Unit1 Biometrics(Part-1) (2)
Unit1 Biometrics(Part-1) (2)
Elective
Academic Year 2025 (Even Semester)
Dr. B. AMUTHA
Professor/CTech
Mobile: 9445242714
Email: amuthab@srmist.edu.in
Room: TP106
Cloud Computing 1
GCR Details
GCR Link
https://classroom.google.com/c/NzMzODYyMzk3MTQx?cjc=uidkktf
GCR Code
uidkktf
2
Course Outcomes (COs):
Cloud Computing 3
Learning Outcomess will
At the end of this course, learners will be able to:
• Acquire the knowledge on various biometric traits
• Acquire the ability to identify pattern recognition
system and its features
• Understand the basic ideas about physical and
behavioral biometric traits
• Apply the knowledge of biometrics on developing
identification system.
• Apply the knowledge for designing biometric
systems
• Acquire the knowledge on authentication systems
for real time security applications
Cloud Computing 4
CO-PO Mappings
Cloud Computing 5
Overall Assessment Plan
Cloud Computing 6
Learning Resources
Cloud Computing 7
Learning Resources
Reference Books
Cloud Computing 9
UNIT – I Contents
• Introduction to Biometric Systems
• Biometric Functionalities :Verification and
Identification
• The Design Cycle of Biometric Systems
• Introduction to Unimodel Systems
• Introduction to multi-model Biometric Systems
• Biometric System Errors & Performance
Measures
UNIT – I Contents
• Image Processing Basics
• First & Second Derivatives
• Steps in Edge Detection, Smoothing, enhancement,
etc
• Robert’s method, Sobel’s method and Perwits
Method
• Laplacian of Gaussian, Zero Crossing
• Low Level Feature Extraction, Describing Image
Motion
• High Level Feature Extraction, Template Matching
• Hough Transforms for Lines, Circles and Ellipses
Session – 1 & 2
• Introduction to Biometric Systems
– Biometric Functionalities :Verification and
Identification
Disadvantages
• Violation of Privacy
• Need of significant computational resources
• Intra-class variation: Due to change in pose or age
• Vulnerable to spoof attacks
Traits, indicators, identifiers or
modalities.
Physical/Behavioural Characteristics used in BS
• Fingerprint, face, hand/Finger geometry, iris,
retina, signature, gait, palm-print, voice pattern,
ear, hand vein, odour or the DNA information of
an individual to establish identity
• These characteristics are referred to as traits,
indicators, identifiers or modalities.
Traits, indicators, identifiers or
modalities.
Different Traits
Operation of a Generic Biometric
System
A generic biometric system
Database
Enrollment
Matching
Feature Enroll/
Preprocessing
Extraction Match
Physiological biometrics:
• Physiological biometrics are hardware-dependent, unlike
biometric behavior.
• Physiological biometric authentication provides accurate
results compared to the behavioral mechanism.
Keeping these key points in mind, it is a better alternative
to use physiological biometrics if the behavioral mechanism
does not authenticate the user.
Physiological biometrics should be sufficient in
environments where high protection is not required
The social issues in Biometric Authentication
mechanism
• The biometric-based authentication system can be
attacked by Insider attacker and stranger
• A scammer can make various attempts to spoof a
legitimate user's biometric trait to bypass system
security.
• The biometric data obtained by a person during the
authentication process can vary significantly from the
data used to produce the template during enrollment.
That can have a big effect on the matching process.
Multi-Biometric Systems
• One way to improve the accuracy of biometric
systems is to use more than one biometric trait in a
recognition application.
• For example, the face and iris traits, or the
fingerprints from all the ten fingers of an individual
may be used together to resolve the identity of an
individual.
• Such systems are known as multi-biometric systems.
• These systems are expected to be more accurate and
reliable due to the availability of multiple pieces of
evidence
Data Collection
• The collection of biometric data from a subset of the
targeted population.
• This data is required both for designing the feature
extraction and matcher modules as well as for the
evaluation of the designed biometric system.
• Due to the involvement of human subjects, legal and
privacy issues must also be considered and approval
of organizations like the Institutional Review Board
(IRB) is mandatory in many countries.
• This makes biometric data collection a time-
consuming, relatively expensive, and cumbersome
process
Data collection
• Multiple Sensors
• Multiple Biometrics
• Multiple units of same biometrics
• Multiple snapshots of same biometrics
• Multiple Classifiers
Types of Multimodal Biometric
System
• Multi algorithmic biometric system: System
take a single sensor and then process it using
two or more different algorithms.
• Multi instance biometric systems: Systems
use one or more sensors to capture samples
of two or more different samples of same
biometric trait.(Capturing images of multiple
fingers)
Multi Sensorial Biometric Systems
• Multi sensorial biometric systems: system use
two or more distinctly different sensors to
capture the same instance of a biometric trait.
• Captured samples are then processes using
single algorithm or combination of algorithm
• ( eg: same facial image is captured using
visible light camera and infrared camera fixed
with particular frequency)
Fusion Strategies
• If the threshold is increased, FAR will decrease but the FRR will
increase and vice versa. Hence, for a given biometric system, it is
not possible to decrease both these errors simultaneously by
varying the threshold.
• The Genuine Accept Rate (GAR) or True Accept Rate (TAR) can be
used as an alternative to FRR
Four Categories of Users
• Four categories of users are usually defined in the
biometrics (Doddington’s zoo)
– Sheep represent users whose biometric feature sets are very
distinctive and exhibit low intra-class variations. Therefore,
these users are expected to have low false accept and false
reject errors.
– Goats refer to users who are prone to false rejects. The
biometric feature sets of such users typically exhibit large intra-
class variations
Performance measures
– Lambs are users whose biometric feature set overlaps
extensively with those of other individuals. The biometric
feature sets of these users have high inter-user similarity. Thus,
a randomly chosen user (from the target population) has a
higher probability of being accepted as a lamb than as a sheep.
The false accept rate associated with these users is typically high
– Wolves indicate individuals who are successful in deliberately
manipulating their biometric trait (especially behavioural traits)
in order to impersonate legitimately enrolled users of a system.
Since the wolves make a concerted effort to adopt the identity
of another user, such an effort is often referred to as an
adversary attack and it can increase the FAR of a system.
Examples include forging the signature of another user or
mimicking someone else’s voice
Performance measures
• The Failure to Enroll (FTE) rate denotes the proportion of
users that cannot be successfully enrolled in a biometric
system
• This necessitates the design of robust and efficient user
interfaces that can assist an individual both during
enrollment and recognition
• The fraction of authentication attempts in which the
biometric sensor cannot capture the sample presented to
it is known as Failure to Capture (FTC) or Failure to
Acquire (FTA) rate
• Thus, periodic sensor maintenance is instrumental for the
efficient functioning of a biometric system
Performance measures
• The performance of a biometric system may also be
summarized using other single-valued measures such as
the Equal Error Rate (EER) and the d-prime value
• The EER refers to that point in a Detection Error Tradeoff-
DET (or) Receiver Operating Characteristic - ROC curve
where the FAR equals the FRR; a lower EER value,
therefore, indicates better performance.
• The d-prime value (d) measures the separation between
the means of the genuine and impostor probability
distributions in standard deviation units and is defined as
Performance measures
• where μ1 (μ0) and σ1 (σ0) are the mean and standard
deviation, respectively, of the genuine (impostor) score
distributions.
• A higher d-prime value indicates better performance.
• Another single valued performance measure is known as
the F-Ratio, which is defined as