Jan. 14, 20041 Biometrics: Personal Identification Instructor: Natalia Schmid BIOM 426: Biometrics...

34
Jan. 14, 2004 1 Biometrics: Personal Identification Instructor: Natalia Schmid BIOM 426: Biometrics Systems

Transcript of Jan. 14, 20041 Biometrics: Personal Identification Instructor: Natalia Schmid BIOM 426: Biometrics...

Jan. 14, 2004 1

Biometrics: Personal Identification

Instructor: Natalia Schmid

BIOM 426: Biometrics Systems

Jan. 14, 2004 2

Outline Introduction Applications Identification methods Requirements to biometrics Biometrics technology Automatic Identification:

design representation feature extraction matching evaluation

Privacy Issues

Jan. 14, 2004 3

Introduction

Identification: associating identity with an individual.

Two types of identification problems:

verification (confirming or denying person's identity) Am I who I claim I am?

identification or recognition (establishing identity) Who am I?

password

PIN

Jan. 14, 2004 4

Introduction

Master Card: estimated fraud at 450 million per year

1 billion dollars worth of calls are made by cellular bandwidth thieves

ATM related fraud - 3 billion annually

3,000 illegal immigrants crossing the Mexican border each day

Facts:

Jan. 14, 2004 5

Identification methods

Person’s identity is everything what person represents and believes.

Engineering approach: reduce the problem to: (i) some possession ("something what he has") or (ii) some knowledge ("something what he knows")

Another approach: reduce it to a problem of authentication based on physical characteristics (physiological or behavioral).

Definition: Biometrics are person's identification based on his/her physiological or behavioral characteristics. "something that you are"

Jan. 14, 2004 6

New Definition

Biometrics are automated methods of recognizing a person

based on a physiological or behavioral characteristic.

(BCC2003)

Jan. 14, 2004 7

Requirements to biometrics

1. universality: everyone should have it

2. uniqueness: small probability that two persons are the same in terms of this characteristic

3. permanence: invariance with the time

4. collectability: can be measured quantitatively

5. performance: high identification accuracy

6. acceptability: acceptance by people

7. circumvention: how easy to fool the system by fraudulent technique

Jan. 14, 2004 8

Accepted Biometrics

Accepted and studied biometrics: voice, hand geometry, gait, fingerprint, ear, face, iris, retina, fingerprint, infrared facial and hand vein thermograms, key stroke, signature, DNA

DNA, signature, and fingerprint are recognized in court of law

Jan. 14, 2004 9

Biometric Technology: OverviewFingerprints: are graphical flow-like ridges.

Their formation depends on embrionic development. Factors:

(i) genetic, (ii) environmental

Fingerprint acquisition: (i) scanning inked impression, (ii) life-scan

Major representations: image, ridges, minutia (features derived

from ridges), or pores

Basic approaches to identification: (i) correlation based; (ii) global ridge patterns (classes); (iii) ridge patterns; (iv) fingerprint minutiae (ridge endings and bifurcations)

Jan. 14, 2004 10

Biometric Technology: OverviewFace: one of the most acceptable biometrics

Two identification approaches: (i) transform (eigenvalues, analysis of covariance matrix, orthonormal basis vectors)

(ii) attribute-based approach (geometirc features)

Factors that influence recognition: (i) facial disguise (ii) facial expressions (iii) lighting conditions (iv) pose variation

Jan. 14, 2004 11

Biometric Technology: OverviewIris: is one of the most reliable

biometrics.

Frontal images are obtained using near infrared camera (320 x 480 pixels) at distance < 1 meter.

Iris images are (i) segmented and (ii) encoded.

Twins have different iris patterns.

Jan. 14, 2004 12

Biometric Technology: Overview

Voice: is a behavioral characteristic and is not sufficiently unique (large database).

Processing: signal subdivided into a few frequency bands. The most commonly used feature is cepstral feature (log of FT in each band).

Matching strategies: hidden Markoff, vector quantization, etc.

Types of verification: text-dependent; text-independent;

language-independent.

Voice print is highly accepted biometrics.

Used for identification over the telephone.

Easy to fool the system.

Jan. 14, 2004 13

Biometric Technology: Overview

Infrared Facial and Hand Vein Thermogram:

Human bodies radiate heat.

Infrared sensors acquire an image of heat distribution along the body. Images = thermograms.

Imaging methods: similar to visible spectrum photographs.

Processing: raw images are normalized with respect to heat radiating from landmark features.

In uncontrolled environment, other sources of heat could be disturbance.

Jan. 14, 2004 14

Biometric Technology: Overview

Gait: is the specific way one walks. Complex spatio-temporal behavioral characteristic.

Gait is not unique and does not stay invariant over time.

It is influences by: distribution of body weight, injuries involving joints or brain, aging.

Gait features are derived from a video sequence and consists of charactertization of several movements (computer vision problem).

Jan. 14, 2004 15

Biometric Technology: Overview

Retinal Scan: Retinal vasculature is rich in structure.

Unique characteristic of each individual and each eye.

Not easy to change or replicate.

Image capture: requires person to peep into an eye-piece and focus on a specific spot. A predetermined part of retinal vasculature is imaged.

Requires cooperation.

Not accepted by public.

Can reveal some medical conditions as hypertension.

Jan. 14, 2004 16

Biometric Technology: Overview

Signature: the way person signs his/her name.

Highly acceptable behavioral biometrics.

Evolves over time and depends on physical and mental conditions.

Easily forged.

Modeling the invariance and automating signature recognition process is challenging.

Two approaches to signature verification: (i) static (geometric features = strokes) (ii) dynamic (strokes and acceleration, velocity, trajectory)

Jan. 14, 2004 17

Biometric Technology: Overview

Hand and finger geometry: is used for access control (50% of market).

System captures frontal and side views of palm.

Measurements: length and width of fingers, various distances.

The representation requirements are only 9 bytes.

Hand geometry is not unique but highly

acceptable.

Jan. 14, 2004 18

Comparison of Biometrics Technologies

Biometrics Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention Face High Low Medium High Low High Low Fingerprint Medium High High Medium High Medium High Hand Geometry

Medium Medium Medium High Medium Medium Medium

Keystrokes Low Low Low Medium Low Medium Medium Hand Vein Medium Medium Medium Medium Medium Medium High Iris High High High Medium High Low High Retinal Scan High High Medium Low High Low High Signature Low Low Low High Low High Low Voice Print Medium Low Medium Low Low High Low Facial Thermograms

High High Low High Medium High High

Odor High High High Low Low Medium Low DNA High High High Low High Low Low Gait Medium Low Low High Low High Medium Ear Medium Medium High Medium Medium High Medium

From “Biometrics: Personal Identification in Networked Society,” p. 16

Jan. 14, 2004 19

Automatic IdentificationHistory:

• Prehistoric Chinese used thumb-

print for identification;• Alphonse Bertillon’s System ofAnthropometric Identification (1882)is based on bodily measuments,physical description, and photographs.• Henry’s fingeprint classificationsystem (1880) classifies in > 100 classes.

1685

Sets of rules are developed for:(i) matching of biometrics(ii) searching databases

Automatic identification is due to: inexpensive computer resources, advances incomputer vision, pattern recognition, and image understanding.

Jan. 14, 2004 20

Applications

Civil applications:

Banking (electronic funds transfer, ATM security, Internet commerce, credit card transactions)

Physical access control (airport) Information system security (access to databases via login) Customs and immigration (identification based on hand geometry) Voter/driver registration Telecommunications (cellular bandwidth access control)

Jan. 14, 2004 21

Example

Jan. 14, 2004 22

Automatic IdentificationDesign

Identification system operates in two modes: (i) enrollment mode and (ii) identification.

Biometric Reader

Feature Extractor

Feature Extractor

Biometric Reader

Feature Matcher

Enrollment

Identification

Jan. 14, 2004 23

Automatic Identification

Enrollment mode:

- biometric measurement is captured - information from raw data extracted; - (feature, person) information is stored; - ID is issued (for verification).

Identification mode:

- biometric is sensed (live-scan); - features are extracted from the raw data; - match is performed (search of the database).

In verification mode, person presents ID. Then system performs match only against one template in the database.

Jan. 14, 2004 24

Recognition System

Acquisition Feature Extraction

System Knowledge

Object

Training

Testing

Acquisition MatchingFeature Extraction

Object

Outcome

Architecture of a typical pattern recognition system (see A. K. Jain, et al., p. 22).

Jan. 14, 2004 25

Design Issues

Given the speed, accuracy, and cost specifications

1. How to collect the input data? (3D, 2D, multiple views, high or low resolution)

2. Internal representation (features) for automatic feature extraction

3. How to extract features? (Algorithms, etc.)

4. How to select the "matching" metric? (Measurements are made in specific space)

5. How to implement it?

6. Organization of database

7. Effective methods for searching a template in the database (binning, etc.)

Jan. 14, 2004 26

AcquisitionQuality of collected data determines performance of the entire system.

Associated tasks:

(i) quality assessment (ii) segmentation (separation of the data into foreground and background).

Research efforts:

(i) richer data (3D, color, etc.) (ii) metrics for assessment quality of measurements. (iii) realistic models

Solutions: enhancement

Jan. 14, 2004 27

Representation

Which machine-readable representation captures the invariant and discriminatory information in the data?

Determine features s.t.

- invariant for the same individual (intraclass variation) - maximally distinct for different individuals (interclass)

More distincive features offer more reliable identification. Representation has to be storage space efficient (smart card: 2 Kbytes) Representation depends on biometrics

Jan. 14, 2004 28

Feature extraction

• Given raw data, automatically extracting the given representation is difficult problem.

Example: manual fingerprint system uses about a dozen of features. For automatic system, many of them are not easy to reliably detect.

Feature extraction procedures are typically designed in ad hoc manner (inefficient when measurements are noisy).

Determining effective models for features will help to reliably

extract them (esp. in noisy situations).

Jan. 14, 2004 29

Matching

Similarity metric should be robust against:

- noise, - structural and statistical variations, - aging, and artifacts of feature extraction module.

Example: signature (hard to define the ground truth)

Performance is determined by: (i) representation and (ii) similarity metric.

Trade-off: better engineering design vs. more complex matcher.

Example: fingerprint (variations in features and rigid matcher vs. Flexible matcher)

Jan. 14, 2004 30

Matching (Fingerprint)

Sources of distortion and noise:

(i) inconsistent contact (3D-to-2D)

(ii) non-uniform contact (due to dryness of skin, sweat, dirt, humidity in the air, etc.)

(iii) irreproducible contact (injuries to the finger)

(iv) feature extraction artifacts (measurement error)

(v) sensing itself adds noise

Jan. 14, 2004 31

Evaluation

An end-user questions: (i) Does the system makes an accurate identification? (ii) Is the system sufficiently fast? (iii) What is the cost of the system?

Because of noise, distortions, and limited information no metric is adequate for reliable identification.

Decisions: - genuine individual, - imposter.

Jan. 14, 2004 32

Evaluation

Four types of outcomes:

(1) Genuine individual is accepted (true) (2) Genuine individual is rejected (error) (3) Imposter is rejected (true)

(4) Imposter is accepted (error)

FAR - false acceptance rate

FRR - false rejection rate

EER - equal error rate

Given a database, performance is a RV and only can be estimated.

Jan. 14, 2004 33

EvaluationMeasure of performance:

ROC - receiver operating curve

Confidence Intervals

Jan. 14, 2004 34

Useful Links

http://www.biometrics.org/ (publications and periodicals; research and databases; meetings and events)

http://www.itl.nist.gov/div895/biometrics/

http://biometrics.cse.msu.edu/

http://www.tech.purdue.edu/it/resources/biometrics/

http://www.wvu.edu/~bknc/

http://www.citer.wvu.edu/