Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
What does it mean to us? History Biometrics Defined Modern Day Applications Spoofing Future of Biometrics 1858First use of hand images for identification 1903NY State Prisons begin using fingerprints 1936Concept of using the iris for identification is proposed 1960Face recognition becomes semi automated 1969FBI pushes to make fingerprint recognition an automated process 1970Automated biometrics, in general, starts to become more than just a concept (because of computers) 1988 First semi-automated facial recognition system is deployed 1994 First iris recognition algorithm is patented 1996 Hand geometry is implemented at the Olympic games 1998 FBI launces CODIS (DNA forensic database) “Bio” = life “Metrics” = to measure What someone has? What someone knows? What someone is? Two Main Categories Physiological Behavioral Sensor: Collect data Signal Processing Algorithms: Develop the Biometric Template Data Storage Component: Holds information that the new template will be compared to Matching Algorithm: Compares new template to the ones in the Data Storage Component Decision Process: Makes system-level decision Advantages: ◦ Easy to Use ◦ Large amount of data to check against ◦ Proven effective in large scale systems Disadvantages: ◦ Privacy perceptions by the public ◦ Requires physical contact Advantages: ◦ Most accurate ◦ No physical contact required Disadvantages: ◦ Most costly Advantages: ◦ Most accurate ◦ No physical contact required Disadvantages: ◦ ◦ ◦ Most costly Can be difficult to capture Lack of existing data to check against Advantages: ◦ No physical contact required ◦ Commonly available sensors (cameras) ◦ Large amount of data to check against Disadvantages: ◦ ◦ ◦ Face can be easily obstructed Faces change over time Frontal pose is usually necessary Advantages: ◦ Easy to capture ◦ Believed to be highly stable pattern Disadvantages: ◦ ◦ Not sufficiently distinctive for identification over large databases System requires a large amount of physical space Advantages: ◦ Most publically accepted ◦ No physical contact required ◦ Commonly available sensors (telephones/microphones) Disadvantages: ◦ Not sufficiently distinctive for identification over large databases Controlling Access to a physical location ◦ Labs / Buildings / etc. Controlling Access to logical information ◦ Computer Accounts / Secure Electronic Docs / etc. Determining if a person is already in a database “US VISIT” program: ◦ Automated entry / exit control system ◦ Currently, inkless fingerprints and digital photos are required Fingerprints are the most commonly spoofed ◦ Fake gummy fingers ◦ Breathing onto sensor ◦ Cutting off someone’s finger How to deal with spoofing? Based on recognition of physiological activities as signs of life Often done by adding additional hardware to a biometrics system Fingerprints: ◦ Hardware addition: Detects temperature Detects pulse ◦ Software Addition: Detects perspiration Face: Head movements Iris: Pupil movement / eye movement Voice: Matching lip movement (video) to the audio Randomizing Verification Data Multiple Biometrics Multi-Factor Authentication Liveness Detection ◦ Palm Scanning Distinctive as fingerprints No physical contact required Hand must be attached in order for live veins to be present Body Odor Detection: ◦ Still in early stages of research Tongue Scanning: ◦ Uses a laser to create a 3D image of a tongue Passive Authentication Convenience ◦ Virtual money ◦ Instant personalization ◦ Touch sensors Apple Patent Thank You