06-04-2011, 03:43 PM
[attachment=11799]
Biometric Authentication System on Mobile Personal Devices
ABSTRACT
• We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network.
• The system consists of the following five key modules:
1. face detection;
2. face registration;
3. illumination normalization;
4. face verification; and
5. information fusion.
• For the complicated face authentication task on the devices with limited resources, the emphasis is largely on the reliability and applicability of the system.
INTRODUCTION
• In a modern world, there are more and more occasions in which our identity must be reliably proved.
• But what is our identity?
• Most often, it is a password, a passport, or a social security number. The page link between such measures and a person, however, can be weak as they are constantly under the risk of being lost, stolen, or forged.
• Biometrics, the unique biological or behavioral characteristics of a person, e.g., face, fingerprint, iris, speech, etc., is one of the most popular and promising alternatives to solve this problem.
• In this project, we study the biometric authentication problem on a personal mobile device (MPD) in the context of secure communication in a personal network (PN).
• A PN is a user centric ambient communication environment for unlimited communication between the user and the personal electronic devices.
• And also, we developed a secure, convenient, and low cost biometric authentication system on the MPD for the PN.
• The biometric that we chose is the 2-D face image, taken by the low-end camera on the MPD.
• The only requirement in using this system is that the user presents his or her face in a more or less frontal way within the capture range of the camera.
• User in the PN
REQUIREMENTS
• Three requirements of the biometric authentication system:
1. security;
2. convenience; and
3. complexity
BIOMETRIC AUTHENTICATION
• Growing interest in biometric authentication
• National ID cards, Airport security, Surveillance, Site access.
• Face recognition offers several advantages over other biometrics:
• Can be used without subjects knowledge.
• Human readable media.
• No association with crime, as with fingerprints.
• Data required is easily obtained and readily available.
AUTHENTICATION TYPES
• There are two types of authentication in the MPD scenarios:
1. Authentication at logon time and
2. Authentication at run time.
• In addition to logon time authentication, run time authentication is also important because it can prevent unauthorized users from taking an MPD in operation and accessing confidential user information from the PN.
AUTHENTICATION STEPS
• There are 5 steps in the authentication process:
1. Face detection
2. Face registration
3. Illumination normalization
4. Face verification
5. Information fusion
• Diagram of the biometric authentication system on the MPD
FACE DETECTION METHODS
• Face detection methods can be categorized into the following two large groups:
1. Heuristic-based methods and
2. Classification-based methods.
• Exhaustive set of candidates at any location and scale of the input image, where x is the basic classification unit to be classified
• (Left) Typical face images taken from ordinary handheld PDA , with the size 320 × 240. (Right) Downscaled face images with the size 100 × 75. Equally good face detection results can be obtained in both the original and the downscaled images
• Comparison of the false acceptance models.
(a) Original detections.
(b) Conventional probabilistic model.
© Proposed model with errors
• Original images from data base for illumination normalisation
• Histogram-equalized images
• Images filtered by the original LBP
• Images filtered by the simplified LBP
• Distributions of the two classes for the face detection case and the face verification case
• Limitations
• Comparison of the ROCs using different illumination normalization methods
• Output
ADVANTAGE
• Cost is low for hardware and software requirements.
APPLICATIONS
• It is widely used in the security applications like:
1. National ID cards,
2. Airport security,
3. Surveillance, and
4. Site access
CONCLUSION
• Face verification on the MPD provides a secure page link between the user and the PN.
• The series of solutions to the five modules proves to be efficient and robust. In addition, the different modules collaborate with each other in a systematic manner.
• The final system achieves an equal error rate of 2%, under challenging testing protocols.