Professional Documents
Culture Documents
Bojan Cukic
2-2
Introduction
Biometrics
Engineering Definition and Approaches Definition, Criteria for Selection Survey of Current Biometrics and Relative Properties Introduction to socio-legal implications and issues
2-3
Dispersion of people from their Natural ID Centers Social units have grown to tens of thousands or millions/billions. Need to assure associations of identity with end-to-end transactions without physical presence Project your presence (ID) instantly, accurately, and securely across any distance
2-4
Identification Methods
We need to achieve this recognition automatically in order to authenticate our identity. Identity is not a passive thing, but associated with an act or intent involving the person with that identity Seek a manageable engineering definition.
2-5
Biometric Identification
Enabled by inexpensive embedded computing and sensing. Computer controlled acquisition, processing, storage, and matching using biometrics.
Biometric systems are one solution to increasing demand for strong authentication of actions in a global environment.
An automated biometric system uses biological, physiological or behavioral characteristics to automatically authenticate the identity of an individual based on a previous enrollment event. For the purposes of this course, human identity authentication is the focus. But in general, this need not necessarily be the case.
2-7
Useful Biometrics
1. Universality
2-9
Useful Biometrics
2. Uniqueness
Useful Biometrics
3. Permanence
At best this is an approximation Degree of permanence has a major impact on the system design and long term operation of biometrics. (e.g. enrollment, adaptive matching design, etc.) Long vs. short-term stability
2 - 11
Useful Biometrics
4. Collectability
2 - 12
Current/Potential Biometrics
Voice Infrared facial thermography Fingerprints Face Iris Ear EKG, EEG Odor
Gait Keystroke dynamics DNA Signature Retinal scan Hand & finger geometry Subcutaneous blood vessel imaging
System-Level Criteria
Our four criteria were for evaluation of the viability of a chosen characteristic for use as a biometric Once incorporated within a system the following criteria are key to assessment of a given biometric for a specific application:
System Design and Implementation must adequately address these issues to the satisfaction of the user, the law, and society.
Is the biometric data like personal information (e.g. such as medical information) ? Can medical information be derived from the biometric data? Does the biometric system store information enabling a persons identity to be reconstructed or stolen? Is permission received for any third party use of biometric information?
2 - 15
Continued:
What happens to the biometric data after the intended use is over? Is the security of the biometric data assured during transmission and storage?
Contrast process of password loss or theft with that of a biometric. How is a theft detected and new biometric recognized?
Notice of Biometric Use. Is the public aware a biometric system is being employed?
2 - 16
Acceptable overall performance for a given application Acceptable impact from a socio-legal perspective
Examine the architecture of a biometric system, its subsystems, and their interaction Develop an understanding of design choices and tradeoffs in existing systems Build a framework to understand and quantify performance
2 - 17
Identity
Camera(s), Iris, Hand, Face,
Arrhythmia, SIDS,
Minutia extraction
M A T C H ?
Microbial
Action
2 - 19
System Architecture
Biometric Applications
Four general classes: Access (Cooperative, known subject) Logical Access (Access to computer networks, systems, or
files)
Surveillance
Forensics
Transactions via e-commerce Search of digital libraries Computer logins Access to internet and local networks Document encryption Credit cards and ATM cards Access to office buildings and homes Protecting personal property Tracking and storing time and attendance Law enforcement and prison management Automated medical diagnostics Access to medical and official records.
2 - 22
System Architecture
One to Many (millions) match (1:Many) One to few (less than 500) (1:Few) Cooperative and Non-cooperative subjects One to One Match (1:1) Typically assume cooperative subject
user biometric data in order to render an authentication decision based on the outcome of a matching process of the stored to current template.
Acquire and Digitize Biometric Data Extract High Quality Biometric Features/Representation Formulate Biometric Feature/Rep Template Template Matcher Decision Output
2 - 24
Authentication Application:
No
Transmission
Database
Generate Template
2 - 25
Authentication Application:
No
Transmission
Quality Sufficient?
Yes Generate Template
Database
Template Match
Yes
Decision Confidence?
No
2 - 26
Architecture Subsystems
What comprises these subsystems and how do they interact with other elements (what are their interface and performance specifications?)
2 - 27
Biometric choice, presentation of biometric, biometric data collection by sensor and its digitization.
Recollect
Transmission
2 - 28
Transmission Module
Encryption
2 - 29
Recollect
No
Transmission
Compression
Transmission
Decompress
Decryption
Encryption
Database
Yes
Template Match
Decision Confidence?
No
2 - 30
Architecture Subsystems
Database module
Recollect
No
Transmission Transmission
Compression
Decryption
Encryption
Expansion
Database
Biometric Template: A file holding a mathematical representation of the identifying features extracted from the raw biometric data. Templates Images
Template Match
Decision Confidence?
Yes
No
2 - 31
Architecture Subsystems
Decision module
Is there enough similarity to the stored information to declare a match with a certain confidence ?
Reprocess
Recollect
No
Transmission Transmission
Compression
Decompress
Decryption
Encryption
Database
Templates Images
Yes
No
2 - 32