Biometrics and Security Biometrics and Security Biometrics and - - PowerPoint PPT Presentation

biometrics and security biometrics and security
SMART_READER_LITE
LIVE PREVIEW

Biometrics and Security Biometrics and Security Biometrics and - - PowerPoint PPT Presentation

Biometrics and Security Biometrics and Security Biometrics and Security Biometrics and Security WS 06/07 Seminar Prof. Dr.-Ing. Jana Dittmann & Dr.-Ing. Claus Vielhauer with support from Tobias Scheidat


slide-1
SLIDE 1

1

Biometrics and Security Biometrics and Security

Biometrics and Security Biometrics and Security

  • Prof. Dr.-Ing. Jana Dittmann & Dr.-Ing. Claus Vielhauer

WS 06/07 Seminar

with support from Tobias Scheidat tobias.scheidat@iti.cs.uni-magdeburg.de

Otto-von-Guericke University Magdeburg, Arbeitsgruppe AMSL

slide-2
SLIDE 2

2

Biometrics and Security Biometrics and Security Organisational part Organisational part

Presentation meetings and consultancy & discussion

meetings

Work is organized for one person or in groups with no

more than 2 students

Please register and sign on here:

https://omen.cs.uni-magdeburg.de/einschreiben/index.php

Web Site

http://wwwiti.cs.uni-magdeburg.de/iti_amsl/ lehre/06_07_WiSem/biosec_s/

slide-3
SLIDE 3

3

Biometrics and Security Biometrics and Security Organisational part Organisational part

5 Milestones until delivery:

  • M1. 2006-10-25

Registration

  • M2. 2006-12-06

Literature list, short presentation, interim report

  • M3. 2006-12-20

Review

  • M4. 2007-01-10

Submission of final report

  • M5. 2007-01-10, 2007-01-17, 2007-01-24

Final presentation

slide-4
SLIDE 4

4

Biometrics and Security Biometrics and Security Organisational part Organisational part

Short presentation and interim report

5-10 minutes Report must have 8-10 pages

Review will be done by other students Final presentation

Language: German or English, Slides: English 20-25 minutes presentation + questions

Final report

must have 12-15 pages Language: German or English

slide-5
SLIDE 5

5

Biometrics and Security Biometrics and Security Organisational part Organisational part

Review Review

Reviewer's familiarity Evaluation of Work and Contribution Originality and Novelty Quality of Presentation References Technical Correctness Overall Rating

slide-6
SLIDE 6

6

Biometrics and Security Biometrics and Security Topics Topics

  • 1. Evaluation of biometric Systems
  • 2. Biometrics and Cryptography
  • 3. Biometrics and Data Protection
  • 4. Development and Aging of Handwriting
  • 5. Multi-biometric Fusion
  • 6. Biosecure Signature Reference System
  • 7. Synthetic Handwriting
  • 8. Biometric Databases
  • 9. Soft Biometrics
  • 10. Spoofing in biometrics
  • X. Free Topic
slide-7
SLIDE 7

7

Biometrics and Security Biometrics and Security

  • 1. Evaluation of biometric Systems
  • 1. Evaluation of biometric Systems

Biometric error rates

Definition, determination, dependencies, … FAR/FRR/EER, FNMR/FMR, DET, ROC, ...

Types of distribution of feature distances

Genuine Distribution, Inter-Template Distribution, Impostor

Distribution

Evaluation of handwriting authentication systems

Types of forgeries

References:

  • J. L. Wayman, Technical Testing and Evaluation of Biometric Identification

Devices

  • A. Wahl et al.: Generation and Evaluation of Brute Force Signature Forgeries
  • F. Zöbisch, C. Vielhauer: A test tool to support brute-force online and offline

signature forgery tests on mobile devices

  • G. Lassmann, Bewertungskriterien zur Vergleichbarkeit biometrischer Verfahren

(„Kriterienkatalog“) (in German)

slide-8
SLIDE 8

8

Biometrics and Security Biometrics and Security

  • 2. Biometrics and Cryptography
  • 2. Biometrics and Cryptography

Literature survey:

Generating cryptographic keys from biometric data

Problems using biometric data for key generation How to generate cryptographic keys from fuzzy data?

Protection of biometric data using cryptographic methods

Hiding biometric data Watermarking

References:

  • Y. Dodis, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate

Strong Keys from Biometrics and Other Noisy Data

  • U. Uludag, A.K. Jain: Fuzzy Fingerprint Vault
  • M. Freire-Santosa, J. Fierrez-Aguilara, J. Ortega-Garciaa:

Cryptographic key generation using handwritten signature

slide-9
SLIDE 9

9

Biometrics and Security Biometrics and Security

  • 3. Biometrics and Data Protection
  • 3. Biometrics and Data Protection

Legal aspects which have to taken into account for:

Acquisition Storing Usage Transfer

  • f biometric data in European countries:

Germany, Greece, Norway, UK

References:

General links: http://www.datenschutz-berlin.de/kontroll/europa.htm Greece: http://www.dpa.gr/Documents/Eng/Law%202472-97-en-

amended.doc

Norway: http://www.datatilsynet.no/upload/Dokumenter/

regelverk/lov_forskrift/ lov-20000414-031-eng.pdf

UK: http://www.ico.gov.uk/,

http://www.opsi.gov.uk/acts/acts1998/19980029.htm

slide-10
SLIDE 10

10

Biometrics and Security Biometrics and Security

  • 4. Development and Aging of Handwriting
  • 4. Development and Aging of Handwriting

Development of handwriting

From child to young people

Changes caused by illness, injury and aging

E.g. ageing of body parts and nervous system

Other aspects

Ideas to simulate changes of handwriting data

References:

Hecker, M.R.: „Forensische Handschriftenuntersuchung: Eine

systematische Darstellung von Forschung, Begutachtung und Beweiswert“, Kriminalistik Verlag Heidelberg, 1993 (in German)

Seibt, A.: „Forensische Schriftgutachten: Einführung in Methode und

Praxis“, Verlag C.H. Beck, München, 1999 (in German)

Michel, L.: „Gerichtliche Schriftvergleichung: Eine Einführung in

Grundlagen, Methoden und Praxis“, Walter de Gruyter Verlag Berlin, 1982 (in German)

slide-11
SLIDE 11

11

Biometrics and Security Biometrics and Security

  • 5. Multi
  • 5. Multi-
  • biometric Fusion

biometric Fusion

Literature survey on biometric fusion strategies

Terms and definitions

E.g. fusion level, fusion strategies

Type of fusion

Multimodal vs. Multi-algorithmic vs. Multi-sensor

Examples of multi-biometric fusion systems

References:

K.W. Bowyer et al.: Multi-Modal Biometrics: An Overview

  • A. Ross, A.K. Jain: Multimodal Biometrics: An Overview

A.K. Jain, A. Ross: Multibiometric Systems

  • T. Scheidat, C. Vielhauer, J. Dittmann: Distance-Level Fusion

Strategies for Online Signature Verification

slide-12
SLIDE 12

12

Biometrics and Security Biometrics and Security

Systematic evaluation of an existing signature reference

system

System is based on 5 signature verification algorithms Exchangeable modules for process steps Test and comparison of several system configurations, e.g.

2 preprocessing modules Feature selection (with/without) Fusion of algorithms …

References:

Reference system documentation

6.

  • 6. Biosecure

Biosecure Signature Reference System Signature Reference System

slide-13
SLIDE 13

13

Biometrics and Security Biometrics and Security

  • 7. Synthetic Handwriting
  • 7. Synthetic Handwriting

Literature study on synthetic handwriting Creation of handwriting based on

Existing offline or online handwriting data Bézier curves, splines, action description, … Dynamic information extracted from static handwriting data

References:

  • I. Guyon: Handwriting synthesis from handwritten glyphs
  • H. Bunke, T. Varga: Effects of Training Set Expansion in Handwriting

Recognition Using Synthetic Data

  • T. Varga, D. Kilchhofer, H. Bunke: Template-based Synthetic

Handwriting Generation for the Training of Recognition Systems

  • Y. Qiao, M. Yasuhara: Recovering Dynamic Information from Static

Handwritten Images

slide-14
SLIDE 14

14

Biometrics and Security Biometrics and Security

  • 8. Biometric Databases
  • 8. Biometric Databases

Literature and web survey regarding biometric databases Aspects:

uni-modal or multi-modal royalty free or commercial used for biometric competitions or evaluation campaigns modalities contained Number and kind of individuals, samples, devices, …

References:

  • J. Ortega-Garcia et al.: MCYT baseline corpus: a bimodal biometric

database

  • B. Dumas et al: MyIdea - Multimodal Biometrics Database, Description of

Acquisition Protocols

Web sites of: BANCA, MCYT, biometric competitions (SVC, FVC,…), …

slide-15
SLIDE 15

15

Biometrics and Security Biometrics and Security

  • 9. Soft Biometrics
  • 9. Soft Biometrics

Additional information about bearer of biometric

characteristic and environment

Classification of soft biometrics Creation and usage of user groups based on soft biometrics Evaluation results using soft biometrics

References:

A.K. Jain, S.C. Dass, K. Nandakumar: Soft Biometric Traits for

Personal Recognition Systems

  • M. Castrill´on-Santana et al.: Gender and Identity Classification for a

Naive and Evolving System

  • T. Scheidat, F. Wolf, C. Vielhauer: Analyzing Handwriting Biometrics in

Metadata Context

slide-16
SLIDE 16

16

Biometrics and Security Biometrics and Security

  • X. Free Topic
  • X. Free Topic

Choose a topic related to biometrics and security you

are interested in

Precondition:

Related to biometrics and security Different from other topics in this course

References:

http://www.google.com/ http://citeseer.ist.psu.edu/ ...