biometric t echnologies dr issa traore ece department
play

Biometric T echnologies Dr. Issa Traore ECE Department, University - PowerPoint PPT Presentation

Biometric T echnologies Dr. Issa Traore ECE Department, University of Victoria Information Security and Object T echnology (ISOT) Lab http://www.isot.ece.uvic.ca 1 Agenda Introduction Applications Requirements Biometric


  1. Biometric T echnologies Dr. Issa Traore ECE Department, University of Victoria Information Security and Object T echnology (ISOT) Lab http://www.isot.ece.uvic.ca 1

  2. Agenda  Introduction  Applications  Requirements  Biometric System  Biometric Examples  Biometric Errors  Selection Criteria  Conclusion 2

  3. Introduction  Biometrics: automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. ◦ Physiological characteristics: inherent physical traits ◦ Behavioral characteristics: traits that are learned or acquired. 3

  4. Applications  Foundation for an extensive array of highly secure identification and personal verification solutions. ◦ Access control ◦ Authentication ◦ Forensics ◦ Time-attendance ◦ Border security 4

  5. Requirements  Any human physiological and/or behavioral characteristic can be used as a biometric characteristic as long as it satisfies the following requirements: ◦ Universality: each person should have the characteristic; ◦ Distinctiveness: any two persons should be sufficiently different in terms of the characteristic; ◦ Permanence: the characteristic should be sufficiently invariant over a period of time; ◦ Collectability: the characteristic can be measured quantitatively. 5

  6. Requirements 6

  7. Requirements (ctd.)  In addition, a practical biometric is required to address the following issues: ◦ Performance ◦ Acceptability ◦ Resistance to Circumvention ◦ Privacy preservation 7

  8. Biometric System  Essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature set from the data, and comparing this feature set against the template set in the database.  Involve, depending on the application, three modes of operation: enrollment , verification, and identification modes. 8

  9. Biometric System (ctd.)  Enrolment Mode  Verification  Identification 9

  10. Biometric Examples  Fingerprint scan Digitized fingerprint image with minutiae points extracted ◦ one of the most commercially successful biometric technologies ◦ consists of analyzing small unique marks of the finger image known as minutiae. 10

  11. Biometric Examples (ctd.)  Face scan ◦ analyze the unique shape, pattern and positioning of facial features.  problems: ◦ people do change over time; wrinkles, beard, glasses and ◦ position of the 11 head can affect the

  12. Biometric Examples (ctd.)  Hand Geometry ◦ takes three- dimensional image of the hand and measures the shape and length of fingers and knuckles ◦ does not achieve the highest levels 12 of accuracy but it is

  13. Biometric Examples (ctd.)  Keystroke Dynamics Fly time between A and B ◦ behavioural biometric Key Down Key Up Key Down Key Up that aims to identify B B A A humans based on the analysis of their Dwell time Dwell time on A on B typing rhythms on a Time keyboard. ◦ measures:  dwell time: the length of time you hold down each key, 13 flight time: the time it takes

  14. Biometric System Errors  T wo types of errors: mistaking ◦ biometric measurements from two different persons to be from the same person called false match 14 (FM) or false accept

  15. Selection Criteria Hand Characteristic Fingerprints Geometry Retina Iris Face Signature Voice Ease of Use High High Low Medium Medium High High Lighting, Noise, Error Dryness, dirt, Hand injury, Poor age, Changing Glasses colds, incidence age age Lighting glasses, signatures weather hair Accuracy High Medium Very High Very High Medium Medium Medium Cost 2 4 8 8 3 1 2 User Medium Medium Medium Medium Medium Medium High acceptance Required High Medium High Very High Medium Medium Medium security level Long-term High Medium High High Medium Medium Medium stability 15

  16. Conclusion  Fast growing field ◦ Multibillion market  Several new emerging technologies, e.g., mouse dynamics 16

Recommend


More recommend