u of hcosc 6397 – lecture 1 #1 u of hcosc 6397 lecture 1: introduction to biometrics prof. ioannis...

21
U of H COSC 6397 – Lecture 1 #1 U of H COSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

Upload: johnathan-smith

Post on 18-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#1

U of HCOSC 6397

Lecture 1: Introduction to Biometrics

Prof. Ioannis Pavlidis

Page 2: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#2

Definitions

• Associating an identity with an individual is called personal identification.– Verification refers to the problem of confirming

or denying a person’s claimed identity.– Recognition refers to the problem of

establishing a subject’s identity.

Page 3: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#3

Applications

• Accurate identification of a person could deter crime and fraud, streamline business processes, and save critical resources.– MasterCard estimates the credit card fraud at

$450 million per annum, which includes charges made on lost and stolen credit cards.

– ATM related fraud is worth approximately $3 billion annually.

Page 4: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#4

Identification Methods

• Traditional– A person’s possession (e.g., key or card)– A person’s knowledge of a piece of information

(e.g., user id and password)

• Biometrics– A person’s physical characteristics (e.g.,

fingerprints, face, and iris)

Page 5: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#5

Biometrics

• Any human physiological or behavioral characteristic could be a biometric provided it has the following desirable characteristics:– Universality: every person should have the characteristic.– Uniqueness: no two persons should be the same in terms of the

characteristic.– Permanence: the characteristic should be invariant with time.– Collectibility: the characteristic can be measured quantitatively.– Performance: the resource requirements to achieve an acceptable

identification accuracy.– Acceptability: to what extent people are willing to accept the

biometric system.– Circumvention: how easy is to fool the system by fraudulent

techniques.

Page 6: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#6

Biometrics Technologies

• Voice• Infrared Facial and Hand Vein Thermograms• Fingerprints• Face• Iris• Ear• Gait• Keystroke Dynamics• DNA• Signature and Acoustic Emissions• Odor• Retinal Scan• Hand and Finger Geometry

Page 7: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#7

Voice – Pros and Cons

• Pros– Voice capture is unobtrusive and voice print is an acceptable

biometric in almost all societies.– Some applications entail authentication of identity over telephone.

In such situations, voice may be the only feasible biometric.• Cons

– Voice is not expected to be sufficiently unique to permit recognition.

– A voice signal available for authentication is typically degraded in quality by the microphone, communication channel, and digitizer characteristics.

– Voice is a behavioral characteristic and is affected by a person’s health (e.g., cold), stress, and emotions.

– Some people are very good at mimicking the voice of others.

Page 8: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#8

Voice - Categories

• Text-dependent speaker verification authenticates the identity of a subject based on a fixed predetermined phrase.

• Text-independent speaker verification is more difficult and verifies a speaker identity independent of the phrase.

• Language-independent speaker verification verifies a speaker identity irrespective of the language of the uttered phrase and is even more challenging.

Page 9: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#9

Voice - Methodology

• The amplitude of the input signal may be normalized and decomposed into several band-pass frequency channels.

• The features extracted from each band may be either time-domain or frequency domain features.– Log of the Fourier Transform

• The matching strategy may typically employ approaches based on hidden Markov model, vector quantization, or dynamic time warping.

Page 10: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#10

Infrared Facial and Hand Vein Thermograms – Pros and Cons

• Pros– Human body radiates heat

and the pattern of heat radiation is a characteristic of each individual body.

– Infrared Imaging is unobtrusive.

• Cons– The absolute values of the

heat radiation are dependent upon many extraneous factors.

– The technology is expensive.

Page 11: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#11

Fingerprints – Pros and Cons

• Pros– It is one of the most mature biometric

technologies.– Fingerprints are believed to be unique to each

person.

• Cons– It has a stigma of criminality.

Page 12: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#12

Fingerprints - Acquisition

• A fingerprint image is captured in one of two ways:– Scanning an inked

impression of a finger

– Using a live-scan fingerprint scanner.

Page 13: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#13

Fingerprints - Methodology

• Four basic approaches to identification based on fingerprint are prevalent:– Invariant properties of the gray scale profiles of

the fingerprint image or part thereof.– Global ridge patterns, also known as fingerprint

classes.– Ridge patterns of fingerprints.– Fingerprint minutiae – the features resulting

mainly from ridge endings and bifurcations.

Page 14: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#14

Face – Pros and Cons

• Pros– Face is one of the most acceptable

biometrics because it is one of the most common method of identification that humans use.

– It is non-intrusive.• Cons

– Difficult to develop techniques to tolerate the effects of aging, facial expressions, slight variations in the imaging environment, and variations in the pose of face with respect to camera (2D and 3D rotations).

– Facial disguise is of concern in unattended applications.

Page 15: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#15

Face - Methodology

• Two primary approaches for face recognition are:– Transform Approach: the universe of face image

domain is represented using a set of orthonormal basis vectors. Currently, the most popular basis vectors are eigenfaces.

– Attribute-Based Approach: facial attributes like nose and eyes are extracted from the face image and the invariance of geometric properties among the face landmark features is used for recognition.

Page 16: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#16

Iris – Pros and Cons

• Pros– It is unique for each person

and each eye.

– The identification error rate using iris technology is believed to be extremely small and the method is very fast.

• Cons– It requires cooperation from

the user.

Page 17: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#17

Iris - Acquisition

• The image is obtained using an ordinary CCD camera with a resolution of 512 dpi.

• The user needs to register the image of the iris in the central imaging area and to ensure that the iris is a predetermined distance from the focal plane of the camera.

• A position-invariant constant length byte vector feature is derived from an annular part of the iris image based on its texture.

Page 18: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#18

Ear – Pros and Cons

• Pros– It is known that the shape

of the ear and the structure of the cartilegenous tissue of the pinna are distinctive.

• Cons– The features of an ear are

not expected to be unique to each individual (good for authentication only).

– No commercial systems are available yet.

Page 19: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#19

Gait – Pros and Cons

• Pros– Non-obtrusive.

• Cons– Gait is not supposed to be unique to each individual,

but is sufficiently characteristic to allow identity authentication.

– Gait is a behavioral characteristic and may not stay invariant over a large period of time (e.g., fluctuations of body weight or injuries involving joints or brain).

Page 20: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#20

Keystroke Dynamics – Pros and Cons

• Pros– It is unobtrusive

• Cons– This behavioral biometric is not expected to be

unique to each individual but it offers sufficient discriminatory information to permit identity authentication.

– One may expect to see large intra-individual variability.

Page 21: U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis

U of HCOSC 6397 – Lecture 1

#21

Keystroke Dynamics - Methodology

• Keystroke dynamic features are based on:– Time durations between the keystrokes– Dwell times – how long a person holds the key.

• Typical matching approaches use a neural network architecture.