Biometric T echnologies Dr. Issa Traore ECE Department, University - - PowerPoint PPT Presentation

biometric t echnologies dr issa traore ece department
SMART_READER_LITE
LIVE PREVIEW

Biometric T echnologies Dr. Issa Traore ECE Department, University - - PowerPoint PPT Presentation

Biometric T echnologies Dr. Issa Traore ECE Department, University of Victoria Information Security and Object T echnology (ISOT) Lab http://www.isot.ece.uvic.ca 1 Agenda Introduction Applications Requirements Biometric


slide-1
SLIDE 1

1

Biometric T echnologies

  • Dr. Issa Traore

ECE Department, University of Victoria Information Security and Object T echnology (ISOT) Lab http://www.isot.ece.uvic.ca

slide-2
SLIDE 2

2

Agenda

 Introduction  Applications  Requirements  Biometric System  Biometric Examples  Biometric Errors  Selection Criteria  Conclusion

slide-3
SLIDE 3

3

Introduction

 Biometrics: automated methods of

identifying a person or verifying the identity of a person based on physiological or behavioral characteristics.

  • Physiological characteristics: inherent physical

traits

  • Behavioral characteristics: traits that are

learned or acquired.

slide-4
SLIDE 4

4

Applications

 Foundation for an extensive array of

highly secure identification and personal verification solutions.

  • Access control
  • Authentication
  • Forensics
  • Time-attendance
  • Border security
slide-5
SLIDE 5

5

Requirements

 Any human physiological and/or behavioral characteristic can be

used as a biometric characteristic as long as it satisfies the following requirements:

  • Universality: each person should have the characteristic;
  • Distinctiveness: any two persons should be sufficiently

different in terms of the characteristic;

  • Permanence: the characteristic should be sufficiently

invariant over a period of time;

  • Collectability: the characteristic can be measured

quantitatively.

slide-6
SLIDE 6

6

Requirements

slide-7
SLIDE 7

7

Requirements (ctd.)

 In addition, a practical biometric is

required to address the following issues:

  • Performance
  • Acceptability
  • Resistance to Circumvention
  • Privacy preservation
slide-8
SLIDE 8

8

Biometric System

 Essentially a pattern recognition system that

  • perates by acquiring biometric data from

an individual, extracting a feature set from the data, and comparing this feature set against the template set in the database.

 Involve, depending on the application,

three modes of operation: enrollment, verification, and identification modes.

slide-9
SLIDE 9

9

Biometric System (ctd.)

 Enrolment Mode  Identification  Verification

slide-10
SLIDE 10

10

Biometric Examples

 Fingerprint scan

  • one of the most

commercially successful biometric technologies

  • consists of

analyzing small unique marks of the finger image known as minutiae.

Digitized fingerprint image with minutiae points extracted

slide-11
SLIDE 11

11

Biometric Examples (ctd.)

 Face scan

  • analyze the unique

shape, pattern and positioning of facial features.

 problems:

  • people do change
  • ver time; wrinkles,

beard, glasses and

  • position of the

head can affect the

slide-12
SLIDE 12

12

Biometric Examples (ctd.)

 Hand

Geometry

  • takes three-

dimensional image

  • f the hand and

measures the shape and length of fingers and knuckles

  • does not achieve

the highest levels

  • f accuracy but it is
slide-13
SLIDE 13

13

Biometric Examples (ctd.)

 Keystroke

Dynamics

  • behavioural biometric

that aims to identify humans based on the analysis of their typing rhythms on a keyboard.

  • measures:

 dwell time: the length of time

you hold down each key, flight time: the time it takes

Time

A A B B

Fly time between A and B Dwell time

  • n A

Dwell time

  • n B

Key Up Key Up Key Down Key Down

slide-14
SLIDE 14

14

Biometric System Errors

 T

wo types of errors:

  • mistaking

biometric measurements from two different persons to be from the same person called false match (FM) or false accept

slide-15
SLIDE 15

15

Selection Criteria

Characteristic Fingerprints Hand Geometry Retina Iris Face Signature Voice Ease of Use

High High Low Medium Medium High High

Error incidence

Dryness, dirt, age Hand injury, age Glasses Poor Lighting Lighting, age, glasses, hair Changing signatures Noise, colds, weather

Accuracy

High Medium Very High Very High Medium Medium Medium

Cost

2 4 8 8 3 1 2

User acceptance

Medium Medium Medium Medium Medium Medium High

Required security level

High Medium High Very High Medium Medium Medium

Long-term stability

High Medium High High Medium Medium Medium

slide-16
SLIDE 16

16

Conclusion

 Fast growing field

  • Multibillion market

 Several new emerging technologies, e.g.,

mouse dynamics