An Introduction to Biometric Recognition

Size: px
Start display at page:

Download "An Introduction to Biometric Recognition"

Transcription

1 An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, IEEE Transactions on Circuits and Systems for Video Technologies, vol. 14, no. 1, Jan Multimedia Security

2 Outline (1/2) Part Ⅰ. Introduction Part Ⅱ. Biometric System Part Ⅲ. Biometric System Errors Part Ⅳ. Comparison of Various Biometrics Part Ⅴ. Application of Biometric Systems 2

3 Outline (2/2) Part Ⅵ. Advantage and Disadvantage of Biometrics Part Ⅶ. Limitation of (Unimodal) Biometric Systems Part Ⅷ. Multimodal Biometric Systems Part Ⅸ. Social Acceptance and Privacy Issues 3

4 Ⅰ. Introduction (1/5) The term biometric comes from the Greek words bios (life) and metrikos (measure). Biometrics individuals physiological and/or behavioral characteristics. 4

5 Ⅰ. Introduction (2/5) Biometric Recognition who she is vs. what she possesses 5

6 Ⅰ. Introduction (3/5) What biological measurements qualify to be a biometric? a) Universality b) Distinctiveness c) Permanence d) Collectability 6

7 Ⅰ. Introduction (4/5) In a practical biometric system, there are a number of other issues that should be considered a) Performance b) Acceptability c) Circumvention 7

8 Ⅰ. Introduction (5/5) In conclusion, the system should meet a) Accuracy b) Speed c) Resource requirement d) Be harmless to the users e) Be accepted by the intended population f) Be sufficient robust to various attack 8

9 Ⅱ. Biometric System (1/10) A biometric system is essentially a pattern recognition system. 9

10 Ⅱ. Biometric System (2/10) A biometric system is designed using the following four main modules. 1) Sensor module (encapsulating a quality checking module) 2) Feature module 3) Matcher module (encapsulating a decision making module) 4) System database module 10

11 Ⅱ. Biometric System (3/10) A sample flow chart: template Sensor Matcher Qualify checker Feature Extractor Decision Maker System Database The templates in the system database may be updated over time. True / False 11

12 Ⅱ. Biometric System (4/10) A biometric system may operate either in verification mode or identification mode. a) Verification mode: Does this biometric data belong to Bob? b) Identification mode: Whose biometric data is this? 12

13 Ⅱ. Biometric System (5/10) Template Login Interface Quality Checker Feature Extractor System Database Get Name & Snapshot Check Quality Enrollment 13

14 Ⅱ. Biometric System (6/10) Claimed identity Login Interface Get Name & Snapshot Feature Extractor Extract Features Matcher One match One template System Database Verification True / False 14

15 Ⅱ. Biometric System (7/10) Login Interface Get Name & Snapshot Feature Extractor Extract Features Matcher N match N templates System Database Identification User s identity or user unidentified 15

16 Ⅱ. Biometric System (8/10) Recognition is the generic term of verification and identification. We do not make a distinction between verification and identification. 16

17 Ⅱ. Biometric System (9/10) Describing the verification problem: a) An input feature vector: X Q b) A claimed identity: I c) The biometric template corresponding to I : X I d) The similarity between X Q and X I : S(X Q, X I ) e) The predefined threshold of similarity: t f) True (a genuine user): ω 1 ; False (an imposter): ω 2 ( I, X Q ω1, ) ω2, if S( X Q, X I otherwise ) t 17

18 Ⅱ. Biometric System (10/10) The identification problem a) The identity enrolled in the system: I k, k=1, 2,, N b) The reject case: I N+1 c) The biometric template corresponding to I k : X Ik X Q I I k, N 1, if max{s( X Q, X Ik )} t, otherwise k 1, 2,, N 18

19 Ⅲ. Biometric System Errors (1/9) A biometric verification system makes two types of errors: 1) mistaking biometric measurements from two different persons to be from the same person (called false match) 2) mistaking two biometric measurements from the same person to be from two different persons (called false non-match) 19

20 Ⅲ. Biometric System Errors (2/9) Hypothesis testing: 1) H 0 : input X Q does not come from the same person as the template X I 2) H 1 : input X Q comes from the same person as the template X I 20

21 Ⅲ. Biometric System Errors (3/9) Decision: D 0 : person is not who she claims to be D 1 : person is who she claims to be. If S (X Q, X I ) t, then decide D 1, else decide D 0. 21

22 Ⅲ. Biometric System Errors (4/9) Such a hypothesis testing formulation contains two type of error: Type Ⅰ(α): false match (D 1, when H 0 ) Type Ⅱ(β): false non-match (D 0, when H 1 ) FMR is the probability of Type I error FNMR is the probability of Type II error 22

23 Probability (p ) Ⅲ. Biometric System Errors (5/9) Imposter Distribution p (s H 0 ) Decision Threshold (t ) Genuine Distribution p (s H 1 ) FNMR = P (D 0 H 1 ) FMR = P (D 1 H 0 ) - Matching Score (s ) 23

24 Ⅲ. Biometric System Errors (6/9) The errors in identification mode: FMR N : the identification false match rate FNMR N : the identification false non-match rate FMR N = 1 (1 FMR) N ~ N FMR FNMR N ~ FNMR 24

25 Ⅲ. Biometric System Errors (7/9) Some situation may lead to following formulation of FMR N and FNMR N. a) FNMR N = RER + (1 - RER) FNMR RER: retrieval error rate b) FMR N = 1 (1 FMR) N P P: the average percentage of database searched during the identification 25

26 False Match Rate (FMR) Ⅲ. Biometric System Errors (8/9) Forensic Applications Civilian Applications High-security Applications False Non-match Rate (FNMR) 26

27 Ⅲ. Biometric System Errors (9/9) Important specifications in a biometric system: 1) FMR: false match rate 2) FNMR: false non-match rate 3) FTC: failure to capture (e.g., a faint fingerprint) 4) FTE: failure to enroll 27

28 Ⅳ. Comparison of Various Biometrics (1/10) Each biometric has its strengths and weaknesses. No biometric is optimal. A brief introduction of the commonly used biometrics is given below 28

29 DNA Ears Ⅳ. Comparison of Various Biometrics (2/10) 1-D ultimate unique code identical twins have identical DNA patterns contamination and sensitivity automatic real-time recognition issues privacy issues The shape of the ear the structure of the cartilaginous tissue of the pinna 29

30 Ⅳ. Comparison of Various Biometrics (3/10) Face - Also used by humans 1) the location and shape of facial attributes 2) the overall analysis of the face image Requiring a simple background and illumination In practice, Detect the face Locate the face Recognize the face 30

31 Ⅳ. Comparison of Various Biometrics (4/10) Facial, hand, and hand vein infrared thermogram A thermogram-based system does not require contact and is non-invasive Infrared sensors are prohibitively expensive 手掌靜脈辨識系統資料來源 :FUJITSU, Taiwan 31

32 Fingerprint Ⅳ. Comparison of Various Biometrics (5/10) A fingerprint scanner costs about US $20 Single vs. Multiple 32

33 Ⅳ. Comparison of Various Biometrics (6/10) Gait Hand and finger Geometry 33

34 Iris Ⅳ. Comparison of Various Biometrics (7/10) stabilize during the first two years of life the irises of identical twins are different extremely difficult to surgically tamper the texture of the iris 34

35 Keystroke Odor Palmprint Ⅳ. Comparison of Various Biometrics (8/10) 35

36 Ⅳ. Comparison of Various Biometrics (9/10) Retinal scan the most secure biometric reveal some medical conditions Signature professional forgers may be able to reproduce signatures that fool the system Voice a combination of physiological and behavioral biometrics 36

37 Ⅳ. Comparison of Various Biometrics (10/10) 37

38 Ⅴ. Application of Biometric Systems (1/3) The application of biometric can be divided into three main groups: 1) Commercial ATM, credit card, cellular phone, distance learning, etc. 2) Government ID card, driver s license, social security, passport control, etc. 3) Forensic terrorist identification, missing children, etc. 38

39 Ⅴ. Application of Biometric Systems (2/3) 39

40 REVENUE (US$m) Ⅴ. Application of Biometric Systems (3/3) SOURCE: The `123' of Biometric Technology 40

41 Advantage Ⅵ. Advantage and Disadvantage of Biometrics (1/2) All the users of the system have equal security level. Between 20% and 50% of all help desk calls are for password resets. 41

42 Ⅵ. Advantage and Disadvantage of Biometrics (2/2) Disadvantage Speed is perceived as the biggest problem. FMR will increase when scaling up an identification application. 42

43 Ⅶ. Limitation of (Unimodal) Biometric Systems (1/2) 1) Noise in sensed data 2) Intra-class variations 43

44 Ⅶ. Limitation of (Unimodal) Biometric Systems (2/2) 3) Distinctiveness e.g. Hand geometry, face, etc. 4) Non-universality 5) Spoof attacks 44

45 Ⅷ. Multimodal Biometric Systems (1/19) Data Fusion Level of Fusion a) Fusion at Sensor level b) Fusion at Feature level c) Fusion at Opinion level d) Fusion at Decision level 45

46 Ⅷ. Multimodal Biometric Systems (2/19) Biometric snapshot Feature Extraction features System Database Fusion features Matching Decision Making Biometric snapshot Feature Extraction decision 46

47 Ⅷ. Multimodal Biometric Systems (3/19) This combination strategy is usually done by a concatenation of the feature vectors extracted by each feature extractors. This yields an extended size vector set. 47

48 Ⅷ. Multimodal Biometric Systems (4/19) Two drawbacks: 1) There is little control over the contribution of each vector component on the result. 2) Both feature extractors should provide identical vector rates. 48

49 Ⅷ. Multimodal Biometric Systems (5/19) Although it is a common belief that the earlier the combination is done, the better result is achieved, state-of-the-art data fusion relies mainly on the opinion and decision level. 49

50 Ⅷ. Multimodal Biometric Systems (6/19) Biometric snapshot Feature Extraction Matching rank values System Database Fusion Decision Making rank values Biometric snapshot Feature Extraction Matching decision 50

51 Ⅷ. Multimodal Biometric Systems (7/19) The score must be adjusted first: ( Normalization must be done. ) The similarity measures must be converted into distance measures. The score generated by each classifier must have same range. [ex ] 51

52 Ⅷ. Multimodal Biometric Systems (8/19) The combination strategies can be classified into three main groups: Fixed rules / equal weight Trained rules / unequal weight Adaptive rules / adaptive weight 52

53 Ⅷ. Multimodal Biometric Systems (9/19) The most popular schemes are: Weight sum Weight product Decision trees ( base on if-then-else ) 53

54 Ⅷ. Multimodal Biometric Systems (10/19) Classifier 1 Classifier 2 Classifier 3 Yes Score 1 > t 1 No Yes Score 2 > t 2 No Yes Score 2 > t 2 No False Yes No Score 3 > t 3 False True False True 54

55 Ⅷ. Multimodal Biometric Systems (11/19) Biometric snapshot Feature Extraction Matching Decision Making decision System Database Fusion decision decision Biometric snapshot Feature Extraction Matching Decision Making 55

56 Ⅷ. Multimodal Biometric Systems (12/19) In this last case, the Borda count method can be used for combining the classifiers outputs. This approach overcomes the scores normalization that was mandatory for the opinion fusion level. 56

57 Ⅷ. Multimodal Biometric Systems (13/19) Classifier 1 class 2 class 1 class 3 class 2=2 class 1=1 class 3=0 Classifier 2 class 1 class 2 class 3 class 1=2 class 2=1 class 3=0 class 2=5 class 1=3 class 3=1 Classifier 3 class 2 class 3 class 1 class 2=2 class 3=1 class 1=0 57

58 Ⅷ. Multimodal Biometric Systems (14/19) One problem that appears with decision level fusion is the possibility of ties. For verification applications, at least three classifiers are needed. 58

59 Ⅷ. Multimodal Biometric Systems (15/19) An important combination scheme at the decision level is the serial and parallel combination, also known as AND and OR combination. System 1 System 2 System 1 System 2 59

60 Ⅷ. Multimodal Biometric Systems (16/19) The AND combination improves the False Acceptance Ratio. The OR combination improves the False Rejection Ratio. 60

61 Ⅷ. Multimodal Biometric Systems (17/19) Multiple sensors optical & capacitance sensors minutiae & non-minutiae based matchers Multiple matchers Multiple biometrics face & fingerprint Multimodal Biometrics two attempts of right index finger Multiple snapshots Multiple units right index & middle fingers 61

62 Ⅷ. Multimodal Biometric Systems (18/19) Example of Multimodal Biometric Systems Person Identification Using Multiple Cues Face, Voice Expert Conciliation for Multimodal Person Authentication Systems using Bayesian Statistics Face, Speech Integrating Faces and Fingerprints for Personal Identification Face, fingerprint Personal Verification using Palmprint and Hand Geometry Biometric Palmprint and Hand Geometry Bioid: A Multimodal Biometric Identification System voice, lip motion, face 62

63 Ⅷ. Multimodal Biometric Systems (19/19) A combination of uncorrelated modalities is expected to result in a better improvement in performance. A combination of uncorrelated modalities can significantly reduce the FTE. However, the cost of the system may increase and the system may cause inconvenience. 63

64 Ⅸ. Social Acceptance and Privacy Issues (1/3) Social Acceptance The ease and comfort in interaction with a biometric system contribute to its acceptance. Biometric characteristics captured without the knowledge of the user is perceived as a threat to privacy by many individuals. 64

65 Ⅸ. Social Acceptance and Privacy Issues (2/3) Privacy Issues Biometrics can be used as one of the most effective means for protecting individual privacy. Biometric characteristics may provide additional information about the background of an individual. 65

66 Ⅸ. Social Acceptance and Privacy Issues (3/3) Legislation is necessary to ensure that such information remains private and that its misuse is appropriately punished. Most of the commercial biometric systems available today store a template in an encrypted format. 66

HUMANS have used body characteristics such as face,

HUMANS have used body characteristics such as face, 4 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar,

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS

INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS By Karthik Nandakumar A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

Multi-Factor Biometrics: An Overview

Multi-Factor Biometrics: An Overview Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems

More information

COMPARISON OF VARIOUS BIOMETRIC METHODS

COMPARISON OF VARIOUS BIOMETRIC METHODS COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT errupindersaini27@gmail.com, narinderkrana@gmail.com Abstract This paper presents comparison

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security , pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

A Various Biometric application for authentication and identification

A Various Biometric application for authentication and identification A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Automatic Biometric Student Attendance System: A Case Study Christian Service University College Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions

More information

A Comparative Study on ATM Security with Multimodal Biometric System

A Comparative Study on ATM Security with Multimodal Biometric System A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. About the Tutorial This tutorial provides introductory knowledge on Biometrics. By accessing this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device 2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Biometrics in Secure e-transaction

Biometrics in Secure e-transaction Biometrics in Secure e-transaction Ms. Swati S Bobde 1, Prof. D. N. Satange 2 1 Post Graduate Student, Dept of Computer Science, Arts, Commerce & Science College, Amravati 2 Asstt. Professor, Dept of Computer

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

3D Signature for Efficient Authentication in Multimodal Biometric Security Systems

3D Signature for Efficient Authentication in Multimodal Biometric Security Systems 3D Signature for Efficient Authentication in Multimodal Biometric Security Systems P. M. Rubesh Anand, Gaurav Bajpai, and Vidhyacharan Bhaskar Abstract Unimodal biometric systems rely on a single source

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Department of Computer Science, University of Otago Technical Report OUCS-2004-21 Biometric security: Concepts, Issues and Flaws Author: Stewart Fleming Department of Computer Science, University of Otago

More information

Biometric authentication systems today and in the future

Biometric authentication systems today and in the future Biometric authentication systems today and in the future Birgit Kaschte Computer Science Department University of Auckland birgit@kaschte.de 24 October 2005 Abstract. Biometric data has been a widely discussed

More information

Fundamentals of Biometric System Design. Chapter 1 Introduction

Fundamentals of Biometric System Design. Chapter 1 Introduction Fundamentals of Biometric System Design by S. N. Yanushkevich Chapter 1 Introduction Biometric sensor Biometric sensor Computer platform Biometric sensor Biometric sensor Verification: Am I whom I claim

More information

Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.

Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. Vibha Kaw Raina. Department of Computer Sciences Birla Institute of Technology, Extension

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Discriminative Multimodal Biometric. Authentication Based on Quality Measures

Discriminative Multimodal Biometric. Authentication Based on Quality Measures Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,

More information

Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic

Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic Mr.P.Akilan 1, Mr.K.Gunasekaran 2, M.Tech. Mr.D.Saravanan 3, M.E., (Ph.D), PG Scholar, Dept. of CSE, Pavendar Bharathidasan

More information

Smart Card in Biometric Authentication

Smart Card in Biometric Authentication Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: zpozgaj@efzg.hr Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:

More information

Biometrics for Payment Applications. The SPA Vision on Financial Match-on-Card

Biometrics for Payment Applications. The SPA Vision on Financial Match-on-Card Biometrics for Payment Applications The SPA Vision on Financial Match-on-Card November 2013 Table of Contents 1. Introductory Remarks... 3 2. The Use of Biometrics for Personal Authentication... 5 2.1.

More information

User Authentication Methods for Mobile Systems Dr Steven Furnell

User Authentication Methods for Mobile Systems Dr Steven Furnell User Authentication Methods for Mobile Systems Dr Steven Furnell Network Research Group University of Plymouth United Kingdom Overview The rise of mobility and the need for user authentication A survey

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

Template and Database Security in Biometrics Systems: A Challenging Task

Template and Database Security in Biometrics Systems: A Challenging Task Template and Database Security in Biometrics Systems: A Challenging Task Manvjeet Kaur Lecturer CSE Deptt. Dr. Sanjeev Sofat Prof. and Head CSE Deptt. Deepak Saraswat ME (CSE) Student ABSTRACT Security

More information

Security of Biometric Authentication Systems Parvathi Ambalakat

Security of Biometric Authentication Systems Parvathi Ambalakat Security of Biometric Authentication Systems Parvathi Ambalakat ABSTRACT Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is becoming

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity

More information

How To Improve Security Of An Atm

How To Improve Security Of An Atm Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm Mohit M. Jungare, Prof.V.G.Girhepunje M. Tech Student, Dept of Electronics and Telecommunication, Priyadarshini

More information

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION Smita S. Mudholkar 1, Pradnya M. Shende 2, Milind V. Sarode 3 1, 2& 3 Department of Computer Science &

More information

DNA as a Biometric. Biometric Consortium Conference 2011 Tampa, FL

DNA as a Biometric. Biometric Consortium Conference 2011 Tampa, FL DNA as a Biometric Biometric Consortium Conference 2011 Tampa, FL September 27, 2011 Dr. Peter M. Vallone Biochemical Science Division National Institute of Standards and Technology Gaithersburg, MD 20899

More information

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,

More information

Biometrics: Trading Privacy for Security

Biometrics: Trading Privacy for Security Werner 1 Biometrics: Trading Privacy for Security Chris Werner April 23, 2006 Werner 2 Biometric identification has been around for many years, but due to the recent need of tightened security, and the

More information

Keywords: biometrics, identification, verification, modalities.

Keywords: biometrics, identification, verification, modalities. Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Analysis

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

Security & Privacy in Biometric Systems Two Hindering Requirements?

Security & Privacy in Biometric Systems Two Hindering Requirements? Security & Privacy in Biometric Systems Two Hindering Requirements? Dip. Elettronica Applicata Università degli Studi Roma TRE Roma, Italy www.comlab.uniroma3.it/campisi.htm campisi@uniroma3.it Road map

More information

Voice Authentication for ATM Security

Voice Authentication for ATM Security Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the

More information

Is Alice authorized to enter this facility? Is Bob entitled

Is Alice authorized to enter this facility? Is Bob entitled Biometric Recognition: Security and Privacy Concerns Biometrics Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Biometrics for payments. The use of biometrics in banking

Biometrics for payments. The use of biometrics in banking Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,

More information

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Online teaching: Do you know who is taking the final exam?

Online teaching: Do you know who is taking the final exam? Online teaching: Do you know who is taking the final exam? Qinghai Gao Department of Criminal Justice & Security Systems, Farmingdale State College Abstract: In recent years Distance Learning has been

More information

Review Article Biometric Template Security

Review Article Biometric Template Security Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication Outline Background on Authentication General Network

More information

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities

More information

Securing Electronic Medical Records using Biometric Authentication

Securing Electronic Medical Records using Biometric Authentication Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, krawcz10@cse.msu.edu, jain@cse.msu.edu Abstract.

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach , pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh

More information

Securing Electronic Medical Records Using Biometric Authentication

Securing Electronic Medical Records Using Biometric Authentication Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to

More information

Identity theft is a growing concern

Identity theft is a growing concern IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation

Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation Abstract Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation Narmeen

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

SECURITY BIOMETRICS PDF

SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF

More information

Traceable Physical Security Systems for a Safe and Secure Society

Traceable Physical Security Systems for a Safe and Secure Society Hitachi Review Vol. 63 (2014), No. 5 254 Featured Articles Traceable Physical Security Systems for a Safe and Secure Society Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr.

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics 370 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics S.Benson Edwin Raj Assistant

More information

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline

More information

Robust Security System for Critical Computers

Robust Security System for Critical Computers I.J. Information Technology and Computer Science, 2012, 6, 24-29 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2012.06.04 Robust Security System for Critical Computers

More information

THE PROBLEM of information security entails the protection

THE PROBLEM of information security entails the protection IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2, JUNE 2006 125 Biometrics: A Tool for Information Security Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Sharath Pankanti,

More information

White paper Fujitsu Identity Management and PalmSecure

White paper Fujitsu Identity Management and PalmSecure White paper Fujitsu Identity Management and PalmSecure To protect your business, it s critical that you can control who accesses your data, systems and premises. Today, many organizations rely on passwords

More information

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key. Biometric Security: Client-Server Systems Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.com The Session Private vs Public / Personal vs Public Forms

More information

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008 Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New

More information

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Personal Identification Techniques Based on Operational Habit of Cellular Phone Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular

More information