Biometrics Technology for Human Recognition

Similar documents
Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

Introduction-cont Pattern classification

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Biometrics: primed for business use

International Biometrics & Identification Association

BIOMETRICS - WHY NOW?

Biometric Recognition: A New Paradigm for Security

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Biometrics & Accessibility

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Government of Pakistan NADRA Headquarters, Islamabad

Case Study. MegaMatcher Accelerator

Position Paper IDENT Implementation for U.S. VISIT

CPSC 467b: Cryptography and Computer Security

Singapore's Automated Clearance using Biometrics

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Research Article. ISSN (Print)

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

The Angola National ID Card

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

TABLE OF CONTENTS. Executive Summary. Introduction. Public Safety Border Control & Law Enforcement

CRS Report for Congress

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

M-Vote (Online Voting System)

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES

SUMMARY INTRODUCTION. xiii

Opinion 3/2012 on developments in biometric technologies

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

The Open Biometrics Initiative and World Card

Council of the European Union Brussels, 30 January 2017 (OR. en)

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Biometric Authentication

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

EVIDENCE OF IDENTIFICATION

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

German Federal Ministry of the Interior 20 August / 6

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

GDPR in access control and time and attendance systems using biometric data

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

SECURE REMOTE VOTER REGISTRATION

Identity Verification in Passport Issuance

Biometric Technology for DLID

Consumer Attitudes About Biometric Authentication

Recommended Practice 1701 l

Acceptance of Biometrics: Things That Matter That We Are Ignoring

Biometrics and Identification in Development

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

Biometric Authentication: How Do I Know Who You Are?

Identity Documents Act

The problems with a paper based voting

fraud prevention done right

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

Using Identification for Development: Some Guiding Principles

Biometrics Explained: Answers to 13 Basic Biometrics Questions I B I

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics

Supreme Court Verdict on Aadhaar - I

DHS Biometrics Strategic Framework

CHAPTER Committee Substitute for House Bill No. 1277

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

Prepared by Space and Naval Warfare Systems Center Atlantic

CASE STUDY 2 Portuguese Immigration & Border Service

July 13, Dear Ms. Behuniak:

(c) 2009, Government of Pakistan

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim

The Upcoming International Biometric Vocabulary Standard

Data Breach Charts. November 2017

An Open Letter to the ICAO

Biometrics in the Workplace. The Promise and Peril of It s Use

London Oct 16 th, Tariq Malik Chairman NADRA

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Statement on Security & Auditability

Verify and Authenticate Identities before Issuing a Driver s License or State Identification Card.

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

"Pay Before You Pump" Program Summa., El Paso Police Department

Smart Voting System using UIDAI

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa

An Introduction to Biometrics. Julian Ashbourn

(Approved December 30, 2010) AN ACT

Policy Framework for the Regional Biometric Data Exchange Solution

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

ABC and Integrated Border management

The Modern TENPRINT Examiner

REPORT VOLUME 6 MAY/JUNE 2017

International Journal of Research and Review E-ISSN: ; P-ISSN:

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

Aadhaar Based Voting System Using Android Application

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI)

BIOMETRICS IN A HUMANITARIAN CONTEXT

Transcription:

Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012

Foreigners Arriving at Incheon

G20 Seoul Summit 2010 Face recognition system at the COEX entrance

Security Concerns We now live in a society where people cannot be trusted based on credentials Something you have: ID card, passport Something you know: PIN, password

Fake Passports Two of the Sept. 11 attackers used stolen Saudi Arabian passports Spanish police arrested seven men, connected to al Qaeda, tasked with stealing 40 passports per month (Dec 2, 2010) http://press.homeoffce.gov.uk/press-releases/passport-warning?version=1 http://www.pbs.org/wgbh/pages/frontline/shows/trail/etc/fake.html http://www.lonelyplanet.com/thorntree/thread.jspa?threadid=2071874

Too Many Passwords! Most common passwords: 123456, password Hacker-resistant passwords?

Two-Factor Authentication Card + 4-digit PIN skimming attacks, shoulder surfing ~10% of Americans victims of credit card fraud http://www.bankinfosecurity.com/chase-hit-in-atm-skimming-attacks-a-4663 http://www.statisticbrain.com/credit-card-fraud-statistics/

Phishing Attack ~5 million U. S. citizens are victims

Outline Recognition by body traits Biometric System Applications Challenges

Biometric Recognition Recognition by body traits (Who you are)

Uniqueness Identical twins

Persistence Sharbat Gula in 1985 & 2002; Steve McCurry, National Geographic Published in the June 1985 issue (~12 years old) 17 years later in the April 2002 issue

Rejected Biometric Traits

Why Biometrics? Cannot be stolen or forged Discourages fraud Enhances security Audit trail User convenience Palmvein system at Bradesco bank, Brazil

Habitual Criminal Act (1869) British Parliament required that repeat offenders be identified Alphonse Bertillon H.T. F. Rhodes, Alphonse Bertillon: Father of Scientific Detection, Harrap, 1956

Friction Ridge Patterns Cumins and Midlo, Finger Prints, Palms and Soles, Dover, 1961

Fingerprints

Biometric Recognition System Verification (1:1 Matching)

Fingerprint Matching Match score =38 on a scale of 0-999

US-VISIT United States Visitor and Immigrant Status Indicator Technology

UAE Iris Border Crossing System

Time and Attendance

Cash Register Login Meijer supermarket, Okemos, Michigan

Disney Parks 200K visitors per day, 365 days per year

De-duplication (1:N Matching) Prevent a person from obtaining multiple ID documents

Next Generation Biometric Systems Scale 10 7 10 5 10 3 10 1 99% 99.999% Unusable Hard to Use 90% 99.99% Accuracy Easy to Use Transparent to User Usability For 1: N matching (N ~ 1 billion), 1:1 matching accuracy must be very high

Large Scale Identification Issue a unique identification number (UID) to Indian residents that can be verified and authenticated in an online, cost-effective manner, and that is robust to eliminate duplicate and fake identities. Name Parents Gender DoB PoB Address 1568 3647 4958 Basic demographic data and biometrics stored centrally UID = 1568 3647 4958 10 fingerprints, 2 iris & face image Central UID database 600 million numbers to be issued in 4 years

http://uidai.gov.in/

Biometric Capture

Image Quality

Fusion of Iris and Fingerprints FPIR: Likelihood that a person s biometrics is seen as a duplicate FNIR: Likelihood that system is unable to identify a duplicate enrollment

Securing Mobile Devices No. of mobile devices will exceed world s population by 2012 By 2015, consumers will buy $1.3 trillion worth of goods with mobile devices; 1.5% of the transactions will be fraudulent Voice, face, fingerprint, iris Apple buys AuthenTec for $356 million (July 2012) http://techcrunch.com/2012/02/14/the-number-of-mobile-devices-will-exceed-worlds-population-by-2012-other-shocking-figures/ http://www.homelandsecuritynewswire.com/srbiometrics20120228-smartphone-biometric-security-market-set-to-grow-fivefold-in-three-years http://www.businessweek.com/articles/2012-10-04/mobile-payments-a-new-frontier-for-criminals

Challenges Intra-class and inter-class variations Fingerprint matching Touchless sensors Latent fingerprint matching Face recognition Age invariant face recognition Heterogeneous face recognition Unconstrained face recognition Fake & altered biometric traits Soft biometrics

Intra-Class & Inter-Class Variations Large intra-class variability Large inter-class similarity

3D Touchless Sensor Virtual rolled image TBS Touchless 3D image Ink on paper

Rolled Fingerprint Matching True accept rate of 99.4% @ false accept rate of 0.01%

Latent Fingerprint Matching C. Wilson et al., Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report, NISTIR 7123, 2004 M. Indovina et al., Evaluation of Latent Fingerprint Technologies: Extended Feature Sets [Evaluation #2], NISTIR 7859, 2012 Rank-1 identification rate of only 68%

Latent Fingerprint Enhancement Latent Mated Rolled # Matched Minutiae = 2 Match Score = 3 Enhanced Latent Mated Rolled # Matched Minutiae = 13 Matching Score = 38 * Latent G063 from NIST SD27; 27,258 reference prints from NIST 14 & 27 ; Neurotechnology VeriFinger SDK 4.2

Age Invariant Matching Learn invariant features Synthesize appearances to offset facial variations

Heterogeneous Face Recognition Large intra-class variability due to change in modality

Video Surveillance 1 million CCTV cameras in London & 4 million in U.K.; average Briton is seen by 300 cameras/day; 3 million cameras in S. Korea

Unconstrained Face Recognition

Attacks on Biometric Systems Dummy finger from a lifted impression Face disguise Fake eyeball

Fingerprint Alteration Mutilated fingertips Pre-altered fingerprint Altered fingerprint

Privacy Concerns Will biometric be used to track people?

Soft Biometrics Provide some information about an individual, but lack the distinctiveness and permanence Ethnicity, Skin Color, Hair color Height Weight Periocular Birthmark Tattoos

Tattoo Caught in Surveillance Image Detroit police linked at least six armed robberies at an ATM after matching a tipster s description of the suspect s distinctive tattoos www.detroitisscrap.com/2009/09/567/

Summary Biometric recognition is indispensable in efforts to enhance security and eliminate fraud Fingerprint matching has been successfully used in forensics for over 100 years New deployments for civil registration, border crossing, financial transactions Market for mobile devices is emerging Seamless integration, recognition under nonideal conditions, user privacy, system integrity