Introduction to Biometric Systems Ruomu Guo CSPC 620—Computer Security

Preview:

Citation preview

Introduction to Biometric Systems

Ruomu Guo

CSPC 620—Computer Security

OverviewIdentification Person’s body && identity

Applications: Fingerprint, Iris, Retina Recognition,

Face Detection, Hand Geometry.

Relationship between Biometric System and certain topics in the area of computer security.

OverviewRefers to the use of mathematical statistical

methods to analyze biological behaviors or characteristics.

Biometric System mainly consists of four modules—Sensor, Feature Extraction, Matcher, System Database Storage.

Difficulties: Accuracy, Speed, Resource Requirements, Harmless to human beings, Robust to fraudulent attacks.

Measurement of Biometric System

Fig: The relationship between FAR, FRR, and Threshold Value

Fingerprint RecognitionFingerprint Recognition, because of its lifetime

invariance, uniqueness and convenience, is becoming an important method for biometric identification.

Finger skin ridge and valley forms a regular array of different pattern types. Valley, ridge combined with point and bifurcation point, are called the fingerprint minutiae points (minutiae).

By comparing different fingerprint minutiae, person’s identity can be recognized or identified.

Fingerprint Recognition

Fig: Block Diagram of Fingerprint Recognition Processes

Fingerprint Recognition Sense: off-line fingerprint acquisition, live-scan sensing.

Feature Extraction: singular region, local ridge orientation

Matching: Correlation-based matching, Minutiae-based matching,

Ridge feature-based matching

Database Storage: update periodically

Face DetectionFace Detection is also a popular method of

biometric system for recognition and identifies individual’s identity.

Advantages: widely accept as a identifier, least intrusive.

Disadvantages: illumination, disguise for circumvention, and incompatible with pure identification protocol.

Face DetectionPrimary methods for detecting faces

1. Knowledge-based methods

2. Feature invariant approaches

3. Template matching methods

4. Appearance-based methods

Face DetectionThe technique for face recognition can be

classified as following three groups:

1. Feature Methods:

2. Holistic Methods:

3. Hybrid Methods:

PCA ApplicationPCA (Principal Component Analysis)

A face image usually defines a point in the high-dimensional image space.

PCA is used to simplify the required process of analysis by reducing the dimensional spaces or subspaces.

ConclusionBiometric System is not independent as a

module for entire computer security area.

Some ticklish problems in computer security will be solved appropriately such as authentication for each person’s identity before they will enter or access to other systems.

Scientists are still trying to exploit other methods to improve the performance of biometric system with more enhancement of computer security.

Reference 1. A. K. Jain, A. Ross and S. Prabhakar, An Introduction to

Biometric System IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, pp. 4-20, January 2004.

2. A. Jain, R. Bolle, and S. Pankanti, Introduction to Biometrics: Personal Identification in Networked Society (A. Jain, R. Bolle, and S. Pankanti, Eds. ), pp. 1-41, Boston, MA: Kluwer Academic, 1999.

3. D. Maltoni. A tutorial on Fingerprint Recognition: In M. Tistarelli, J. Bigun, and E. Grosso, editors, Biometrics School 2003, LNCS 3161, pages 43-68. Springer Verlag, Berlin, Heidelberg, 2005.

4. Description of Face Detection at Wikipedia: http://en.wikipedia.org/wiki/Face_detection.

Recommended