Field Supervisor First Supervisor
Outline
1. 2. 3. 4. 5.
The Basics Biometric Technologies Multi-model Biometrics Performance Metrics Biometric Applications
Section I: The Basics
Why Biometric Authentication? Frauds in industry Identification vs. Authentication
What is Biometrics?
The automated use behavioral and physiological characteristics to determine or veiry an identity.
Rapid! Know Be Have
Frauds in industry happens in the following situations:
Safety deposit boxes and vaults Bank transaction like ATM withdrawals Access to computers and emails Credit Card purchase Purchase of house, car, clothes or jewellery Getting official documents like birth certificates or passports Obtaining court papers Drivers licence Getting into confidential workplace writing Checks
Why Biometric Application?
To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties To prevent fraudulent acts like faking ID badges or licenses. To ensure safety and security, thus decrease crime rates
Identification vs. Authentication
Identification It determines the identity of the person. No identity claim Many-to-one mapping. Cost of computation number of record of users. Authentication It determines whether the person is indeed who he claims to be. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users.
Captured biometric signatures come from a set of known biometric feature stored in the system.
Captured biometric signatures may be unknown to the system.
Section II: Biometric Technologies
Several Biometric Technologies Desired Properties of Biometrics Comparisons
Types of Biometrics
Fingerprint Face Recognition Session III Hand Geometry Iris Scan Voice Scan Session II Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA
Biometrics
2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics
Fingerprint
Fingerprint Extraction and Matching
Hand Geometry
Captured using a CCD camera, or LED Orthographic Scanning Recognition Systems Crossover = 0.1%
IrisCode
Face
Principal Component Analysis
Desired Properties
Universality Uniqueness Permanence Collectability Performance Users Accpetability Robustness against Circumvention
Comparison
Biometric Type Fingerprint Hand Geometry Voice Retina Iris Signature Face Accuracy High Medium Medium High Medium Medium Low Ease of Use Medium High High Low Medium Medium High User Acceptance Low Medium High Low Medium High High
Section III: A Multi-model Biometrics
Multi-modal Biometrics Pattern Recognition Concept A Prototype
Multimodal Biometrics
Pattern Recognition Concept
Sensors Extractors
Image- and signal- pro. algo.
Classifiers
Negotiator
Threshold
Biometrics
Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc
Data Rep.
1D (wav), 2D (bmp, tiff, png)
Feature Vectors
Scores
Decision: Match, Non-match, Inconclusive
Enrolment Submission
Training
An Example: A Multi-model System
Sensors Extractors Classifiers Negotiator
ID Face Extractor 2D (bmp) Voice Extractor 1D (wav) Voice Feature Voice MLP Face Feature Face MLP
Accept/ Reject
AND
Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool
Abstraction
Negotiation
Diff. Combination Strategies. e.g. Boosting, Bayesian
Logical AND Voice MLP Face MLP Voice Ex
{LPC, FFT, Wavelets, data processing}
Learning-based Classifiers NN, SVM, Extractors
Different Kernels (static or dynamic)
Cl-q Ex-q
Face Ex
Basic Operators
Signal Processing, Image Procesing
{Fitlers, Histogram Equalisation, Clustering, Convolution, Moments}
Data Representation Biometrics
1D
Voice, signature acoustics
2D
Face, Fingerprint, Iris, Hand Geometry, etc.
3D
Face
An Extractor Example: Wave Processing Class
fWaveProcessing cWaveProcessing cWaveOperator 1 1 Operators 1 cWaveStack cPeripherique Audio 1 cFFT 1 cFFilter 1 cWavelet 1 cLPC 1 cDataProcessing
Output data
Operants 1 1 cWaveObject
Input data
LSIIT, CNRS-ULP, Groupe de Recherche en Intelligence Artificielle
System Architecture in Details
Visage
Dtection des yeux
-50 50 0 0 10 20 30 40 50 -50 50 0 0 10 20 30 40
Normalisation Apprentissage et + Codage Reconnaissance Moment
Vert Bleu Hue Saturation Intensit
Dcision
Filtre de Trouver Trouver Inondation + base Y X Convolution
Identit
Voix
Frquence
Transformation de londelette
Effacer les silences
Temps
Pour plus de renseignements : Pr J. Korczak, Mr N. Poh <jjk, poh>@dpt-info.u-strasbg.fr
100 150 200 250 Intens ity
Int ens ity
100 150 200 250 Av erage Intensity of eac h row s
Grey Scale
Extraction
Rseau des neurones
w1
Base des donnes
Normalisation Apprentissage et + Codage Reconnaissance w2
Accepter, Rejeter
C0 C1 C2 C3 C4 C5 C6 C7 C9 C10 C11 C12 C13 C14 C15
Rseau des neurones
Section IV: Performance Metrics
Confusion Matrix FAR and FRR Distributed Analysis Threshold Analysis Receiver Operating Curve
Testing and Evaluation: Confusion Matrix
ID-1 Cl-1 Cl-2 Cl-3 0.98 0.01 ID-2 0.01 0.90 ID-3 0.05 0.78 False Accepts False Rejects Correct Wrong Threshold = 0.50
A Few Definitions
FAR = Total False Acceptence Total False Attempts
Total False Rejection Total True Attempts FRR =
EER is where FAR=FRR Crossover = 1 : x
Where x = round(1/EER)
Failure to Enroll, FTE Ability to Verify, ATV = 1- (1-FTE) (1-FRR)
Distribution Analysis
A = False Rejection B = False Acceptance
A typical wolf and a sheep distribution
Distribution Analysis: A Working Example
Before learning After learning
Wolves and Sheep Distribution
Threshold Analysis
Minimum cost
FAR and FRR vs. Threshold
Threshold Analysis : A Working Example
Face MLP Voice MLP
Combined MLP
Receiver Operating Curve (ROC)
ROC Graph : A Working Example
0,20 0,18 0,16 0,14 0,12 0,10 0,08 0,06 0,04 0,02 0,00 0,00 0,20 0,40 FRR 0,60 0,80
FAR=FRR
Face
Voice
0,20 0,18 0,16 0,14 0,12 0,10 0,08 0,06 0,04 0,02 0,00 0,00 0,20 0,40 FRR 0,60 0,80
FAR=FRR
Face
Voice
Com bined
Equal Error Rate Face : 0.14 Voice : 0.06 Combined : 0.007
Section V: Applications
Authentication Applications Identification Applications Application by Technologies Commercial Products
Biometric Applications
Identification or Authentication (Scalability)? Semi-automatic or automatic? Subjects cooperative or not? Storage requirement constraints? User acceptability?
Biometrics-enabled Authentication Applications
1. Cell phones, Laptops, Work Stations, PDA & Handheld device set. 2. Door, Car, Garage Access
3. ATM Access, Smart card
Image Source : http://www.voice-security.com/Apps.html
Biometrics-enabled Identification Applications
1. Forensic : Criminal Tracking e.g. Fingerprints, DNA Matching 2. Car park Surveillance 3. Frequent Customers Tracking
Application by Technologies
Biometrics Fingerprint
Vendors
Market Share 34%
Applications Law enforcement; civil government; enterprise security; medical and financial Time andtransactions attendance systems, physical access Transaction authentication; picture ID duplication prevention; surveillance Security, V-commerce Banking, access control
90
Hand Geometry Face Recognition Voice Authentication Iris Recognition
12
26% 15%
32 1
11% 9%
Commercial Products
The Eye Eye-Dentify IriScan Sensar Iridian The Fingerprint Identix BioMouse The FingerChip Veridicom The Head The Face Visionics Miros Viisage The Hand Hand Geometry Advanced Biometrics Recognition Systems Other Information Bertillonage International Biometric Group Palmistry The Voice iNTELLiTRAK QVoice VoicePrint Nuance Behavioral BioPassword CyberSign PenOp
Main Reference
[Brunelli et al, 1995] R. Brunelli, and D. Falavigna, "Personal identification using multiple cues," IEEE Trans. on Pattern
Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955-966, 1995
[Bigun, 1997] Bigun, E.S., J. Bigun, Duc, B.: Expert conciliation for multi modal person authentication systems by Bayesian
statistics, In Proc. 1st Int. Conf. On Audio Video-Based Personal Authentication, pp. 327-334, Crans-Montana, Switzerland, 1997
[Dieckmann et al, 1997] Dieckmann, U., Plankensteiner, P., and Wagner, T.: SESAM: A biometric person identification
system using sensor fusion, In Pattern Recognition Letters, Vol. 18, No. 9, pp. 827-833, 1997
[Kittler et al, 1997] Kittler, J., Li, Y., Matas, J. and Sanchez, M. U.: Combining evidence in multi-modal personal identity
recognition systems, In Proc. 1st International Conference On Audio Video-Based Personal Authentication, pp. 327-344, Crans-Montana, Switzerland, 1997
[Maes and Beigi, 1998] S. Maes and H. Beigi, "Open sesame! Speech, password or key to secure your door?", In Proc. 3
Asian Conference on Computer Vision, pp. 531-541, Hong Kong, China, 1998
rd
[Jain et al, 1999] Jain, A., Bolle, R., Pankanti, S.: BIOMETRICS: Personal identification in networked society, 2
Kluwer Academic Publishers (1999)
nd
Printing,
[Gonzalez, 1993] Gonzalez, R., and Woods, R. : "Digital Image Processing", 2nd edition, Addison-Wesley, 1993.