Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company



Similar documents
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

Biometrics and Cyber Security

NFC & Biometrics. Christophe Rosenberger

Product Testing Programs

De-duplication The Complexity in the Unique ID context

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Security and Privacy Challenges of Biometric Authentication for Online Transactions

PRIME IDENTITY MANAGEMENT CORE

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Smart Cards and Biometrics in Physical Access Control Systems

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

BIOMETRICS TESTING. National Voluntary Laboratory Accreditation Program. NIST HANDBOOK Edition

Option-II Modified: M&S in Decision Risk Analysis and Risk Mitigation

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

Biometrics for Payment Applications. The SPA Vision on Financial Match-on-Card

Multimodal Biometric Recognition Security System

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Guidelines for Best Practices in Biometrics Research

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Biometrics for public sector applications

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy

Practical Challenges in Adopting PIV/PIV-I

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

74. Selecting Web Services with Security Compliances: A Managerial Perspective

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Multi-Factor Biometrics: An Overview

BiSPI Conformance Testing

Is the Device User the Device Owner? A paper prepared for Biometrics UnPlugged: Mobility Rules Executive Summit - Tampa Monday, September 16, 2013

Biometrics, Tokens, & Public Key Certificates

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

Smart Cards and Biometrics

MegaMatcher Case Study

SECURITY BIOMETRICS PDF

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometrics for Public Sector Applications

Identity - Privacy - Security

The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements. Janet Russac

The Government-wide Implementation of Biometrics for HSPD-12

Conformance test specification for BSI-TR Biometrics for public sector applications

ISO Biometric Template Protection

la conception et l'exploitation d'un système électroniques

Application-Specific Biometric Templates

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

GENERAL REQUIREMENTS FOR THE PROGRAMME OF REFERENCE MATERIAL CERTIFICATION IN SERIAL PRODUCTION

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

De Nieuwe Code voor Informatiebeveiliging

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

Procedure for obtaining Biometric Device Certification (Authentication)

Description of Biometric Data Interchange Format Standards

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Characterizing Task Usage Shapes in Google s Compute Clusters

On the Operational Quality of Fingerprint Scanners

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Technology behind Aadhaar. Unique Identification Authority of India Tampa, 20 th September 2012

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Common Criteria Evaluations for the Biometrics Industry

Detecting Credit Card Fraud

Navy Contributions to Identity Management

Asset Support Contract Model Service Information. Annex 25 Integrated Asset Management

This Instruction implements Department of Homeland Security (DHS) Directive , Privacy Policy for Operational Use of Social Media.

Digital Records Preservation Procedure No.: 6701 PR2

ISO/IEC/IEEE The New International Software Testing Standards

GSA FIPS 201 Evaluation Program

solutions Biometrics integration

XML for Manufacturing Systems Integration

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?

Comparative Biometric Testing. Round 6 Public Report. September Copyright 2006 International Biometric Group

Biometrics for public sector applications

Testimony of. Cita M. Furlani Director

Security and Safety Program. Professor Kathy Horadam Platform Technologies Research Institute

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

Role of Multi-biometrics in Usable Multi- Factor Authentication

How To Write An Inspire Directive

Security & Privacy in Biometric Systems Two Hindering Requirements?

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

IoT Security Platform

Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Extended Feature Set Profile Specification

A Comparative Study on ATM Security with Multimodal Biometric System

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Assignment 1 Biometric authentication

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

MORPHO CRIMINAL JUSTICE SUITE

22 nd NISS Conference

Modular biometric architecture with secunet biomiddle

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)

Report of the secretariat. CEN/TC 251 secretariat ACTION REQUIRED: For your information

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

User Authentication Guidance for IT Systems

Recommendations from Past Reports: E Prescribing Standards

Transcription:

Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company

Overview Published standards In-development ISO/IEC standards Scope and status 2

Published 19795 Standards 19795 series: Biometric performance testing and reporting 19795-1: Principles and framework Key terms, concepts, and metrics for subsequent performance testing standards 19795-2: Biometric testing methodologies for technology and scenario evaluation Offline testing of algorithms and lab testing of end to end systems 19795-3: Modality-specific testing (technical report) Testing considerations specific to fingerprint, face, iris, voice, vascular, etc. 19795-4: Interoperability performance testing Used in NIST MINEX and IREX testing 19795-5: Access control scenario and grading scheme Only performance testing standard to enumerate specific performance rates (e.g. FMR, FNMR, enrollment rates, transaction times) 19795-6: Testing methodologies for operational evaluation Testing live systems with real users, introduces acceptance rate metric 19795-7: Testing of on-card biometric comparison algorithms Used in PIV fingerprint testing 3

Machine Readable Test Data ISO/IEC 29120-1: Test Reports Establishes machine readable records for documenting output of a biometric test Supports documentary reporting requirements of some parts of ISO/IEC 19795 Includes mechanism to protect the integrity of the test report Provides trusted test information (date, lab, accreditation body, manner of testing, conformance, test size, accuracy) Mature draft (DIS) ISO/IEC 29120-2: Test Input Data Establishes a mark-up for corpora of archival sample data Supports research, development and calibration activities by allow tests to be executed repeatably Stable draft (CD) 4

Level of Difficulty of Fingerprint Databases ISO/IEC 29198: Characterization and measurement of difficulty for fingerprint databases for technology evaluation Technical report Provides guidance on determining how challenging or stressing a fingerprint dataset is for recognition Considers common area, relative deformation, and relative sample quality Can be used to characterize and measure the relative difficulty levels of fingerprint datasets used in technology evaluation. Near publication 5

Examiner-Assisted Biometric Applications ISO/IEC 29189: Evaluation of examiner-assisted biometric applications Technical report Describes characteristics of examiner assisted biometric applications (e.g. AFIS / latent examiner application) Contrast examiner-assisted and mainstream biometric applications Discusses how system-level error rates incorporate examiner decisions What is an examiner? a field expert in a given biometric modality trained to use the system to an advanced degree of proficiency authorized to override the biometric system s decisions based on their own examination of the biometric samples and the results returned. Mature draft (DTR) 6

Multi-Modal Biometric Implementations ISO/IEC 19795-2:2007 Amendment 1: Testing of multi-modal biometric implementations Defines multimodal-specific requirements for technology and scenario evaluation Applicable when experimenter require insight into the multimodal black box Can be used to compare different types of fusion (score, sample, etc.) Mature draft (PDAM) 7

Environmental Influence in Biometric Systems ISO/IEC 29197: Evaluation methodology for environmental influence in biometric systems Specifies requirements for planning and execution of environmental evaluations for biometric systems based on scenario and operational evaluations Specifies requirements for establishing a baseline performance in order to compare the influence of environmental parameters Discusses controlled testing (e.g. in climactic chambers) to provide baseline measurements against which to compare environment-specific results Mature draft (DIS) 8

Security and Usability in Biometric Applications ISO/IEC 29156: Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics Technical report Provides guidance on specifying performance requirements for biometric authentication to achieve desired levels of security and usability Guidance addresses issues such as Biometric performance metrics that impact security and usability; Comparing and quantifying the security and usability of biometrics and other authentication mechanisms, when used alone or in combination; How to combine performance of individual authentication elements in order to meet an overall security and usability requirement; Trade-offs between security and usability in applications using biometric recognition Considerations in maintaining security and usability in biometric systems Working draft 9

Presentation Attack Detection ISO/IEC 30107: Presentation attack detection Terms and definitions useful in the specification, characterization and evaluation of presentation attack detection methods Common data format for conveying the type of approach used and the assessment of presentation attack in data formats Principles and methods for performance assessment of presentation attack detection algorithms or mechanisms Classification of known attacks types (in an informative annex) Working draft 10

Template Protection Schemes ISO/IEC 30136: Template Protection Schemes Evaluation of accuracy, security, and privacy of biometric template protection implementations Definitions, terminology, and metrics for stating the performance of such implementations Requirements for the measurement and reporting of theoretical and operational accuracy of biometric template protection implementations Guidance on measuring and reporting the revocability and renewability of templates Guidance on the design of multiple biometric template protection systems for mitigating linkage attacks Initial working draft stages 11