security biometric identification
play

Security Biometric identification recognition and/or verification - PowerPoint PPT Presentation

Biometric identification Use of a human anatomic or behavioural characteristic for automatic Security Biometric identification recognition and/or verification of a persons identity. Desired properties of this characteristic: Markus Kuhn


  1. Biometric identification Use of a human anatomic or behavioural characteristic for automatic Security – Biometric identification recognition and/or verification of a person’s identity. Desired properties of this characteristic: Markus Kuhn → universality – everyone should have it → uniqueness – no two persons should share it → permanence – it should be invariant with time → collectability – it should be practical to measure quantitatively Computer Laboratory Desired properties of the measurement technique: → performance (accuracy, resources) → acceptability Michaelmas 2003 – Part II → difficulty of circumvention A. K. Jain et al.: Biometrics – Personal Identification in Networked Society. Kluwer, 1999. Security 2003 – Biometrics 3 Identification and authentication Application requirements for biometric techniques → Recognition: Selection from a set of known identities → recognition or verification → Verification: confirming or denying a claimed identity → automatic/unsupervised or semi-automatic/supervised Commonly used means: → user cooperation and experience → Something you know: → covert or overt PIN, password, earlier transaction, . . . → Something you have: → storage requirements metal key, ID card, cryptographic key, smartcard, RF transpon- → performance requirements der, one-time password list, car registration plate, . . . → acceptability to user → Something you do: (cultural, ethical, social, religious, or hygienic taboos) handwriting/signature, accent, habits, . . . → size and environmental requirements of sensor → Something you are: gender, height, eye/hair colour, face, fingerprint, voice, . . . → cost Security 2003 – Biometrics 2 Security 2003 – Biometrics 4

  2. Recognition accuracy Iris patterns Four possible outcomes → Correct person accepted → Impostor rejected → Correct person rejected → Impostor accepted Probability of the last two incorrect outcomes is known as False Reject Rate (FRR) and False Accept Rate (FAR) . Biometric algorithms usually take a sensor signal, extract a feature vector and provide a distance metric. Adjust the maximum distance threshold for acceptance to trade-off FRR versus FAR. → Receiver Operating Characteristic (ROC) – the curve of possi- ble FAR/FRR tradeoffs. → Equal Error Rate (EER) – the result obtained by adjusting the acceptance threshold such that FAR and FRR are equal. Security 2003 – Biometrics 5 Security 2003 – Biometrics 7 Security properties of biometrics → Biometric measurements should not be considered secret. Un- like passwords, measured body characteristics cannot be re- placed after a compromise and they might be shared by multi- ple applications. Some are easy to sample covertly (face, voice, fingerprint, DNA). → Beware of the Birthday Paradox. To use a biometric for locating duplicates in n database entries, a false accept rate ≪ n − 2 is needed. → Unsupervised sensors need means for distinguishing genuine live human tissue from fake templates. The iris pattern of the eye is uniquely suited as a biometric character- istic. It is an internal organ that is well-protected against damage by a → Unsupervised biometric measurements should be attested by sensitive and highly transparent window (cornea). The entropy of an trusted and tamper-resistant sensor. iris image is at least 3 bit/mm 2 . Security 2003 – Biometrics 6 Security 2003 – Biometrics 8

  3. Iris recognition IrisCode performance → Acquisition from up to 1 m with wide-angle and tele camera. 0 10 → Infrared band avoids uncomfortable visible illumination and im- false accept rate false reject rate proves the contrast of dark eyes. −2 10 → Processing steps (Daugman’s IrisCode algorithm): locate eye, −4 10 zoom and focus, locate iris and pupil boundary, normalize both radii, locate obstructed areas (eyelids, eyelashes), polar coor- −6 10 dinate transform, 2D Gabor wavelet transform, use 2048 sign EER bits as feature vector. −8 10 → Compare feature vector by Hamming distance, try rotations. −10 10 → ≈ 10% mismatch for same, ≈ 50% mismatch for different iris. −12 10 → Theoretical equal error rate: ≈ 10 − 6 −14 → Live tissue verification via pupil reflex and oscillation? 10 0 256 512 768 1024 1280 1536 1792 2048 Hamming distance threshold J.G. Daugman: High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, 1148-1161. Security 2003 – Biometrics 9 Security 2003 – Biometrics 11 IrisCode Hamming distance threshold IrisCode receiver operating characteristics 0 10 different iris same iris −2 10 −4 10 Probability density false reject rate −6 10 EER −8 10 −10 10 −12 10 EER −14 10 −14 10 −12 10 0 256 512 768 1024 1280 1536 1792 2048 −10 −8 −6 −4 −2 0 10 10 10 10 10 10 Hamming distance false accept rate Security 2003 – Biometrics 10 Security 2003 – Biometrics 12

  4. Retina scan Uses pattern of blood vessels behind the retina as a biometric charac- teristic. Similar to iris recognition, but several disadvantages: → Compact sensor can see a significant part of the retina only from very short distance → user needs to bring head close to sensor and look directly into lens → slow and unergonomic. → Bright outdoor illumination causes pupil to contract too much. → Some users seem to be fearful because of the ophthalmologic feel of the procedure and possibly perceived health risks. Security 2003 – Biometrics 13 Security 2003 – Biometrics 15 Fingerprints Hand geometry → Biometric characteristic is the pattern of ridges and valleys . → Well-established forensic technique. → Patterns typically scanned with 0.05 mm (500 dpi) resolution. → Features can be the entire greyscale image, classes of ridge pat- terns (“arch”, “loop”, “whorl”, with landmarks such as cores and deltas), the ridge pattern, and fingerprint minutae (loca- tions and directions of ridge endings and bifurcations). → Classic recording technique is the ink fingerprint. → Modern fingerprint sensors: Biometric characteristic used are several dozen length and thicknesses mea- surements of the fingers. Digital camera captures two hand silhouettes. optical, capacitive, thermal, ultrasonic Hand needs to be aligned to posts, which may require some practice and → Typical processing steps: normalising, thresholding, thinning, good hand mobility. minutae extraction. Typical FAR 10 − 3 –10 − 4 with FRR 10 − 2 – With a typical EER of 10 − 3 more suited for verification rather than stand- 10 − 1 for single image. alone recognition. Therefore usually combined with PIN or card. Security 2003 – Biometrics 14 Security 2003 – Biometrics 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend