Download Biometrics

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
What does it mean to us?





History
Biometrics Defined
Modern Day Applications
Spoofing
Future of Biometrics
1858First
use of hand images for identification
1903NY State Prisons begin using fingerprints
1936Concept of using the iris for identification
is proposed
1960Face recognition becomes semi automated
1969FBI pushes to make fingerprint recognition
an automated process
1970Automated biometrics, in general, starts to
become more than just a concept (because
of computers)




1988 First semi-automated facial recognition
system is deployed
1994 First iris recognition algorithm is
patented
1996 Hand geometry is implemented at the
Olympic games
1998 FBI launces CODIS (DNA forensic
database)
“Bio”
= life
“Metrics” = to measure
What someone has?
 What someone knows?
 What someone is?

Two Main Categories
 Physiological
 Behavioral






Sensor: Collect data
Signal Processing Algorithms: Develop the
Biometric Template
Data Storage Component: Holds information
that the new template will be compared to
Matching Algorithm: Compares new template
to the ones in the Data Storage Component
Decision Process: Makes system-level
decision

Advantages:
◦ Easy to Use
◦ Large amount of data to check against
◦ Proven effective in large scale systems

Disadvantages:
◦ Privacy perceptions by the public
◦ Requires physical contact

Advantages:
◦ Most accurate
◦ No physical contact required

Disadvantages:
◦
Most costly

Advantages:
◦ Most accurate
◦ No physical contact required

Disadvantages:
◦
◦
◦
Most costly
Can be difficult to capture
Lack of existing data to check against

Advantages:
◦ No physical contact required
◦ Commonly available sensors (cameras)
◦ Large amount of data to check against

Disadvantages:
◦
◦
◦
Face can be easily obstructed
Faces change over time
Frontal pose is usually necessary

Advantages:
◦ Easy to capture
◦ Believed to be highly stable pattern

Disadvantages:
◦
◦
Not sufficiently distinctive for identification over
large databases
System requires a large amount of physical space

Advantages:
◦ Most publically accepted
◦ No physical contact required
◦ Commonly available sensors
(telephones/microphones)

Disadvantages:
◦
Not sufficiently distinctive for identification over
large databases



Controlling Access to a physical location
◦ Labs / Buildings / etc.
Controlling Access to logical information
◦ Computer Accounts / Secure Electronic
Docs / etc.
Determining if a person is already in a
database
 “US
VISIT” program:
◦ Automated entry / exit control
system
◦ Currently, inkless fingerprints
and digital photos are required

Fingerprints are the most commonly spoofed
◦ Fake gummy fingers
◦ Breathing onto sensor
◦ Cutting off someone’s finger
How to deal with spoofing?


Based on recognition of physiological
activities as signs of life
Often done by adding additional hardware to
a biometrics system
 Fingerprints:
◦ Hardware addition:
 Detects temperature
 Detects pulse
◦ Software Addition:
 Detects perspiration
 Face:
Head movements
 Iris: Pupil movement / eye
movement
 Voice: Matching lip
movement (video) to the
audio
 Randomizing
Verification
Data
 Multiple Biometrics
 Multi-Factor Authentication
 Liveness
Detection
◦ Palm Scanning
 Distinctive as fingerprints
 No physical contact required
 Hand must be attached in order
for live veins to be present

Body Odor Detection:
◦ Still in early stages of research

Tongue Scanning:
◦
Uses a laser to create a 3D image of a tongue
 Passive
Authentication
 Convenience
◦ Virtual money
◦ Instant personalization
◦ Touch sensors
 Apple Patent
Thank
You