Biometrics: Challenges and Applications

Download Report

Transcript Biometrics: Challenges and Applications

Biometrics: Challenges and
Applications
Department of
Computer Science
& Engineering
Ishwar K. Sethi
Department of Computer Science &
Engineering
Oakland University, Rochester, MI 48309
[email protected]
www.cse.secs.oakland.edu/isethi
iielab-secs.secs.oakland.edu
Biometrics – What is it?
Department of
Computer Science
& Engineering
Technology for
automated
recognition or
verification of the
identity of a
person using
physiological or
behavioral
characteristics
such as
fingerprints, hand
geometry, iris,
voice, and
signatures.
Recognition vs.
Verification
Department of
Computer Science
& Engineering
• Recognition or identification implies
checking whether a person is in the
system’s database or not. (one-tomany search)
• Verification or authentication
implies checking the identity claim
presented by a user. (one-to-one
search)
Why Biometrics?
•
–
Department of
Computer Science
& Engineering
–
•
–
–
Better than
password/PIN
No need to
memorize
passwords
Requires physical
presence of the
person to be
identified
Better than
smart cards
Cannot be stolen
Cannot leave it at
home
Biometric System
Architecture
Enrollment Phase
Department of
Computer Science
& Engineering
Data Capture &
Conditioning
Feature
Extraction
Template
Database
Template
Formation
Template
Matcher
Identification/Verification Phase
Data Capture &
Conditioning
Feature
Extraction
Template
Formation
Decision
Output
Processing Examples
Data Capture &
Conditioning
Department of
Computer Science
& Engineering
Feature
Extraction
Fingerprint
Processing
Template
Formation
Retinal Scan
Processing
Data Capture &
Conditioning
Template
Formation
Feature
Extraction
An Example of a Face
Template
Department of
Computer Science
& Engineering
Template Size
Department of
Computer Science
& Engineering
Performance Measures
• False match rate (FMR)
Department of
Computer Science
& Engineering
– How often the system will match a
subject with someone else’s template
• False non-match rate (FNMR)
– How often the system will fail to verify
a match when it does really exist
• Failure to enroll rate (FER)
– How often the system fails to enroll a
person because of the unacceptable
quality of the person’s biometric sample
State of the Art
Performance Metrics
Department of
Computer Science
& Engineering
• False match rates have been falling
as the technology matures. Near
zero rates are possible with some
technologies
• False non-match rates lie in single
digit range
• Failure to enroll rates can be as high
as about 12%
Factors Affecting
Performance
• Data capture factors
Department of
Computer Science
& Engineering
– Lighting, background noise, pose
etc.
• Sensor interoperability
• Temporal changes
– Facial hair, eye glasses etc.
• Segmentation error
Face Recognizer
Challenges
Department of
Computer Science
& Engineering
Segmentation Error
Department of
Computer Science
& Engineering
Biometric Applications (1)
Department of
Computer Science
& Engineering
Biometric Applications (2)
Department of
Computer Science
& Engineering
Department of
Computer Science
& Engineering
Biometric Revenue Growth
Department of
Computer Science
& Engineering
Market Share by
Technology
Department of
Computer Science
& Engineering
Leading Biometric
Applications and Vertical
Markets
Department of
Computer Science
& Engineering
Modality
Application
Key Vertical
Market
Fingerprint
Civil
Identification
Government
Face Recognition
Surveillance &
Screening
Travel &
Transportation
Hand Geometry
PC & Network
Security
Financial Sector
Middleware
Retail/ATM/POS Healthcare
Iris Recognition
Remote
Authentication
Source: International Biometric Group
Law
Enforcement
How Secure Are Biometric
Systems?
Department of
Computer Science
& Engineering
Security system gets thumbs down from honours student
By CATRIONA JACKSON
Thursday, 13 June 2002
An ANU computer science student has fooled state-of-the-art thumbprint
security systems, and warned banks and business they aren't as secure as
they seem.
Australian National University honours student Chris Hill has proved that
"biometric" security systems, that use retina and fingerprint scanning to
identify people, could be fooled using the information stored inside the system
itself.
As part of his honours thesis, Mr Hill tried the theory out on a commercially
available system, and cracked it.
Defeating Spoofing of
Biometric Systems
Department of
Computer Science
& Engineering
• Randomization of verification
data
• Retention of identifiable data
• Using multiple biometrics
• Using a combination of
biometrics and smart cards
Societal Issues (1)
• Are some people left out because of
physiological considerations
Department of
Computer Science
& Engineering
– For example, about 3% of the population
has poor fingerprint quality
• Religious objections
– “Mark of the Beast” objection.
• Pat Robertson, host of “The 700 Club” and founder of
The Christian Broadcasting Network, Inc., observes
that the “Bible says the time is going to come when you
cannot buy or sell except when a mark is placed on your
hand or forehead.”
Societal Issues (2)
• Informational privacy
Department of
Computer Science
& Engineering
– Function creep
– Tracking
– Identity theft
• Physical Privacy
– Stigmatization
– Hygiene
Function Creep
Department of
Computer Science
& Engineering
• Function creep, or mission creep, is the process by
which the original purpose for obtaining the
information is widened to include purposes other
than the one originally stated. Function creep can
occur with or without the knowledge or agreement
of the person providing the data.
• Examples
– The use of SSN for purposes it was never intended
to is the best example of function creep.
– South Carolina sold photographs of the state’s
drivers to Image Data LLC, a New Hampshire
company.
Tracking
Department of
Computer Science
& Engineering
• Possibility of linking different
transactions to build a profile
• Use of face recognition to
covertly monitor individuals
– Super Bowl in Tampa, Florida to
identify would be criminals and
terrorists
Identity Theft
Department of
Computer Science
& Engineering
• Although the biometrics provide
a greater protection against the
identity theft, the remote
authentication does open up the
possibility of identity theft.
• Liveness/Spoofing
Privacy Risk Factors (1)
• Overt/Covert
Department of
Computer Science
& Engineering
– Whether biometric signatures can be acquired
without users knowledge or not. Covert systems
are highly privacy invasive
• Optional/Mandatory
– Mandatory systems are considered more prone
to privacy risks
• Verification/Identification
– Systems with identification capabilities are
considered more risky
• Ownership of biometric data
– Systems where the biometric data resides with
the owner are less susceptible to privacy abuse
Privacy Risk Factors (2)
• Behavioral/Physiological
Department of
Computer Science
& Engineering
– Behavioral biometric systems are less likely to
be employed in a privacy invasive manner
• Templates/Identifiable Data
– Systems that maintain identifiable data in
addition to templates are more risky
• Public/Private Sector
– Public sector use is more open to abuse due to
lax controls while private sector may be
tempted to share/link with others
Comparative Strengths of
Different Biometric
Technologies
Department of
Computer Science
& Engineering
Summary
Department of
Computer Science
& Engineering
• Biometrics is at the threshold of
tremendous growth. Numerous applications
are emerging. The war on terror has
hastened the deployment of biometrics
• Much hype in performance. Lots of
improvements are needed
• Template protection and methods against
spoofing are needed
• Privacy concerns need better addressing