SlideShare uma empresa Scribd logo
1 de 69
Baixar para ler offline
BIOMETRICS
OF ID & Security
Prof Peter Cochrane OBE
w w w. p e t e r c o c h r a n e . c o m
“ B i o m e t r i c s a re h u m a n p h y s i c a l ,
physiological or behavioural characteristics
that can be used to digitally identify a person
or engineer security in the granting of access
to systems, devices or data”
D e f i n i t i o n
C o n c i s e & S u f f i c i e n t
Identification: "Who are you?”
Authentication: “Are you really who you say you are?”
Behaviours: “Are you behaving/functioning normally?”
p u r p o s e
T h e s e c u r i t y n e e d
M i g r a t i o n
F a r m o r e n a t u r a l m o d e s
Name
Address
Age
Passport
Licences
Visas
DoBPostCode
UserName
Password
PIN
Dongle
Phone
M
obile
Account
TwoFactor
Mothers
Name
Favourite
Colour
M a n M a d e
U n n a t u r a l
C h a l l e n g i n g
I n c o n v e n i e n t
P e o p l e S e r v i n g
T h e Te c h n o l o g y
Hand/s
Finger/s
Face
Voice
Eye/s
Ear/s
Lips
Teeth
Hue
Movement
Gaite
Behaviours
Habbits
Style
Te c h S e r v i n g
T h e P e o p l e
N a t u r e
N a t u r a l
E a s y 2 u s e
C o n v e n i e n t
Typing
Writing
Keying
M o d e r n H i s t o r y
Stretches back to Pre-Babylonia/Pre-China
M o d e r n H i s t o r y
Stretches back to Pre-Babylonia/Pre-China
S P E C T R U M
T e c h n o l o g y / T e c h n i q u e
Cost
Complexity
Accuracy
Security
Strength
Popularity
Deployments
Ease of Use
Utility
Biometric
Behavioural
Walking

Talking

Moving

Typing

Writing

Touch

Stroke
The primary characteristics, parameters
& degrees of freedom at our disposal…
there are more but far less convenient!
T A R G E T S
S t r e n g t h e n o r O b v i a t e
We are all in Password/PIN overload and
a new/better/more natural solution is
long overdue and biometrics fits the
bill along with chip implants
G o v e r n m e n t
C r i m i n a l R e c o r d s
M e d i c a l S e r v i c e
B o r d e r C o n t r o l
W o r k P e r m i t s
O f f i c i a l I D
P a s s p o r t s
R e g i s t e r s
I D C a r d s
L i c e n c e s
C e n s u s
V o t i n g
V i s a s
+ + +
A p p l i c a t i o n S p a c e
I D , S e c u r i t y , V a l i d a t i o n , C o n v e n i e n c e , S u r e t y
A c c e s s
F i l e
S a f e
B a n k
R o o m
H o m e
O f f i c e
D e v i c e
V e h i c l e
C a m p u s
M a c h i n e
A c c o u n t
B u i l d i n g
+ + +
G e n e r a l
E n t e r t a i n m e n t
C e r t i f i c a t i o n
T r a n s a c t i o n s
E m p l o y m e n t
P u r c h a s e s
E d u c a t i o n
S e r v i c e s
S e c u r i t y
H e a l t h
T r a v e l
W o r k
P l a y
+ + +
A d va n ta g e s
I n r e l a t i v e c o n t e x t
Security: Unique ID - extremely difficult to forge/cheat/replicate
Accuracy: Exceeds our ability to recognise another human
Accountability: Certifying every transaction and interaction
Integration: Easy to engineer into existing operational systems
Spectrum: Universally applicable - buying a coffee to site access
Cost: Very cheap compared to the risks across the attack spectrum
Ceiling: In the limit accuracy by concatenation exceeds that of DNA
Recognition Field
I n t e c h a v a i l a b i l i t y c o n t e x t
Signature
Finger
Voice
Hand
Face
DNA
Dress
Typing
Talking
Writing
TXTing
Walking
Typing
Talking
TXTing
Writing
Walking
PIN Entry
PRINTS STYLE RYTHM PROFILE DYNAMICS
Face
Body
Colour
Weight
Thermal
Electronic
Gaze
Speech
Movement
Idiosyncrasies
“All lifeforms are constructs of the same ‘star-dust’ and share the
same base genes traceable for eons through evolutionary chains
to the primeval sludge that catalysed life in the beginning”
VA R I A N C E S
Across a vast spectrum
“All of humanity comes from the same fundamental seed, and we
share a common specification, but individually we are all so very
different and have been so for all time”
“Despite the many deltas; human-kind are very much
a single species with same hopes and worries”
“No two men, and no two women are identical/the same
within an ethnic group, and crossing the boundaries or
ethnicity sees those differences amplified”
C o n f o r m i n g
B y d e f i n i t i o n w e d o n o t
“Dimensioning humans against a notional artistic
perfection of beauty defined by simple geometric
measures sees none of us complying - and the
deviation from such an ideal template defines us,
makes us interesting, and makes us recognisable
and identifiable”
C o n f o r m i n g
B y d e f i n i t i o n w e d o n o t
“This applies to every physical and metaphysical
aspect of human form, function, and existence
to provide an infinity of variances against which
we can be measured for identification,
authentication and aberrations in activity”
V A R I A N C E S
Example o f j ust one p arameter
Age Years
Bone
Density
We have to take great
care when considering
aspects of this kind &
m u s t n o t o v e r l o o k
c a u s a l i t y : h i s t o r y ,
genealogy, climate, diet,
prosperity, societal
aspects and conventions
It is worth recalling the
history and the many failed
attempts to establish the
validity of physiognomies
that date back to Ancient
Greece - We should ‘never
judge a book by its cover’
V A R I A N C E S
Example of t he sp ectrum
Example: Camera height & angle,
head size & facial features, tonal
scales, mass distribution et a
It is worth recalling the
history and the many failed
attempts to establish the
validity of physiognomies
that date back to Ancient
Greece - We should ‘never
judge a book by its cover’
V A R I A N C E S
Example of t he sp ectrum
VA R I A N C E S
T h e l a n g u a g e s p e c t r u m
~6500 spoken languages
>65,000 dialects
>650,000 regional accents
>?? non-native speaking accents
>?? tonal scales
>?? colloquialisms, uphermisms, slang+
The Phrase Repeated in 15 Languages:
“I want to eat a pancake but I’m too
lazy to make it”!
Engineering a single engine to
translate this is a major challenge,
but recognising and/or identifying the
speaker is far easier!
S p o k e n D e m o n s t r a t i o n
S E G U A E
T h e p o we r o f D e l t a s
Mono-cultures in all lifeforms and systems created (in
isolation) so far including biological and human
societies are extremely efficient, brittle, ultimately
self damaging, unsustainable, and always short lived
S E G U A E
T h e p o we r o f D e l t a s
Mono-cultures in all lifeforms and systems created (in
isolation) so far including biological and human
societies are extremely efficient, brittle, ultimately
self damaging, unsustainable, and always short lived
“The diversity of people, teams, organisations, countries, civilisations and their
willingness to embrace differences, to adapt, adopt, innovate and change is what makes
them powerful and functionally effective. AND this is also true of biology and organisms
in general as well as our man-made networks and systems”
For our purposes the variety of
Deltas that our species exhibits
is an overt blessing available to
be exploited
Human
Macro
ou
Dimensioning
Human Macro
Physical Sizes, Skin Tones, Asymmetries, Blemishes,
Hair Colour, Stance, Thermal Profile + Dynamics
This data is generally disguised,
distorted, and/or lost under
clothing, be further degraded
by the dynamics of movement
GOING FOR THE
( I N ? ) V I S I B L E
The normally hidden detail
can be accessed using full or
partial body scanners to a
greater or lesser degree
It is expensive in time and $$
to access the hidden, but we
can ride the EM Spectrum for
more or less depth of detail
Mainly a safety and security
over modesty game that is
very hard to defeat, but not
entirely fool proof!
With an abundance of derivable metrics it
is only in the extreme that we have to
venture into the obscure and unseen
This data is ge
distorted, lost
degraded by
movement
Detailed characterisation of facial and other
body components into a field of data points
Human Micro
Dimensioning/Characterising
This data is ge
distorted, lost
degraded by
movement
Detailed characterisation of facial and other
body components into a field of data points
At a fundamental level we have an n-D
pattern matching problem of
reasonably slow stochastic variables
Human Micro
Dimensioning/Characterising
E N R O L L M E N T
N o t a l w a y s a r e q u i r e m e n t
Most systems require qualified/certified
datasets on which to base their measures -
but some AI/learning systems obviate this
by gathering data over long periods
R a c i a l B I A S ?
NO - BUT a really tough problem
“The Chinese heavily criticised the Apple iPhone (2017) because
of its poor facial recognition of individual Oriental faces”
“We (all humanity) suffer this problem with appearance, speech,
language and conventions across almost all ethnic boundaries”
“No surprise then, our machines find it difficult too - but it
can be designed out and our machines can/do perform
better than we can”
“In some countries ‘bias’ has been designed
in, but in many others it is all about
designing it out”
H o w B a d C a n i t B E ?
A v o i c e c o n t r o l l e d e l e v a t o r i n S c o t l a n d !
e x t r e m e s
Re l i g i o n / B e l i e f s / C u s t o m s
Body scanning using THz tech is one possible
solution, but we sometimes have to accept an
engineering defeat in the defence of decency/
privacy and resort to intervention by human
operators of the right gender
Hard to engineer THz scanning with
the subject on the move as high
energy is required to inspect over
relatively short distances
e x t r e m e s
M a n i n a B u r k h a - Re a l l y !
Is it a man or a woman? - Can we detect the
difference at a distance/in a crowd, and on
the move? Turns out be a challenge but not
impossible by people or by machine
e x t r e m e s
M a n i n a B u r k h a - Re a l l y !
Is it a man or a woman? - Can we detect the
difference at a distance/in a crowd, and on
the move? Turns out be a challenge but not
impossible by people or by machine
Body, head, hands, feet sizes plus an
inability of men to walk like a woman
are give aways along with a lack of
attention to the eyes!
Gait, size, shape and movement
analysis by machines gives a level of
auto-detection to be corroborated by
human skills followed by interception
e x t r e m e s
T h e m a g i c o f m a k e u p
Not easily recognisable as the same young
girl by us, but most of the cardinal points
are preserved and a recognition system
would win
e x t r e m e s
S a m e p e r s o n t ra n s f o r m e d
Not easily recognised as the same face: the
cardinal point are less distinct around the
eyes and mouth - facial lines fully
camouflaged
e x t r e m e s
S a m e p e r s o n t ra n s f o r m e d
Not instantly recognisable as the same face,
but most cardinal points remain distinct
but visible facial lines vary greatly
e x t r e m e s
G e n d e r b e n d e r s / i m p e r s o n a t o r s
This is so variable with body and face
shape, dynamics, skin texture, voice and
mannerisms - we are generally able to
spot the anomalies and so are machines
e x t r e m e s
O n l y p a r t i a l p o i n t s v i s i b l e
Detail loss of any one parameter in a
set certainly degrades the accuracy of a
technique, but this can be offset by
concatenating more biometric methods
17 Ponts10 Ponts 17 Ponts
Eye Scanning may
still be possible
UNIQue MarkerS
R e t i n a l a n d / o r I r i s P a t t e r n
After 3 months from
birth the iris is ‘set for
life’ and the vascular
p a t t e r n s a r e a l s o
reliable pending any
trauma or damage
RetinalVeins
Iris Pattern
UNIQue MarkerS
R e t i n a l a n d / o r I r i s P a t t e r n
After 3 months from
birth the iris is ‘set for
life’ and the vascular
p a t t e r n s a r e a l s o
reliable pending any
trauma or damage
RetinalVeins
Iris Pattern
At a high price - Iris characterisation
can be far more accurate than a DNA
sample!
Under ideal lab conditions the error
probability for Iris Scanning is ~10-22
with DNA~10-16 but the cost is
generally prohibitive
UNIQue MarkerS
I R i l l u m i n a t i o n / s c a n n i n g
A vivid and very
clear Iris Pattern
UNIQIQ MarkerS
V a s c u l a r S y s t e m o f t h e e y e
Thought to be stable from birth to death
but can be distorted by illnesses such as
hypertension, diabetes and cataracts
Can be combined with
fingerprints and vein
structure
UNIQIQ Marker
H a n d s u r f a c e l i n e s / c r e a s e
UNIQIQ Marker
V a s c u l a r s y s t e m o f h a n d
Banks of IR LEDs illuminate the palm or
back of the hand - the absorbed/reflected
light reveals the detailed patterns
UNIQIQ Marker
F a c i a l l i n e s a n d c r e a s e s
High definition cameras from multiple
angles can give highly accurate results -
but they change with age, health and
make up!
UNIQIQ Marker
L i n e s a n d c r e a s e s o n l i p s
High definition cameras can
give highly accurate results -
but lips change with age,
health & make up!
u n i q u e r H y t h m
M o r s e C o d e t o P I N t o T y p i n g
WWII Skilled listeners could
recognise ‘the hand’ of specific
operators on both sides including
agents
u n i q u e r H y t h m
M o r s e C o d e t o P I N t o T y p i n g
Now applied to typing and TXT/
operating patterns of all kinds
u n i q u e r H y t h m
M o r s e C o d e t o P I N t o T y p i n g
Now applied to typing and TXT/
operating patterns of all kinds
u n i q u e r H y t h m
M o r s e C o d e t o P I N t o T y p i n g
In 2001 a simple PIN keying pattern
recognition system was developed for
HSBC to enhance the PIN and Chip
Even if a thief knows the PIN and observes the
user making an entry it turns out to be very
difficult to mimic with sufficient accuracy to
fool the system
Totally invisible to the user and widely used
along with other features that cannot be
seen or detected by a potential thief
Some countries no longer have
or use ATMs - and they are
being phased out in the UK
UNIQIQ Marker
D e n t a l p a t t e r n s + r e p a i r s
Highly accurate but
change with time,
ageing, erosion, dental
repairs and they are
hard to access !
Appear to be mainly
used for the ID of
dead bodies - and
forensic evidence in
c a s e s i n v o l v i n g
violence and bite
marks +++
S c a l i n g
H i g h l y n o n - l i n e a r
90 99 99.9 99.99 99.999
~10
>100
>1000
>10,000
>100,000
Accuracy %
Every % point in
accuracy is gained, at
an exponentially rising
price
Commercial
Cost/Price $
Accuracy - Arithmetic
Cost/Price - Exponential
S c a l i n g
H i g h l y n o n - l i n e a r
90 99 99.9 99.99 99.999
~10
>100
>1000
>10,000
>100,000
Notice that these are both log scales -
the graph is really of this general form
Accuracy %
Every % point in
accuracy is gained, at
an exponentially rising
price
Commercial
Cost/Price $
Accuracy - Arithmetic
Cost/Price - Exponential
Very hight accuracy at very high cost
is nearly always possible - BUT NO
single test will give us a very high
accuracy at a very low cost
O B L I G A S T I O N
W e h a v e t o f i n d a s o l u t i o n
“Whilst it is permissible for the mathematicians and physicist
et al to declare that there is no solution to a problem, we in
engineering, enjoy no such luxury”
M A X I M s
E n g i n e e r i n g
“In general you get ~80% of what you need for 20% of the cost/effort”
“The concatenation of the imperfect can approach perfection”
“Nothing more powerful than a GOOD approximation”
“Never underestimate the power of iteration”
“Perfection is the enemy of progress”
“Near enough can be good enough”
M A T C H I N G
H a n d / F a c e / E y e
A computer can compare prints by using key features
and measuring the geometry - patterns of distances
and angles then give unique digital codes
Electrical conductivity/capacity scanners tend to be
less accurate/flexible but at a very low price. The
fingerprint ridges contact the pad to provide a near
unique ‘picture’ of the contact area/span distances.
Technologies like this are similar to the screens of mobiles
and tablets + some laptops
Once we have captured the data, then the processing
and analysis costs virtually nothing. The complexity
and cost lies in the hardware of capture!
F a c i a l
T w i n s T e s t
A very low cost mobile phone integrated
solution using standard hardware (camera)
plus an app for face and then face and eye
F a c i a l
T w i n s T e s t
A very low cost mobile phone integrated
solution using standard hardware (camera)
plus an app for face and then face and eye
Key lesson from this demo - if you
have a low cost solution that works
then you need at least a second or
third to be sure!
The most obvious third element that
could be introduced would be a
fingerprint followed by a voice print
Error probability ~
10-2 x 10-2 x 10-2 x 10-2
10-4 x 10-6 x 10-8
G a i t R e c o g n i t i o n
R e a l T i m e a n a l y s i s i n m o t i o n
G a i t A n a ly s i s
A n a l y s i s o f l e g f o r c e s
C a m p u s V i s i t o r
R e a l - t i m e c a m p u s a n a l y s i s
G a i t A n a ly s i s
H o r s e a n a l y s i s / d e m o
P r o d u c t s
S i m p l e t o C o m p l e x
Single fingerprint readers require >500 dpi
- often realised on a single CMOS chip that
also includes processing and memory
F r o m $ 2 T o $ 2 k
T o u c h S c r e e n C u s t o m S e n s o r
E r r o r < 5 % E r r o r < 1 0 - 6 %
8 x F i n g e r s
2 x T h u m b s
B o t h P a l m s
1 x F i n g e r
1 x F i n g e r
E V O L U T I O N
L o w c o s t c o n c a t e n a t i o n
Low Medium High
Password Fingerprint 3D + IR Face
DNA3D FaceIR Face2D Face
Finger + Palm
Finger + Palm
3D + IR Face
E V O L U T I O N
L o w c o s t c o n c a t e n a t i o n
Low Medium High
Password Fingerprint 3D + IR Face
DNA3D FaceIR Face2D Face
Finger + Palm
Finger + Palm
3D + IR FaceCumulative
Cost Linear
Geometric
Security
Exponential
Cost
Security
Concatenation
Degree
Cost Analysis
N o t r e a l l y f e a s i b l e
Performance/$ is improving exponentially
with costs spanning $1 - $3k for mobile,
laptop and custom units
2 June 2020
z
The wide range of factors, modes, models, and tech renders a simple cost comparison impossible/worthless
D o m i n at i o n
F U T U R E
S c a n d i n a v i a N o w
F U T U R E
S c a n d i n a v i a N o w
F u t u r e
G e n e r a l O v e r v i e w
Tending to InvisibleHighly Visible
Biometrics/CyberSec becomes
f u l l y i n t e g r a t e d i n t o a l l
systems to be unseen by users
Chip Implants
T h a n k Y o u
“There is always a threat”
www.petercochrane.com

Mais conteúdo relacionado

Mais procurados

CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamUniversity of Hertfordshire
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & ResilienceUniversity of Hertfordshire
 
The future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingThe future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingUniversity of Hertfordshire
 
Working With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaWorking With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaIDS
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitAmazon Web Services
 
IoT_CONASTA64
IoT_CONASTA64IoT_CONASTA64
IoT_CONASTA64garybau
 

Mais procurados (20)

Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
 
Surveillance society
Surveillance societySurveillance society
Surveillance society
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Cyber Security - Becoming Evil
Cyber Security - Becoming EvilCyber Security - Becoming Evil
Cyber Security - Becoming Evil
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
The Automation of Everything
The Automation of EverythingThe Automation of Everything
The Automation of Everything
 
IT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger PictureIT and Systems Security - The Bigger Picture
IT and Systems Security - The Bigger Picture
 
Why Robots, AI, AL and Quantum Computing
Why Robots, AI, AL and Quantum ComputingWhy Robots, AI, AL and Quantum Computing
Why Robots, AI, AL and Quantum Computing
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 
The future of education: Solving Problems by Thinking
The future of education: Solving Problems by ThinkingThe future of education: Solving Problems by Thinking
The future of education: Solving Problems by Thinking
 
Demystifying Information Theory
Demystifying Information TheoryDemystifying Information Theory
Demystifying Information Theory
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Working With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaWorking With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In Ghana
 
AI The Call Center Nemesis?
AI The Call Center Nemesis?AI The Call Center Nemesis?
AI The Call Center Nemesis?
 
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS SummitCanary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
Canary Deployments on Amazon EKS with Istio - SRV305 - Chicago AWS Summit
 
IoT_CONASTA64
IoT_CONASTA64IoT_CONASTA64
IoT_CONASTA64
 

Semelhante a Biometrics of ID and Security

Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?Julie Tsai
 
Racial Profiling Essays. Racial Profiling in Law Enforcement Free Essay Samp...
Racial Profiling Essays.  Racial Profiling in Law Enforcement Free Essay Samp...Racial Profiling Essays.  Racial Profiling in Law Enforcement Free Essay Samp...
Racial Profiling Essays. Racial Profiling in Law Enforcement Free Essay Samp...Wendy Fricke
 
Gender free tech momentum to mitigate biases in ai
Gender free tech   momentum to mitigate biases in aiGender free tech   momentum to mitigate biases in ai
Gender free tech momentum to mitigate biases in aiMarion Mulder
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013Mathmodels Net
 
Understanding Sustainable Development: Intergenerational Justice
Understanding Sustainable Development: Intergenerational JusticeUnderstanding Sustainable Development: Intergenerational Justice
Understanding Sustainable Development: Intergenerational JusticePreeti Sikder
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourKroese brands & behaviour
 
Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Melissa Falconett
 

Semelhante a Biometrics of ID and Security (20)

Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Diy (Health) Care
Diy (Health) CareDiy (Health) Care
Diy (Health) Care
 
Digital Destinies
Digital DestiniesDigital Destinies
Digital Destinies
 
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
 
Patient Heal Thyself
Patient Heal ThyselfPatient Heal Thyself
Patient Heal Thyself
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
Small data big impact
Small data big impactSmall data big impact
Small data big impact
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Racial Profiling Essays. Racial Profiling in Law Enforcement Free Essay Samp...
Racial Profiling Essays.  Racial Profiling in Law Enforcement Free Essay Samp...Racial Profiling Essays.  Racial Profiling in Law Enforcement Free Essay Samp...
Racial Profiling Essays. Racial Profiling in Law Enforcement Free Essay Samp...
 
Connect, communicate, collaborate
Connect, communicate, collaborateConnect, communicate, collaborate
Connect, communicate, collaborate
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
 
Back FOR the Future
Back FOR the FutureBack FOR the Future
Back FOR the Future
 
Gender free tech momentum to mitigate biases in ai
Gender free tech   momentum to mitigate biases in aiGender free tech   momentum to mitigate biases in ai
Gender free tech momentum to mitigate biases in ai
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013
 
Understanding Sustainable Development: Intergenerational Justice
Understanding Sustainable Development: Intergenerational JusticeUnderstanding Sustainable Development: Intergenerational Justice
Understanding Sustainable Development: Intergenerational Justice
 
As revision 2012
As revision 2012As revision 2012
As revision 2012
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviour
 
Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.Final Destination: Creating a better afterlife for our digital treasures.
Final Destination: Creating a better afterlife for our digital treasures.
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 

Mais de University of Hertfordshire (11)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Industry 4.0 and Sustainability
Industry 4.0 and SustainabilityIndustry 4.0 and Sustainability
Industry 4.0 and Sustainability
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Biometrics of ID and Security

  • 1. BIOMETRICS OF ID & Security Prof Peter Cochrane OBE w w w. p e t e r c o c h r a n e . c o m
  • 2. “ B i o m e t r i c s a re h u m a n p h y s i c a l , physiological or behavioural characteristics that can be used to digitally identify a person or engineer security in the granting of access to systems, devices or data” D e f i n i t i o n C o n c i s e & S u f f i c i e n t
  • 3. Identification: "Who are you?” Authentication: “Are you really who you say you are?” Behaviours: “Are you behaving/functioning normally?” p u r p o s e T h e s e c u r i t y n e e d
  • 4. M i g r a t i o n F a r m o r e n a t u r a l m o d e s Name Address Age Passport Licences Visas DoBPostCode UserName Password PIN Dongle Phone M obile Account TwoFactor Mothers Name Favourite Colour M a n M a d e U n n a t u r a l C h a l l e n g i n g I n c o n v e n i e n t P e o p l e S e r v i n g T h e Te c h n o l o g y Hand/s Finger/s Face Voice Eye/s Ear/s Lips Teeth Hue Movement Gaite Behaviours Habbits Style Te c h S e r v i n g T h e P e o p l e N a t u r e N a t u r a l E a s y 2 u s e C o n v e n i e n t Typing Writing Keying
  • 5. M o d e r n H i s t o r y Stretches back to Pre-Babylonia/Pre-China
  • 6. M o d e r n H i s t o r y Stretches back to Pre-Babylonia/Pre-China
  • 7. S P E C T R U M T e c h n o l o g y / T e c h n i q u e Cost Complexity Accuracy Security Strength Popularity Deployments Ease of Use Utility Biometric Behavioural Walking Talking Moving Typing Writing Touch Stroke The primary characteristics, parameters & degrees of freedom at our disposal… there are more but far less convenient!
  • 8. T A R G E T S S t r e n g t h e n o r O b v i a t e We are all in Password/PIN overload and a new/better/more natural solution is long overdue and biometrics fits the bill along with chip implants
  • 9. G o v e r n m e n t C r i m i n a l R e c o r d s M e d i c a l S e r v i c e B o r d e r C o n t r o l W o r k P e r m i t s O f f i c i a l I D P a s s p o r t s R e g i s t e r s I D C a r d s L i c e n c e s C e n s u s V o t i n g V i s a s + + + A p p l i c a t i o n S p a c e I D , S e c u r i t y , V a l i d a t i o n , C o n v e n i e n c e , S u r e t y A c c e s s F i l e S a f e B a n k R o o m H o m e O f f i c e D e v i c e V e h i c l e C a m p u s M a c h i n e A c c o u n t B u i l d i n g + + + G e n e r a l E n t e r t a i n m e n t C e r t i f i c a t i o n T r a n s a c t i o n s E m p l o y m e n t P u r c h a s e s E d u c a t i o n S e r v i c e s S e c u r i t y H e a l t h T r a v e l W o r k P l a y + + +
  • 10. A d va n ta g e s I n r e l a t i v e c o n t e x t Security: Unique ID - extremely difficult to forge/cheat/replicate Accuracy: Exceeds our ability to recognise another human Accountability: Certifying every transaction and interaction Integration: Easy to engineer into existing operational systems Spectrum: Universally applicable - buying a coffee to site access Cost: Very cheap compared to the risks across the attack spectrum Ceiling: In the limit accuracy by concatenation exceeds that of DNA
  • 11. Recognition Field I n t e c h a v a i l a b i l i t y c o n t e x t Signature Finger Voice Hand Face DNA Dress Typing Talking Writing TXTing Walking Typing Talking TXTing Writing Walking PIN Entry PRINTS STYLE RYTHM PROFILE DYNAMICS Face Body Colour Weight Thermal Electronic Gaze Speech Movement Idiosyncrasies
  • 12. “All lifeforms are constructs of the same ‘star-dust’ and share the same base genes traceable for eons through evolutionary chains to the primeval sludge that catalysed life in the beginning” VA R I A N C E S Across a vast spectrum “All of humanity comes from the same fundamental seed, and we share a common specification, but individually we are all so very different and have been so for all time” “Despite the many deltas; human-kind are very much a single species with same hopes and worries” “No two men, and no two women are identical/the same within an ethnic group, and crossing the boundaries or ethnicity sees those differences amplified”
  • 13. C o n f o r m i n g B y d e f i n i t i o n w e d o n o t “Dimensioning humans against a notional artistic perfection of beauty defined by simple geometric measures sees none of us complying - and the deviation from such an ideal template defines us, makes us interesting, and makes us recognisable and identifiable”
  • 14. C o n f o r m i n g B y d e f i n i t i o n w e d o n o t “This applies to every physical and metaphysical aspect of human form, function, and existence to provide an infinity of variances against which we can be measured for identification, authentication and aberrations in activity”
  • 15. V A R I A N C E S Example o f j ust one p arameter Age Years Bone Density We have to take great care when considering aspects of this kind & m u s t n o t o v e r l o o k c a u s a l i t y : h i s t o r y , genealogy, climate, diet, prosperity, societal aspects and conventions
  • 16. It is worth recalling the history and the many failed attempts to establish the validity of physiognomies that date back to Ancient Greece - We should ‘never judge a book by its cover’ V A R I A N C E S Example of t he sp ectrum
  • 17. Example: Camera height & angle, head size & facial features, tonal scales, mass distribution et a It is worth recalling the history and the many failed attempts to establish the validity of physiognomies that date back to Ancient Greece - We should ‘never judge a book by its cover’ V A R I A N C E S Example of t he sp ectrum
  • 18. VA R I A N C E S T h e l a n g u a g e s p e c t r u m ~6500 spoken languages >65,000 dialects >650,000 regional accents >?? non-native speaking accents >?? tonal scales >?? colloquialisms, uphermisms, slang+ The Phrase Repeated in 15 Languages: “I want to eat a pancake but I’m too lazy to make it”! Engineering a single engine to translate this is a major challenge, but recognising and/or identifying the speaker is far easier! S p o k e n D e m o n s t r a t i o n
  • 19. S E G U A E T h e p o we r o f D e l t a s Mono-cultures in all lifeforms and systems created (in isolation) so far including biological and human societies are extremely efficient, brittle, ultimately self damaging, unsustainable, and always short lived
  • 20. S E G U A E T h e p o we r o f D e l t a s Mono-cultures in all lifeforms and systems created (in isolation) so far including biological and human societies are extremely efficient, brittle, ultimately self damaging, unsustainable, and always short lived “The diversity of people, teams, organisations, countries, civilisations and their willingness to embrace differences, to adapt, adopt, innovate and change is what makes them powerful and functionally effective. AND this is also true of biology and organisms in general as well as our man-made networks and systems” For our purposes the variety of Deltas that our species exhibits is an overt blessing available to be exploited
  • 21. Human Macro ou Dimensioning Human Macro Physical Sizes, Skin Tones, Asymmetries, Blemishes, Hair Colour, Stance, Thermal Profile + Dynamics This data is generally disguised, distorted, and/or lost under clothing, be further degraded by the dynamics of movement
  • 22. GOING FOR THE ( I N ? ) V I S I B L E The normally hidden detail can be accessed using full or partial body scanners to a greater or lesser degree It is expensive in time and $$ to access the hidden, but we can ride the EM Spectrum for more or less depth of detail Mainly a safety and security over modesty game that is very hard to defeat, but not entirely fool proof! With an abundance of derivable metrics it is only in the extreme that we have to venture into the obscure and unseen
  • 23. This data is ge distorted, lost degraded by movement Detailed characterisation of facial and other body components into a field of data points Human Micro Dimensioning/Characterising
  • 24. This data is ge distorted, lost degraded by movement Detailed characterisation of facial and other body components into a field of data points At a fundamental level we have an n-D pattern matching problem of reasonably slow stochastic variables Human Micro Dimensioning/Characterising
  • 25. E N R O L L M E N T N o t a l w a y s a r e q u i r e m e n t Most systems require qualified/certified datasets on which to base their measures - but some AI/learning systems obviate this by gathering data over long periods
  • 26.
  • 27. R a c i a l B I A S ? NO - BUT a really tough problem “The Chinese heavily criticised the Apple iPhone (2017) because of its poor facial recognition of individual Oriental faces” “We (all humanity) suffer this problem with appearance, speech, language and conventions across almost all ethnic boundaries” “No surprise then, our machines find it difficult too - but it can be designed out and our machines can/do perform better than we can” “In some countries ‘bias’ has been designed in, but in many others it is all about designing it out”
  • 28. H o w B a d C a n i t B E ? A v o i c e c o n t r o l l e d e l e v a t o r i n S c o t l a n d !
  • 29. e x t r e m e s Re l i g i o n / B e l i e f s / C u s t o m s Body scanning using THz tech is one possible solution, but we sometimes have to accept an engineering defeat in the defence of decency/ privacy and resort to intervention by human operators of the right gender Hard to engineer THz scanning with the subject on the move as high energy is required to inspect over relatively short distances
  • 30. e x t r e m e s M a n i n a B u r k h a - Re a l l y ! Is it a man or a woman? - Can we detect the difference at a distance/in a crowd, and on the move? Turns out be a challenge but not impossible by people or by machine
  • 31. e x t r e m e s M a n i n a B u r k h a - Re a l l y ! Is it a man or a woman? - Can we detect the difference at a distance/in a crowd, and on the move? Turns out be a challenge but not impossible by people or by machine Body, head, hands, feet sizes plus an inability of men to walk like a woman are give aways along with a lack of attention to the eyes! Gait, size, shape and movement analysis by machines gives a level of auto-detection to be corroborated by human skills followed by interception
  • 32. e x t r e m e s T h e m a g i c o f m a k e u p Not easily recognisable as the same young girl by us, but most of the cardinal points are preserved and a recognition system would win
  • 33. e x t r e m e s S a m e p e r s o n t ra n s f o r m e d Not easily recognised as the same face: the cardinal point are less distinct around the eyes and mouth - facial lines fully camouflaged
  • 34. e x t r e m e s S a m e p e r s o n t ra n s f o r m e d Not instantly recognisable as the same face, but most cardinal points remain distinct but visible facial lines vary greatly
  • 35. e x t r e m e s G e n d e r b e n d e r s / i m p e r s o n a t o r s This is so variable with body and face shape, dynamics, skin texture, voice and mannerisms - we are generally able to spot the anomalies and so are machines
  • 36. e x t r e m e s O n l y p a r t i a l p o i n t s v i s i b l e Detail loss of any one parameter in a set certainly degrades the accuracy of a technique, but this can be offset by concatenating more biometric methods 17 Ponts10 Ponts 17 Ponts Eye Scanning may still be possible
  • 37. UNIQue MarkerS R e t i n a l a n d / o r I r i s P a t t e r n After 3 months from birth the iris is ‘set for life’ and the vascular p a t t e r n s a r e a l s o reliable pending any trauma or damage RetinalVeins Iris Pattern
  • 38. UNIQue MarkerS R e t i n a l a n d / o r I r i s P a t t e r n After 3 months from birth the iris is ‘set for life’ and the vascular p a t t e r n s a r e a l s o reliable pending any trauma or damage RetinalVeins Iris Pattern At a high price - Iris characterisation can be far more accurate than a DNA sample! Under ideal lab conditions the error probability for Iris Scanning is ~10-22 with DNA~10-16 but the cost is generally prohibitive
  • 39. UNIQue MarkerS I R i l l u m i n a t i o n / s c a n n i n g A vivid and very clear Iris Pattern
  • 40. UNIQIQ MarkerS V a s c u l a r S y s t e m o f t h e e y e Thought to be stable from birth to death but can be distorted by illnesses such as hypertension, diabetes and cataracts
  • 41. Can be combined with fingerprints and vein structure UNIQIQ Marker H a n d s u r f a c e l i n e s / c r e a s e
  • 42. UNIQIQ Marker V a s c u l a r s y s t e m o f h a n d Banks of IR LEDs illuminate the palm or back of the hand - the absorbed/reflected light reveals the detailed patterns
  • 43. UNIQIQ Marker F a c i a l l i n e s a n d c r e a s e s High definition cameras from multiple angles can give highly accurate results - but they change with age, health and make up!
  • 44. UNIQIQ Marker L i n e s a n d c r e a s e s o n l i p s High definition cameras can give highly accurate results - but lips change with age, health & make up!
  • 45. u n i q u e r H y t h m M o r s e C o d e t o P I N t o T y p i n g WWII Skilled listeners could recognise ‘the hand’ of specific operators on both sides including agents
  • 46. u n i q u e r H y t h m M o r s e C o d e t o P I N t o T y p i n g Now applied to typing and TXT/ operating patterns of all kinds
  • 47. u n i q u e r H y t h m M o r s e C o d e t o P I N t o T y p i n g Now applied to typing and TXT/ operating patterns of all kinds
  • 48. u n i q u e r H y t h m M o r s e C o d e t o P I N t o T y p i n g In 2001 a simple PIN keying pattern recognition system was developed for HSBC to enhance the PIN and Chip Even if a thief knows the PIN and observes the user making an entry it turns out to be very difficult to mimic with sufficient accuracy to fool the system Totally invisible to the user and widely used along with other features that cannot be seen or detected by a potential thief Some countries no longer have or use ATMs - and they are being phased out in the UK
  • 49. UNIQIQ Marker D e n t a l p a t t e r n s + r e p a i r s Highly accurate but change with time, ageing, erosion, dental repairs and they are hard to access ! Appear to be mainly used for the ID of dead bodies - and forensic evidence in c a s e s i n v o l v i n g violence and bite marks +++
  • 50. S c a l i n g H i g h l y n o n - l i n e a r 90 99 99.9 99.99 99.999 ~10 >100 >1000 >10,000 >100,000 Accuracy % Every % point in accuracy is gained, at an exponentially rising price Commercial Cost/Price $ Accuracy - Arithmetic Cost/Price - Exponential
  • 51. S c a l i n g H i g h l y n o n - l i n e a r 90 99 99.9 99.99 99.999 ~10 >100 >1000 >10,000 >100,000 Notice that these are both log scales - the graph is really of this general form Accuracy % Every % point in accuracy is gained, at an exponentially rising price Commercial Cost/Price $ Accuracy - Arithmetic Cost/Price - Exponential Very hight accuracy at very high cost is nearly always possible - BUT NO single test will give us a very high accuracy at a very low cost
  • 52. O B L I G A S T I O N W e h a v e t o f i n d a s o l u t i o n “Whilst it is permissible for the mathematicians and physicist et al to declare that there is no solution to a problem, we in engineering, enjoy no such luxury”
  • 53. M A X I M s E n g i n e e r i n g “In general you get ~80% of what you need for 20% of the cost/effort” “The concatenation of the imperfect can approach perfection” “Nothing more powerful than a GOOD approximation” “Never underestimate the power of iteration” “Perfection is the enemy of progress” “Near enough can be good enough”
  • 54. M A T C H I N G H a n d / F a c e / E y e A computer can compare prints by using key features and measuring the geometry - patterns of distances and angles then give unique digital codes Electrical conductivity/capacity scanners tend to be less accurate/flexible but at a very low price. The fingerprint ridges contact the pad to provide a near unique ‘picture’ of the contact area/span distances. Technologies like this are similar to the screens of mobiles and tablets + some laptops Once we have captured the data, then the processing and analysis costs virtually nothing. The complexity and cost lies in the hardware of capture!
  • 55. F a c i a l T w i n s T e s t A very low cost mobile phone integrated solution using standard hardware (camera) plus an app for face and then face and eye
  • 56. F a c i a l T w i n s T e s t A very low cost mobile phone integrated solution using standard hardware (camera) plus an app for face and then face and eye Key lesson from this demo - if you have a low cost solution that works then you need at least a second or third to be sure! The most obvious third element that could be introduced would be a fingerprint followed by a voice print Error probability ~ 10-2 x 10-2 x 10-2 x 10-2 10-4 x 10-6 x 10-8
  • 57. G a i t R e c o g n i t i o n R e a l T i m e a n a l y s i s i n m o t i o n
  • 58. G a i t A n a ly s i s A n a l y s i s o f l e g f o r c e s
  • 59. C a m p u s V i s i t o r R e a l - t i m e c a m p u s a n a l y s i s
  • 60. G a i t A n a ly s i s H o r s e a n a l y s i s / d e m o
  • 61. P r o d u c t s S i m p l e t o C o m p l e x Single fingerprint readers require >500 dpi - often realised on a single CMOS chip that also includes processing and memory F r o m $ 2 T o $ 2 k T o u c h S c r e e n C u s t o m S e n s o r E r r o r < 5 % E r r o r < 1 0 - 6 % 8 x F i n g e r s 2 x T h u m b s B o t h P a l m s 1 x F i n g e r 1 x F i n g e r
  • 62. E V O L U T I O N L o w c o s t c o n c a t e n a t i o n Low Medium High Password Fingerprint 3D + IR Face DNA3D FaceIR Face2D Face Finger + Palm Finger + Palm 3D + IR Face
  • 63. E V O L U T I O N L o w c o s t c o n c a t e n a t i o n Low Medium High Password Fingerprint 3D + IR Face DNA3D FaceIR Face2D Face Finger + Palm Finger + Palm 3D + IR FaceCumulative Cost Linear Geometric Security Exponential Cost Security Concatenation Degree
  • 64. Cost Analysis N o t r e a l l y f e a s i b l e Performance/$ is improving exponentially with costs spanning $1 - $3k for mobile, laptop and custom units 2 June 2020 z The wide range of factors, modes, models, and tech renders a simple cost comparison impossible/worthless
  • 65. D o m i n at i o n
  • 66. F U T U R E S c a n d i n a v i a N o w
  • 67. F U T U R E S c a n d i n a v i a N o w
  • 68. F u t u r e G e n e r a l O v e r v i e w Tending to InvisibleHighly Visible Biometrics/CyberSec becomes f u l l y i n t e g r a t e d i n t o a l l systems to be unseen by users Chip Implants
  • 69. T h a n k Y o u “There is always a threat” www.petercochrane.com