25-03-2011, 04:25 PM
[attachment=11011]
Biometrics Systems
Biometric Systems Segment Organization
Introduction
System architecture
Introduction
Biometrics
Engineering Definition and Approaches
Definition, Criteria for Selection
Survey of Current Biometrics and Relative Properties
Introduction to socio-legal implications and issues
Recap –
Identification in the 21st Century
Dispersion of people from their “Natural ID Centers”
Social units have grown to tens of thousands or millions/billions.
Need to assure associations of identity with end-to-end transactions without physical presence
Project your presence (ID) instantly, accurately, and securely across any distance
Identification Methods
We need to achieve this recognition automatically in order to authenticate our identity.
Identity is not a passive thing, but associated with an act or intent involving the person with that identity
Seek a manageable engineering definition.
Biometric Identification
Pervasive use of biometric ID is enabled by automated systems
Enabled by inexpensive embedded computing and sensing.
Computer controlled acquisition, processing, storage, and matching using biometrics.
Biometric systems are one solution to increasing demand for strong authentication of actions in a global environment.
Biometrics tightly binds an event to an individual
A biometric can not be lost or forgotten, however a biometric must be enrolled.
What is an Automated Biometric System?
An automated biometric system uses biological, physiological or behavioral characteristics to automatically authenticate the identity of an individual based on a previous enrollment event.
For the purposes of this course, human identity authentication is the focus. But in general, this need not necessarily be the case.
Characteristics of a Useful Biometric
If a biological, physiological, or behavioral characteristic has the following properties…
Universality
Uniqueness
Permanence
Collectability
….then it can potentially serve as a biometric for a given application.
Useful Biometrics
1. Universality
Universality: Every person should possess this characteristic
In practice, this may not be the case
Otherwise, population of nonuniversality must be small < 1%
2. Uniqueness
Uniqueness: No two individuals possess the same characteristic.
Genotypical – Genetically linked (e.g. identical twins will have same biometric)
Phenotypical – Non-genetically linked, different perhaps even on same individual
Establishing uniqueness is difficult to prove analytically
May be unique, but “uniqueness” must be distinguishable
3. Permanence
Permanence: The characteristic does not change in time, that is, it is time invariant
At best this is an approximation
Degree of permanence has a major impact on the system design and long term operation of biometrics. (e.g. enrollment, adaptive matching design, etc.)
Long vs. short-term stability
4. Collectability
Collectability: The characteristic can be quantitatively measured.
In practice, the biometric collection must be:
Non-intrusive
Reliable and robust
Cost effective for a given application
Current/Potential Biometrics
Voice
Infrared facial thermography
Fingerprints
Face
Iris
Ear
EKG, EEG
Odor
Gait
Keystroke dynamics
DNA
Signature
Retinal scan
Hand & finger geometry
Subcutaneous blood vessel imaging
System-Level Criteria
Our four criteria were for evaluation of the viability of a chosen characteristic for use as a biometric
Once incorporated within a system the following criteria are key to assessment of a given biometric for a specific application:
Performance
User Acceptance
Resistance to Circumvention
Central Privacy, Sociological, and Legal Issues/Concerns
System Design and Implementation must adequately address these issues to the satisfaction of the user, the law, and society.
Is the biometric data like personal information (e.g. such as medical information) ?
Can medical information be derived from the biometric data?
Does the biometric system store information enabling a person’s “identity” to be reconstructed or stolen?
Is permission received for any third party use of biometric information?
What happens to the biometric data after the intended use is over?
Is the security of the biometric data assured during transmission and storage?
Contrast process of password loss or theft with that of a biometric.
How is a theft detected and “new” biometric recognized?
Notice of Biometric Use. Is the public aware a biometric system is being employed?
Biometric System Design
Target Design/Selection of Systems for:
Acceptable overall performance for a given application
Acceptable impact from a socio-legal perspective
Examine the architecture of a biometric system, its subsystems, and their interaction
Develop an understanding of design choices and tradeoffs in existing systems
Build a framework to understand and quantify performance
Automated Biometric Identification: A Comprehensive View
Biometric Systems Segment Organization
Introduction
System Architecture
System Architecture
Application
Authentication Vs. Identification
Enrollment, Verification Modules
Architecture Subsystems
Biometric Applications
Four general classes:
Access (Cooperative, known subject)
Logical Access (Access to computer networks, systems, or files)
Physical Access (access to physical places or resources)
Transaction Logging
Surveillance (Non-cooperative, known subject)