Biometric Technology

Similar documents
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Examples of Large Scale Biometrics Systems:

W.A.R.N. Passive Biometric ID Card Solution

Identity - Privacy - Security

De-duplication The Complexity in the Unique ID context

Framework for Biometric Enabled Unified Core Banking

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

The Leading Provider of Identity Solutions and Services in the U.S.

MegaMatcher Case Study

22 nd NISS Conference

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

PalmSecureID for the EDUCATION MARKETPLACE

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Smart Card in Biometric Authentication

Accessing the bank account without card and password in ATM using biometric technology

Optical Memory Cards in Federal Government

ImageWare Systems, Inc.

Application-Specific Biometric Templates

Assignment 1 Biometric authentication

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Personal National Identification System National Population Registry Mexico

May For other information please contact:

Opinion and recommendations on challenges raised by biometric developments

Department of Homeland Security

Statewatch Briefing ID Cards in the EU: Current state of play

Biometrics Planning Project. Biometrics Field Trial. Evaluation Report

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company

Application of Biometric Technology Solutions to Enhance Security

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Fingerprint Based Biometric Attendance System

French Justice Portal. Authentication methods and technologies. Page n 1

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Description of Biometric Data Interchange Format Standards

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION

SECURE WEB MARKETING USING EAR BIOMETRICS

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Operational Testing of Biometric Access Control Systems. National Safe Skies Alliance (NSSA)

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

Security of Identity Management. Professor Brian Collins

2nd End-User Group Meeting on 3D Face Recognition

VoiceTrust Whitepaper

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers

MORPHO CRIMINAL JUSTICE SUITE

Voice Authentication for ATM Security

Fingerprint-Based Authentication System for Time and Attendance Management

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

IDENTITY SOLUTIONS FOR A BETTER WORLD

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

Business Issues in the implementation of Digital signatures

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

September 27, 2011 JAPAN BORDER CONTROL SYSTEM (J-BIS) UPDATE

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Part 1: Overview of Biometric Technology and Verification Systems

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport

ID Document Scanning and Biometric Solutions

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

PRIME IDENTITY MANAGEMENT CORE

Development of Attendance Management System using Biometrics.

SUMMARY SELECTED EXAMPLE ENGAGEMENTS. Jerry Hatchett

DELAWARE. Jurisdiction Impact Analysis Real ID Act

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

The Virginia Electronic Notarization Assurance Standard

Biometrics in Physical Access Control Issues, Status and Trends White Paper

European Electronic Identity Practices Country Update of Portugal

Global Deployment of Finger Vein Authentication

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Embedded and mobile fingerprint. technology. FingerCell EDK

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Biometrics for payments. The use of biometrics in banking

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction

Best Practices for Selecting and Implementing Software License Management

solutions Biometrics integration

Discover Germany s Electronic Passport

Secure Personal Identification Systems:

Expertise for biometric solution

Smart Cards and Biometrics in Physical Access Control Systems

User Authentication Methods for Mobile Systems Dr Steven Furnell

Changes in Schengen visa application process

SOURCE ID RFID Technologies and Data Capture Solutions

[INSTALLING THE M2SYS BIOMETRIC SCANNING SYSTEM]

4 U1 16 j7 :33 NOTICE & REQUEST FOR SOLE SOURCE STATE PROCUREMENT OFFICE TO: Chief Procurement Officer FROM:

NIST Patriot Act Biometric Testing. C. L. Wilson Image Group IAD-ITL

Biometric Enterprise Architecture

Transcription:

CCMTA / CCATM Board of Directors, December 8 th, 2003 Ottawa, Ontario Biometric Technology An introduction to the science (as applied to DL/ID requirements) Ian Williams Principal www.idsysgroup.com

Biometrics: Defined Automatically recognizing a person using distinguishing traits. (A narrow definition) Biometric technologies are defined as automated methods of identifying ifying or verifying the identity of a living person based on physiological or behavioral characteristics. Recently, this was modified to include chemical attributes (DNA) Nov. 2003 2

Biometric Market Today 16+ Technologies 540+ Biometric Vendors 1997 Snap Shot 8 Technologies 20+ Biometric Vendors What are they and How do you choose? What are they and How do you choose? 3

Biometric Technologies Iris Recognition Finger Scans Hand Geometry Facial Recognition Signature Dynamics Voice Dynamics Retinal Scan Vascular Patterns Behavioral is difficult to enroll for DL/ID Physical biometrics apply to DL/ID 4

Biometric Terminology Verification 1:1 Measurement of an identity against a single claimed identity Identification 1:N (many) Measurement of a single identity against multiple identities Answers the question: Am I who I claim to be? Answers the question: Who am I? 1D1R (1 driver 1 record): Requires identification, to ensure that I am enrolled only once. 5

DL/ID Biometric Uses Verification Match the user biometric to a single claimed identity. (renewal / re-issuance) Am I - this person? Am I - ANY of these people? DL/ID Database Identification Compare the user biometric to all others in database to ensure they are not previously enrolled. (enrollment) DL/ID require biometric(s) that can perform BOTH verification & identification 6

Iris Recognition Issues/Obstacles Iris stable after adolescence Sole source worldwide Enrolment limitations No demonstrated large-scale ID How it works Video Capture Pattern Extraction Coordinate Creation Iris Code Record 7

Iris Recognition Features/Benefits Highest accuracy (1:N) Constant throughout adulthood No physical damage (picture not scan) Successful applications deployed Iris sampling offers more reference coordinates than any other biometric. Mathematically, it therefore has a higher accuracy potential than any other biometric. Iris recognition is suitable for both Identification & Verification 8

Iris Recognition Applications Financial Services Ak Bank (Turkey) Citibank (NY) Dresdner Bank (Germany) Nationwide Building Society (UK) Takefuji Bank (Japan) Computer Security Hewlett Packard KPN Telecom (The Netherlands) U.S. House of Representatives, Legislative Counsel (DC) Government CCRA CANpass 2003 UK National ID Card (2005) US VISIT program (tentative) 9

Canada Customs & Revenue Client: : Canada Customs and Revenue (CCRA) Application: : Border Control CAN-PASS. Eight airports starting with Toronto and Vancouver in Q4 02. Trials with U.S. at Ottawa and Montreal in 2003. System Integrator: : IBM Global Services Background: Iris is your passport. CCRA will charge $50 annual fee. Card based. Number of users: : 100,000 largest public sector use of Iris thus far. 10

Finger Scan Issues/Obstacles Intrusion perception Exemptions Compatibility (negative opinion) Capture device resolutions How it works Image Capture Minutiae Identification Template Mapping Record Formation 11

Finger Scan Features/Benefits High accuracy Reliable Most widely deployed Capture device variety Low cost devices * * Not all finger scanners suitable for 1:N identification, due to low resolution Finger Scanning is suitable for both Identification & Verification 12

Finger Scan Applications Financial Services Banking ATM Internet Banking Retail Transactions Secure Access Microsoft Oracle New York Stock Exchange HP DL/ID Cards Arkansas V California Colorado Georgia Hawaii Texas W. Virginia Finger Scan Smart Card Social Services Texas Connecticut New York Toronto 13

Hand Geometry Issues/Obstacles Uniqueness Unsanitary (perception) FRR/FAR High Expensive scanner How it works Hand Code 14

Hand Geometry Features/Benefits Reliable Non-intrusive Small record size (9 bits) Successful deployments Verification only. Hand Geometry is suitable for Verification only. Hand Geometry is NOT suitable for Identification Identification. 15

Hand Geometry Applications Identification Cards INSPass Secure Access IBM Exodus Sandia National Labs San Jose State University Time & Attendance Coca-ColaCola First Bank of Minnesota 16

Facial Recognition Issues/Obstacles FRVT 2002 Low accuracy Eyewear issues (DL/ID) Vendor exaggerations No facial template standard How it works (Geometric) Photo taken / Index located Nodal Points Template created (numeric) Other methods: Eigenface Feature analysis Neural network Automatic face processing Thermography 3-D Modeling 17

Facial Recognition Features/Benefits DL/ID Low hardware cost DL/ID Image db exists* Existing process Controlled enrollment * Images in databases may not be suitable for automatic template extraction. Facial recognition is suitable for Verification. Facial recognition is a useful tool for assisting Identification Identification. 18

Facial Recognition Continued Positive Facial images are almost always captured in connection with identification documents. There are estimated to be 2 billion facial images in identification ion databases around the world. Innocuous in a DL/ID environment. Negative FRVT 2002 indicates questionable accuracies. Recent pilots at airports concluded as failed experiments. Disguises can easily defeat facial recognition. Lighting, age, glasses, and head/face coverings impact. Aging of comparison images drastically reduces match probability. 19

Facial Recognition Apps Identification Cards West Virginia Driver License Illinois Driver License Alberta Operators Licence Mexican Voter Registration Surveillance CD Airport Paris Secure Access IBM (Thinkpads) DeutcheBank MGM Casino Sydney Airport * West Ham Football London Airport Logan & Tampa * *Systems withdrawn 20

Canadian Biometric Initiatives Alberta Operator Licence - 2003 Facial recognition Initially used as a verification check, may attempt to utilize as an identification application. Canadian Passport 2004 Facial recognition - (+ secondary biometric?) Smart chip to be added to passport and to include biometric templates (ICAO standard). CANpass - 2002 Iris recognition Used to allow rapid cross border travel. Uses an optical card to store Iris template. Toronto Welfare 1997-1999 Finger scanning Designed to prevent multiple enrollment of welfare recipients. Program abandoned in 1999. CATSA - 2004 Finger scanning - New program to be deployed 2004 to secure airport areas using biometric smart card and gate access. CIC National ID card 2003-2010 Undecided current House of Commons debate whether to establish a new National Identity Biometric Card. 21

Choosing a Biometric Technology Accuracy Effort Intrusiveness Cost 4 important factors when choosing a biometric 22

Data Considerations Technology Template size (Bytes) Iris Recognition 512 Finger Scan 200-512 Hand Geometry 9 Facial Recognition 88-1024 Machine Read Technology Storage Capacity Relative Cost 2-D Barcode 1800 Very Low Magnetic Stripe 204 Low Smart Chip Optical / Laser Card 64k 4MB High Very High Match your biometric technology needs with machine read needs, and a consider the costs. 23

Storing a biometric in a Card 2-D D Barcode Smart Card Employ internationally accepted, secure biometric standard formats. No need to re- invent the wheel! **** Biometric templates stored on cards MUST be secure from theft. *** Avoid proprietary formats, that may force royalties and limit interoperability While the AAMVA standard describes a common way to record fingerprint minutiae, it still allows for including data in a vendor- specific format. ** ** Page 66 GAO-03-174 Biometrics for Border Security (May 2002) 24

Biometric Industry Trends Iris is the number one technology in accuracy Iris / finger can facilitate large 1:N search (Identification( Identification) Finger is biometric leader (market share) Facial is popular although losing credibility Compounded biometrics for accuracy (US VISIT; UK ID) Verification is publicly appealing (combats identity theft) Voluntary enrollment is increasing ( Opt-in ) Passports to contain biometric(s) next year (2004) 25

Practical Solutions Iris Recognition Higher Security Finger Scan Accuracy Facial Recognition DMV Database Cost Lower Security 26

Biometrics: Reality Biometrics are a useful tool to improve the identification process. Biometric searches may assist in identifying multiple similar/identical records. Biometrics can ensure the verification of an individual to their own record. Every biometric technology can be duped No single biometric can enroll ALL applicants No biometric can provide 100% accuracy Biometrics will not GUARANTEE multiple enrollee prevention Human intervention WILL be required to resolve probable matches 27

Get more info here: www.idsysgroup.com Follow links to Biometric Resource Centre www.biometrics.org US Government focal research site 28

Questions???? 29