure Remote Password protocol (SRP), TACACS and TACACS+, RFID-Authentication Protocols, Woo Lam 92 (protocol)

Dr. C. Saravanan, NIT Durgapur,

India

Page 62: Biometrics

Kerberos

• MIT developed Kerberos

• Kerberos (or Cerberus - Greek monstrous three-headed guard dog)

• works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

• protected against eavesdropping and replay attacks.

Dr. C. Saravanan, NIT Durgapur,

India

Page 63: Biometrics

Matching Score Distribution

• A matching algorithm was defined as an algorithm that make a decision about genuine or impostor nature of a comparison between two templates.

• In the first step an Evaluation Algorithm assigns a similarity score to the comparison. That similarity score is a value on the range (0..1) and as higher be the score value more similar the images.

• The second step decides if the comparison is genuine or impostor using a frontier threshold or decision threshold (DT).

Dr. C. Saravanan, NIT Durgapur,

India

Page 64: Biometrics

Receiver Operating Characteristic

(ROC)

• accepted method for summarizing the performance of imperfect pattern matching systems.

• parametrically as a function of the decisionthreshold,

• the rate of “false positives” on the x-axis

• the rate of “true positives” on the y-axis

• ROC curves are threshold independent

Dr. C. Saravanan, NIT Durgapur,

India

Page 65: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 66: Biometrics

Detection Error Trade-off (DET)

• modified ROC curve

• plots error rates on both axes

• giving uniform treatment to both types of

error

• distinguishes different wellperforming

systems more clearly

Dr. C. Saravanan, NIT Durgapur,

India

Page 67: Biometrics

Dr. C. Saravanan, NIT Durgapur,

India

Page 68: Biometrics

Expected Overall Error

gi TFNMRTFMRTE )()()(

• Expected overall error takes into account the possibility of different FM and FNM and is given as

where,

T=threshold

pi=probability of a random user being an imposter.

pg=probability of a random user being genuine.

Dr. C. Saravanan, NIT Durgapur,

India

Page 69: Biometrics

Equal Error Rate (EER)

• EER is the value where FMR and FNMR

are equal.

• Lower be the EER the lower error rate of

the algorithm.

• Select the EER score value as Decision

Threshold (DT) is frequently a good

decision for a regular biometric

application.

Dr. C. Saravanan, NIT Durgapur,

India

Page 70: Biometrics

Myths & Misrepresentations

• Biometric “X” is best for all applications

• Biometric “X” is unique for each individual

• A single number quantifies system

accuracy

• System is “ plug and play “

• Real accuracy performance can be

predicted

Dr. C. Saravanan, NIT Durgapur,

India

Page 71: Biometrics

• The vendors reporting best FAR and FRR has the “most accurate system”

• Multiple biometrics outperform single biometrics

• “Our biometric system does not use a decision threshold”

• “Our feature extractor can be used with any match engine”

• Large templates mean better accuracy

• Face recognition prevents terrorism

Dr. C. Saravanan, NIT Durgapur,

India

Page 72: Biometrics

• Biometrics means 100 percent security

• Biometric systems invade our privacy

• Biometric sensors are unhygienic or

otherwise harmful

Dr. C. Saravanan, NIT Durgapur,

India

Page 73: Biometrics

Selection of Suitable Biometric

• Ethnic Background

– who will be the users of the biometric system

– education levels and a variety of attitudes

• Employee Education

– technical background of the users.

– higher the technological background less

training required

Dr. C. Saravanan, NIT Durgapur,

India

Page 74: Biometrics

• Frequency of Use

– some biometric systems are more suitable for

high frequency of usage

• User characteristics

– will the users be in a hurry and possibly be a

little bit impatient (public restroom)

Dr. C. Saravanan, NIT Durgapur,

India

Page 75: Biometrics

Biometric Attributes

1. Universal:

Every person must possess the characteristic/attribute.

The attribute must be one that is universal and seldom lost to accident or disease.

2. Invariance of properties:

They should be constant over a long period of time.

The attribute should not be subject to significant differences based on age either episodic or chronic disease.

3. Measurability:

The properties should be suitable for capture without waiting time and must be easy to gather the attribute data passively.

4. Singularity:

Each expression of the attribute must be unique to the individual. The characteristics should have sufficient unique properties to distinguish one person from any other.

Dr. C. Saravanan, NIT Durgapur,

India

Page 76: Biometrics

Height, weight, hair and eye color are all attributes that are unique assuming a particularly precise measure, but do not offer enough points of differentiation to be useful for more than categorizing.

5. Acceptance:

The capturing should be possible in a way acceptable to a large percentage of the population. Excluded are particularly invasive technologies, i.e. technologies which require a part of the human body to be taken or which (apparently) impair the human body.

6. Reducibility:

The captured data should be capable of being reduced to a file which is easy to handle.

7. Reliability and tamper-resistance:

The attribute should be impractical to mask or manipulate. The process should ensure high reliability and reproducibility.

Dr. C. Saravanan, NIT Durgapur,

India

Page 77: Biometrics

8. Privacy: The process should not violate the privacy of the person.

9. Comparable: Should be able to reduce the attribute to a state that makes it digitally comparable to others. The less probabilistic the matching involved, the more authoritative the identification.

10. Inimitable: The attribute must be irreproducible by other means. The less reproducible the attribute, the more likely it will be authoritative.

Dr. C. Saravanan, NIT Durgapur,

India

Page 78: Biometrics

Any Questions ?

Dr. C. Saravanan, NIT Durgapur,

India

Page 79: Biometrics

References

Biometrics: Identity Assurance in the Information Age, John D. Woodward

Jr.

Biometrics: Advanced Identity Verification: The Complete Guide, Julian

Ashbourn

Biometrics: Identity Verification in a Networked World, Samir Nanavati

Digital Image Processing, Gonzalez and Woods

Wikipedia

Dr. C. Saravanan, NIT Durgapur,

India