b1 Intro-Utc10
b1 Intro-Utc10
Cryptography ---
Introduction
CPSC 4600/5600 Biometric and
Cryptography
University of Tennessee at
Chattanooga
Who are you??
2
How are people
identified?
People’s identity are verified and
identified by three basic means:
– Something they have (identity document
or token)
– Something they know (password, PIN)
– Something they are (human body such as
fingerprint or iris).
The strongest authentication involves
a combination of all three.
3
Person Identification
Identifying fellow human beings has been
crucial to the fabric of human society
In the early days of civilization, people lived
in small communities and everyone knew
each other
With the population growth and increase in
mobility, we started relying on documents
and secrets to establish identity
Person identification is now an integral part
of the infrastructure needed for diverse
business sectors such as banking, border
control, law enforcement.
4
Automatic Identification
Different means of automatic identification:
Possession-based (credit card, smart
card)
– “something that you have”
Knowledge-based (password, PIN)
– “something that you know”
Biometrics-based (biometric identifier)
– “something about or produced by your
physical make-up”
5
Problems with Possession-
or Knowledge-based
Approaches
Card may be lost, stolen or forgotten
– Password or PIN may be forgotten or guessed by
the imposters
~25% of people seem to write their PIN on their ATM
card
Estimates of annual identity fraud damages:
– $56.6 billion in credit card transactions in U.S.
alone in 2005*
0.25% of internet transactions revenues, 0.08%
of off-line revenues
– $1 billion in fraudulent cellular phone use
– $3 billion in ATM withdrawals
The traditional approaches are unable to differentiate
between an authorized person and an impostor
6
Identification Problems
Identity Theft: Identity thieves steal
PIN (e.g., date of birth) to open credit
card accounts, withdraw money from
accounts and take out loans
7
What are Biometrics?
Biometrics – science, which deals with the
automated recognition of individuals (or
plants/animals) based on biological and behavioral
characteristics
Biometry – mathematical and statistical analysis
of biological data
Biometric system – a pattern recognition system
that recognizes a person by determining the
authenticity of a specific biological and/or
behavioral characteristic (biometric)
Anthropometry–measurement techniques of
human body and its specific parts
Forensic (judicial) anthropometry–identification
of criminals by these measurement techniques
8
Why Biometrics
9
Why Biometrics?
10
Mentioning the Obvious
11
Requirements for an
Ideal Biometric
Identifier
1. Universality
– Every person should have the biometric characteristic
2. Uniqueness
– No two persons should be the same in terms of the
biometric characteristic
3. Performance
– The biometric characteristic should be invariant over
time
4. Collectability
– The biometric characteristic should be measurable
with some (practical) sensing device
5. Acceptability
– One would want to minimize the objections of the
users to the measuring/collection of the biometric
12
Identifiable Biometric
Characteristics
Biological traces
– DNA (DeoxyriboNucleic Acid), blood,
saliva,etc.
Biological (physiological)
characteristics
– fingerprints, eye irises and retinas, hand
palms and geometry, and facial geometry
Behavioral characteristics
– dynamic signature, gait, keystroke
dynamics, lip motion
Combined
– voice
13
Biometrics is Not New!!
Bertillon system (1882) took a subject's photograph,
and recorded height, the length of one foot, an arm
and index finger
Galton/Henry system of fingerprint classification
adopted by Scotland Yard in 1900
FBI set up a fingerprint identification division in 1924
AFIS installed in 1965 with a database of 810,000
fingerprints
First face recognition paper published in 1971
(Goldstein et al.)
FBI installed IAFIS in ~2000 with a database of 47
million 10 prints; average of 50,000 searches per day;
~15% of searches are in lights out mode; 2 hour
response time for criminal search
Emphasis now is to automatically perform reliable person
identification in unattended mode, often remotely (or at a
14
distance)
Biometrics
– A biometric authentication system uses the
physiological (fingerprints, face, hand geometry,
iris) and/or behavioral traits (voice, signature,
keystroke dynamics) of an individual to identify a
person or to verify a claimed identity.
15
Comparison of
Biometric Techniques
16
Key Biometric Terms and
Process
17
What is Biometric?
20
Using Biometrics
Process flow includes enrollment, and
verification/identification.
Enrollment
– Person entered into the database
– Biometric data provided by a user is converted into
a template.
– Templates are stored in a biometric systems for
the purpose of subsequent comparison.
21
Verification versus
Identification
22
Identification versus
Verification
Identification: Who am I?
– One to many comparison
– can determine the identity of a person
from a biometric database without
that person first claiming an identity.
23
Discussion: Verification and
Identification
25
When are verification and
identification appropriate?
PC and Network Security -- verification
Access to buildings and rooms – either
verification (predominant) or
identification
Large-scale public benefit programs –
identification
Verification systems are generally faster
and more accurate than identification
systems.
However, verification systems cannot
determine whether a given person is
present in a database more than once.
26
When are verification and
identification appropriate?
28
Different Biometrics
29
Physiological and Behavioral
Characteristics
Physiological or behavioral characteristics are
distinctive, which provide basic measurement
of biometrics.
Physiological biometrics are based on direct
measurements of a part of the human body,
such as finger-scan, facial-scan, iris-scan,
hand-scan, and retina-scan.
Behavioral biometrics are based on
measurements and data derived from an
action and therefore indirectly measure
characteristics of the human body, such as
voice-scan and signature-scan.
The element of time is essential to behavioral30
biometrics.
DNA (Deoxyribo Nucleic
Acid)
The Ultimate Biometric
One-dimensional unique code for one’s
individuality, but identical twins have
identical DNA patterns
Issues limiting the utility of DNA
– Contamination
– Access
– Automatic real-time recognition issues
– Privacy issues: information about
susceptibilities of a person to certain
diseases could be gained from the DNA
pattern
31
Behavioral vs Physical
Traits
Physical Characteristics
– Iris
– Retina
– Vein Pattern
– Hand Geometry
– Face
– Fingerprint
– Ear shape
Behavioral Characteristics
– Keystroke dynamics
– Signature dynamics
– Walking Gait
– Voice
32
Fingerprints
33
Fingerprint Features
34
Iris Recognition: Eye
35
Iris Code
36
National Geographic
1984 and 2002
37
Retina
38
Face Recognition:
Correlation
39
Face Recognition: 3D
40
Hand
41
Palm
42
Vein
43
Ear
44
Market Share
45
Biometric Applications
46
Biometric Application
Biometric technology is used for many
applications
– Providing time and attendance
functionality for a small company
– Ensuring the integrity of a 10 million-
person voter registration database
The benefit of using biometrics include
increased security, increased
convenience, reduced fraud or delivery
of enhanced services.
47
UCSD Biometric Soda
Machine
48
*As part of the enhanced procedures,
most
visitors traveling on visas will have two
fingerprints scanned by an inkless
device and a digital photograph
taken. All of the data and
information is then used to assist
the border inspector in determining
whether or not to admit the traveler.
These enhanced procedures will add
only seconds to the visitor’s overall
processing time.
49
National Biometric ID
Cards
U.K. to consider national biometric ID cards,
database
By Laura Rohde, COMPUTERWORLD (Nov 29, 2003)-
The U.K. government is set to consider legislation next year
for the establishment of compulsory biometric identity cards
and a central database of all U.K. subjects, it was announced
by the government this week.
The information that the government is considering for
inclusion on the card includes personal details such as a
person's home address and telephone number, his National
Insurance number (the equivalent of the U.S. Social Security
number), medical information and criminal convictions, as
well as the biometric information, most likely in the form of
an iris, fingerprint or palm print scan.
50
Access Control
51
Did You Vote?
52
Applications
Video Surveillance (On-line or off-line)
53
Fingerprint System at Gas
Stations
“Galp Energia SGPS SA of Lisbon
won the technology innovation
award for developing a payment
system in which gasoline-station
customers can settle their bills
simply by pressing a thumb against
a glass pad. Scanning technology
identifies the thumbprint and sends
the customer's identification
information into Galp's back-office
system for payment authorization.”
THE WALL STREET JOURNAL,
November 15, 2004
54
Using Iris Scans to Unlock
Hotel Rooms
55
Fingerprint System at
Border Crossings
“Foreigners entering the
United
State in three cities, including
Port Huron, were fingerprinted,
photographed and subjected to
background checks on Monday
in a test of a program that will
eventually be extended to
every land border crossing
nationwide.”
Lansing State Journal, Nov.
16, 2004
56
New Passports
57
Want to Charge It? You'll
Have to Talk to Your Credit
Card
60
Key Terms
61
Template (1)
62
Template (2)
66
Enrollment and Template
Creation (1)
68
Enrollment and Template Creation
(3)
Biometric data are
converted to templates
through feature extraction.
Feature extraction is the
automated process of
locating and encoding
distinctive characteristics
from biometric data in
order to generate a
template.
Feature extraction
removes noises and
unwanted data, and
digitize biometric traits.
69
Enrollment and Template Creation
(4)
A user may need to present biometric
data several times in order to enroll.
Enrollment score or quality score
indicates the enrollment attempt is
successful or not.
If the user’s biometric data contains
highly distinctive features or an
abundance of features, there will likely
be a high enrollment score.
Vendor’s feature extraction processes
are generally patented and are always
held secret.
70
How Biometric Matching Works
Verification/Identification template is
compared with enrollment templates.
The comparison renders a score, or
confident value.
The score is compared with threshold.
If the score exceeds the threshold,
the comparison is a match, non-
match otherwise.
71
Biometric Algorithm
76
Biometric Matching: Process
Flow
The user submits a sample (biometric data) via an
acquisition device (for example, a scanner or camera)
This biometric is then processed to extract information
about distinctive features to create a trial template or
verification template
Templates are large number sequences. The trial/match
template is the user’s “password.”
Trial/match template is compared against the reference
template stored in biometric database.
77
Overview of Biometrics
Biometric Acquisition Device Sample Feature Extracted
Iris Infrared-enabled video camera, Black and white iris image Furrows and striations of iris
PC camera
Fingerprint Desktop peripheral, PC card, Fingerprint image (optical, Location and direction of
mouse chip or reader silicon, ultrasound or ridge endings and
embedded in keyboard touchless) bifurcations on
fingerprint, minutiae
Signature Signature Tablet, Motion- Image of Signature and Speed, stroke order,
sensitive stylus record of related pressure and
dynamics appearance of
measurement signature
Face Video Camera, PC camera, Facial image (optical or Relative position and shape
single-image camera thermal) of nose, position of
cheekbones
Hand Proprietary Wall-mounted unit 3-D image of top and Height and width of bones
sides of hand and joints in hands and
fingers
Retina Proprietary desktop or wall Retina Image Blood vessel patterns and
78
mountable unit retina
Strengths, Weaknesses and
Usability of Biometrics
Biometric Strengths Weakness Usability
Iris Very stable over time Potential user resistance Information security
Uniqueness Requires user training access control,
Dependant on a single especially for
vendor’s technology Federal Institutions and
government
agencies
Physical access
control (FIs and
government)
Kiosks (ATMs and
airline tickets)
Fingerprint Most mature biometric Physical contact required (a IS access control
technology problem in some cultures) Physical access
Accepted reliability Association with criminal control
Many vendors justice Automotive
Small template (less Vendor incompatibility
than 500 bytes) Hampered by temporary
Small sensors that can physical injury
be built into mice,
keyboards or portable
devices
Optical Most proven over time Large physical size
Temperature stable Latent prints
CCD coating erodes with age 79
Durability unproven
Strengths, Weaknesses and
Usability of Biometrics
Biometrics Strengths Weakness Usability
Signatures High user acceptance Unstable over time Portable devices with
Minimal training Occasional erratic stylus input
variability Applications where a
Changes with illness, stress “wet signature”
or injury ordinarily would be
Enrollment takes times used. 80
Strengths, Weaknesses and
Usability of Biometrics
Biometric Strengths Weakness Usability
s
Face Universally Cannot distinguish Physical access
present identical siblings control
Religious or cultural
prohibitions
Hand Small template Physical size of Physical access
(approximately acquisition device control
10 bytes) Physical contact Time and
Low failure to required attendance
enroll rate Juvenile finger growth
Unaffected by Hampered by temporary
skin condition physical injury
87
Acceptance and Rejections
True acceptance
Legitimate users
get accepted.
rate
get rejected.
91
92