biometrics and security biometrics and security
play

Biometrics and Security Biometrics and Security Biometrics and - PowerPoint PPT Presentation

Biometrics and Security Biometrics and Security Biometrics and Security Biometrics and Security WS 06/07 Seminar Prof. Dr.-Ing. Jana Dittmann & Dr.-Ing. Claus Vielhauer with support from Tobias Scheidat


  1. Biometrics and Security Biometrics and Security Biometrics and Security Biometrics and Security WS 06/07 Seminar Prof. Dr.-Ing. Jana Dittmann & Dr.-Ing. Claus Vielhauer with support from Tobias Scheidat tobias.scheidat@iti.cs.uni-magdeburg.de Otto-von-Guericke University Magdeburg, Arbeitsgruppe AMSL 1

  2. Organisational part Organisational part � Presentation meetings and consultancy & discussion meetings Biometrics and Security Biometrics and Security � Work is organized for one person or in groups with no more than 2 students � Please register and sign on here: https://omen.cs.uni-magdeburg.de/einschreiben/index.php � Web Site http://wwwiti.cs.uni-magdeburg.de/iti_amsl/ lehre/06_07_WiSem/biosec_s/ 2

  3. Organisational part Organisational part � 5 Milestones until delivery: Biometrics and Security Biometrics and Security � M1. 2006-10-25 � Registration � M2. 2006-12-06 � Literature list, short presentation, interim report � M3. 2006-12-20 � Review � M4. 2007-01-10 � Submission of final report � M5. 2007-01-10, 2007-01-17, 2007-01-24 � Final presentation 3

  4. Organisational part Organisational part � Short presentation and interim report Biometrics and Security Biometrics and Security � 5-10 minutes � Report must have 8-10 pages � Review will be done by other students � Final presentation � Language: German or English, Slides: English � 20-25 minutes presentation + questions � Final report � must have 12-15 pages � Language: German or English 4

  5. Organisational part Organisational part Review Review � Reviewer's familiarity Biometrics and Security Biometrics and Security � Evaluation of Work and Contribution � Originality and Novelty � Quality of Presentation � References � Technical Correctness � Overall Rating 5

  6. Topics Topics 1. Evaluation of biometric Systems 2. Biometrics and Cryptography Biometrics and Security Biometrics and Security 3. Biometrics and Data Protection 4. Development and Aging of Handwriting 5. Multi-biometric Fusion 6. Biosecure Signature Reference System 7. Synthetic Handwriting 8. Biometric Databases 9. Soft Biometrics 10. Spoofing in biometrics X. Free Topic 6

  7. 1. Evaluation of biometric Systems 1. Evaluation of biometric Systems � Biometric error rates � Definition, determination, dependencies, … Biometrics and Security Biometrics and Security � FAR/FRR/EER, FNMR/FMR, DET, ROC, ... � Types of distribution of feature distances � Genuine Distribution, Inter-Template Distribution, Impostor Distribution � Evaluation of handwriting authentication systems � Types of forgeries � References: J. L. Wayman, Technical Testing and Evaluation of Biometric Identification � Devices A. Wahl et al.: Generation and Evaluation of Brute Force Signature Forgeries � F. Zöbisch, C. Vielhauer: A test tool to support brute-force online and offline � signature forgery tests on mobile devices G. Lassmann, Bewertungskriterien zur Vergleichbarkeit biometrischer Verfahren � 7 („Kriterienkatalog“) (in German)

  8. 2. Biometrics and Cryptography 2. Biometrics and Cryptography � Literature survey: � Generating cryptographic keys from biometric data Biometrics and Security Biometrics and Security � Problems using biometric data for key generation � How to generate cryptographic keys from fuzzy data? � Protection of biometric data using cryptographic methods � Hiding biometric data � Watermarking � References: � Y. Dodis, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data � U. Uludag, A.K. Jain: Fuzzy Fingerprint Vault � M. Freire-Santosa, J. Fierrez-Aguilara, J. Ortega-Garciaa: Cryptographic key generation using handwritten signature 8

  9. 3. Biometrics and Data Protection 3. Biometrics and Data Protection � Legal aspects which have to taken into account for: � Acquisition Biometrics and Security Biometrics and Security � Storing � Usage � Transfer � of biometric data in European countries: � Germany, Greece, Norway, UK � References: � General links: http://www.datenschutz-berlin.de/kontroll/europa.htm � Greece: http://www.dpa.gr/Documents/Eng/Law%202472-97-en- amended.doc � Norway: http://www.datatilsynet.no/upload/Dokumenter/ regelverk/lov_forskrift/ lov-20000414-031-eng.pdf � UK: http://www.ico.gov.uk/, http://www.opsi.gov.uk/acts/acts1998/19980029.htm 9

  10. 4. Development and Aging of Handwriting 4. Development and Aging of Handwriting � Development of handwriting � From child to young people Biometrics and Security Biometrics and Security � Changes caused by illness, injury and aging � E.g. ageing of body parts and nervous system � Other aspects � Ideas to simulate changes of handwriting data � References: � Hecker, M.R.: „Forensische Handschriftenuntersuchung: Eine systematische Darstellung von Forschung, Begutachtung und Beweiswert“, Kriminalistik Verlag Heidelberg, 1993 (in German) � Seibt, A.: „Forensische Schriftgutachten: Einführung in Methode und Praxis“, Verlag C.H. Beck, München, 1999 (in German) � Michel, L.: „Gerichtliche Schriftvergleichung: Eine Einführung in Grundlagen, Methoden und Praxis“, Walter de Gruyter Verlag Berlin, 1982 (in German) 10

  11. 5. Multi- -biometric Fusion biometric Fusion 5. Multi � Literature survey on biometric fusion strategies � Terms and definitions Biometrics and Security Biometrics and Security � E.g. fusion level, fusion strategies � Type of fusion � Multimodal vs. � Multi-algorithmic vs. � Multi-sensor � Examples of multi-biometric fusion systems � References: � K.W. Bowyer et al.: Multi-Modal Biometrics: An Overview � A. Ross, A.K. Jain: Multimodal Biometrics: An Overview � A.K. Jain, A. Ross: Multibiometric Systems � T. Scheidat, C. Vielhauer, J. Dittmann: Distance-Level Fusion Strategies for Online Signature Verification 11

  12. 6. Biosecure Biosecure Signature Reference System Signature Reference System 6. � Systematic evaluation of an existing signature reference system Biometrics and Security Biometrics and Security � System is based on 5 signature verification algorithms � Exchangeable modules for process steps � Test and comparison of several system configurations, e.g. � 2 preprocessing modules � Feature selection (with/without) � Fusion of algorithms � … � References: � Reference system documentation 12

  13. 7. Synthetic Handwriting 7. Synthetic Handwriting � Literature study on synthetic handwriting � Creation of handwriting based on Biometrics and Security Biometrics and Security � Existing offline or online handwriting data � Bézier curves, splines, action description, … � Dynamic information extracted from static handwriting data � References: � I. Guyon: Handwriting synthesis from handwritten glyphs � H. Bunke, T. Varga: Effects of Training Set Expansion in Handwriting Recognition Using Synthetic Data � T. Varga, D. Kilchhofer, H. Bunke: Template-based Synthetic Handwriting Generation for the Training of Recognition Systems � Y. Qiao, M. Yasuhara: Recovering Dynamic Information from Static Handwritten Images 13

  14. 8. Biometric Databases 8. Biometric Databases � Literature and web survey regarding biometric databases � Aspects: Biometrics and Security Biometrics and Security � uni-modal or multi-modal � royalty free or commercial � used for biometric competitions or evaluation campaigns � modalities contained � Number and kind of individuals, samples, devices, … � References: � J. Ortega-Garcia et al.: MCYT baseline corpus: a bimodal biometric database � B. Dumas et al: MyIdea - Multimodal Biometrics Database, Description of Acquisition Protocols � Web sites of: BANCA, MCYT, biometric competitions (SVC, FVC,…), … 14

  15. 9. Soft Biometrics 9. Soft Biometrics � Additional information about bearer of biometric characteristic and environment Biometrics and Security Biometrics and Security � Classification of soft biometrics � Creation and usage of user groups based on soft biometrics � Evaluation results using soft biometrics � References: � A.K. Jain, S.C. Dass, K. Nandakumar: Soft Biometric Traits for Personal Recognition Systems � M. Castrill´on-Santana et al.: Gender and Identity Classification for a Naive and Evolving System � T. Scheidat, F. Wolf, C. Vielhauer: Analyzing Handwriting Biometrics in Metadata Context 15

  16. X. Free Topic X. Free Topic � Choose a topic related to biometrics and security you are interested in Biometrics and Security Biometrics and Security � Precondition: � Related to biometrics and security � Different from other topics in this course � References: � http://www.google.com/ � http://citeseer.ist.psu.edu/ � ... 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend