SlideShare a Scribd company logo
1 of 40
TYPES OF
BIOMETRICS
(Based on Chapter 3&4)
Amin Pathan
M.Tech CSE, BE - IT
Block Diagram of Biometric
In GeneralIn General
• Physiological
• Behavioral
Examples: face, fingerprint, hand geometry
and iris recognition
Examples: signature and voice
Biometrics can be sorted into two classes:
Biometric IdentifiersBiometric Identifiers
Common:
Fingerprint Recognition
Face Recognition
Speaker Recognition
Iris Recognition
Hand Geometry
Signature verification
Others:
DNA
Retina recognition
Thermograms
Gait
Keystroke
Ear recognition
Skin reflection
Lip motion
Body odor
Some More* …Some More* …
Vein Pattern
Sweat Pores
Fingernail Bed
Hand Grip
Brain Wave Pattern
Footprint and Foot Dynamics
*See details in Chapter 7 Esoteric Biometrics of Biometrics by John D.
Woodward, Nicholas M. Orlans, Peter T. Higgins, New York : McGraw-
Hill/Osborne, c2003
1. Fingerprint Recognition
• An extremely useful biometrics
technology since fingerprints have long
been recognized as a primary and
accurate identification method.
• “Livescan” fingerprint
scanners
 Optical methods
(FTIR)
 CMOS capacitance
 Thermal sensing
 Ultrasound sensing
Acquisition DevicesAcquisition Devices
 Ink & paper – the oldest way
 Ink-less Methods - sense the
ridges on a finger
ApplicationsApplications
Identification, or 1-to-Many:
identifies a person from the entire
enrolled population.
Authentication, or 1-to-1: matches a
person's claimed identity to his/her
biometric and one or more other security
technologies (password, PIN, Token).
(See http://www.biometrics.dod.mil/bio101/index.aspx )
MinutiaeMinutiae
 Uses the ridge endings and bifurcation's on a
persons finger to plot points known as Minutiae
 The number and locations of the minutiae vary
from finger to finger in any particular person, and
from person to person for any particular finger
MinutiaeFinger Image +
Minutiae
Finger Image
Fingerprint scanning (Minutiae based
Matching ApproachesMatching Approaches
• Image techniques
Use both optical and numerical image correlation
techniques
Two basic classes of matching techniques:
Combining the above two techniques:
• Hybrid techniques (with improved accuracy)
• Feature
techniquesExtracts features and develop representations
from these features
2. Face Recognition
• Uses an image or series of images either
from a camera or photograph to recognize a
person.
• Principle: analysis of the unique shape,
pattern and positioning of facial features.
FeaturesFeatures
• Passive biometrics and does not require
a persons cooperation
• Highly complex technology and largely
software based.
• Primary advantage is that the biometric
system is able to operate “hands-free”
and a user’s identity is confirmed by
simply staring at the screen.
DetailsDetails
• Source of data: Single image, video
sequence, 3D image and Near Infrared
• Models: weak models of the human
face that model face shape in terms of
facial texture
 Face appearance
Examples: eigenfaces
 Face geometry
Examples: feature-based
method
ExamplesExamples
MIT Media LaboratoryVision and Modeling Group
Face Recognition Demo
3. Voice Recognition
• Voice recognition is not the same as speech
recognition, it is speaker recognition
• Considered both physiological and behavioral
• Popular and low-cost, but less accurate and
sometimes lengthy enrollment
Application categoriesApplication categories
• Fixed text
• Text dependent
• Text independent
• Conversational
FeaturesFeatures
• Advantage
 Acoustic features : 1. Misspoken or misread phrases; 2. The
human voice's tremendous variability, due to colds, aging, and
simple tiredness
 Can be captured surreptitiously by a third party and replayed
 Less requirements for users, such that they do not have to go
through a separate process for verification
 Very little hardware is required, and ideally suited to telephone-
based system for a remote identification
 Zero client-side cost, no special reader needs to be installed
• Disadvantage
4. Iris recognition
• Analysis of the iris of the eye, which is the colored ring
of tissue that surrounds the pupil of the eye.
• Based on visible features, i.e. rings, furrows, freckles
and the corona. Features and their location are used to
form the Iriscodes, which is the digital template.
• Widely regarded as the most safe, accurate biometrics
technology and capable of performing 1-to-many
matches at extraordinarily high speeds, without
sacrificing accuracy.
Example Iris ImagesExample Iris Images
ApplicationsApplications
• Iris recognition is a highly
mature technology with a
proven track record in a
number of application
areas.
• Used very effectively all
over the world. Heathrow Airport (London) - Iris
5. Hand geometry
•
• Hand geometry systems are commonly
available in two main forms. Full hand
geometry systems take an image of the entire
hand for comparison while Two Finger
readers only image two fingers of the hand.
• Hand recognition technology is currently one
of the most deployed biometrics disciplines
world wide
How does it workHow does it work
• A camera capture an image of the hand, with the help
of a mirror to get also the edge. The silhouette of the
hand is extracted, and some geometrical characteristics
stored.
( See Jain et al. A Prototype Hand Geometry-based Verification System )
ApplicationsApplications
BenGurion Airport - Hand Geometry INSPASS - Hand Geometry
see
INS Passenger Accelerated Service S
6. Signature Verification
• Static/Off-line: the conventional way
• Dynamic/On-line: using electronically
instrumented device
 Principle: the movement of the pen during the signing
process rather than the static image of the signature.
 Many aspects of the signature in motion can be studied,
such as pen pressure, the sound the pen makes
ApplicationsApplications
Examples of Commercial products:
• Cyber-SIGN PenOp
•
CIC Communication Intelligence Corp.
"The power to sign online"
For more technical information:
• IBM online signature verification
Biometrics in Early StagesBiometrics in Early Stages
DNA Retina
recognition
Thermograms
Gait Keystroke Ear recognition
Skin reflection Lip motion Body odor
I. DNA
• DNA has been called the “ultimate identifier”
• Identify information from every cell in the body in
a digital form
• Not yet fully automated, not fast and expensive
• Theoretical limitation: Identical twins have the
same DNA
• Privacy issue – DNA contains information about
race, paternity, and medical conditions for certain
disease
Comparison ChartComparison Chart
DNA Conventional Biometrics
Requires an actual
physical sample
Uses an impression, image, or
recording
Not done in real-time; not
all stages of comparison
are automated
Done in real-time; “lights-out”
automated process
Does a comparison of
actual samples
Uses templates or feature extraction
II. Retina recognition
• The pattern of blood vessels that emanate
from the optic nerve and disperse
throughout the retina depends on
individuals and never changes.
• No two retinas are the same, even in
identical twins.
• Commercial products: Retinal Technologies
III. Thermograms
• Thermograms requires an infrared camera to
detect the heat patterns of parts of the body that
are unique to every human being (such as the face)
• Normally expensive because of the sensors
• Useful paper: Illumination Invariant Face
Recognition Using Thermal Infrared Imagery
(Solikinski & als)
IV. Gait
• The final objective: to recognize
persons using standard cameras
in any conditions.
• Gait recognition is particularly
studied as it may enable
identification at distance.
Examples for measurements
(from Georgia Institute of
Technology)
V. Keystroke
• 100% software-based, requiring
no sensor more sophisticated
than a home computer
• Example
• The rhythms with which one types at a keyboard are
sufficiently distinctive to form the basis of the biometric
technology known as keystroke dynamics
VI. Ear recognition
• Ear geometry recognition uses the shape of
the ear to perform identification
• Suggestions have been made that the
shapes and characteristics of the human ear
are widely different
• An infrared image can be used to eliminate
hair
• Might be recognized at a distance
ExampleExample
VII. Skin reflection
• Lumidigm Inc. has established that the
absorption spectrum of the skin depends on
the individuals.
• In a range of wavelengths over 6mm patch,
several LEDs send light into the skin, and
photodiodes read the scattered light, which is
analyzed to perform the authentication.
VIII. Lip motion
• Compares the characteristic lip motions of
people while they speak.
• Helps identification associated with speaker
recognition.
• Different imaging conditions: Infrared (high
security & cost) and Near Infrared (cheap,
normally used for active sensing)
IX. Body odor
• It’s absolutely clear that people with differing
immunity genes produce different body odors
• Electronic/artificial noses: developed as a
system for the automated detection and
classification of odors, vapors, gases.
Prometheus (Alpha
Mos) ,
an example of electronic
nose
Schematic Diagram of Artificial nose
•Artificial noses are not
yet sophisticated
enough to do all the job
The FutureThe Future
“Your body as password” ?
 Technical issues
 legal and privacy issues
Challenges:
Are biometric technologies ready for
what is being expected of them?
ThankThank
you.you.
Any Question?

More Related Content

What's hot

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
Anit Thapaliya
 

What's hot (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 

Similar to Biometric by amin

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Similar to Biometric by amin (20)

Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 

More from aminpathan11 (15)

E wallet by amin
E wallet by aminE wallet by amin
E wallet by amin
 
4 g technology by amin
4 g technology by amin4 g technology by amin
4 g technology by amin
 
Cloud computing by amin
Cloud computing by aminCloud computing by amin
Cloud computing by amin
 
Hololens
HololensHololens
Hololens
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
Tracing an email by Amin Pathan
Tracing an email by Amin PathanTracing an email by Amin Pathan
Tracing an email by Amin Pathan
 
Human resource management by Amin
Human resource management by AminHuman resource management by Amin
Human resource management by Amin
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
VPN by Amin Pathan
VPN by Amin PathanVPN by Amin Pathan
VPN by Amin Pathan
 
ISDN
ISDNISDN
ISDN
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
PSTN
PSTNPSTN
PSTN
 
Management
ManagementManagement
Management
 
Forms of ownerships in Management
Forms of ownerships in ManagementForms of ownerships in Management
Forms of ownerships in Management
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Biometric by amin

  • 1. TYPES OF BIOMETRICS (Based on Chapter 3&4) Amin Pathan M.Tech CSE, BE - IT
  • 2. Block Diagram of Biometric
  • 3. In GeneralIn General • Physiological • Behavioral Examples: face, fingerprint, hand geometry and iris recognition Examples: signature and voice Biometrics can be sorted into two classes:
  • 4. Biometric IdentifiersBiometric Identifiers Common: Fingerprint Recognition Face Recognition Speaker Recognition Iris Recognition Hand Geometry Signature verification Others: DNA Retina recognition Thermograms Gait Keystroke Ear recognition Skin reflection Lip motion Body odor
  • 5. Some More* …Some More* … Vein Pattern Sweat Pores Fingernail Bed Hand Grip Brain Wave Pattern Footprint and Foot Dynamics *See details in Chapter 7 Esoteric Biometrics of Biometrics by John D. Woodward, Nicholas M. Orlans, Peter T. Higgins, New York : McGraw- Hill/Osborne, c2003
  • 6. 1. Fingerprint Recognition • An extremely useful biometrics technology since fingerprints have long been recognized as a primary and accurate identification method.
  • 7. • “Livescan” fingerprint scanners  Optical methods (FTIR)  CMOS capacitance  Thermal sensing  Ultrasound sensing Acquisition DevicesAcquisition Devices  Ink & paper – the oldest way  Ink-less Methods - sense the ridges on a finger
  • 8. ApplicationsApplications Identification, or 1-to-Many: identifies a person from the entire enrolled population. Authentication, or 1-to-1: matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token). (See http://www.biometrics.dod.mil/bio101/index.aspx )
  • 9. MinutiaeMinutiae  Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae  The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger MinutiaeFinger Image + Minutiae Finger Image
  • 11. Matching ApproachesMatching Approaches • Image techniques Use both optical and numerical image correlation techniques Two basic classes of matching techniques: Combining the above two techniques: • Hybrid techniques (with improved accuracy) • Feature techniquesExtracts features and develop representations from these features
  • 12. 2. Face Recognition • Uses an image or series of images either from a camera or photograph to recognize a person. • Principle: analysis of the unique shape, pattern and positioning of facial features.
  • 13. FeaturesFeatures • Passive biometrics and does not require a persons cooperation • Highly complex technology and largely software based. • Primary advantage is that the biometric system is able to operate “hands-free” and a user’s identity is confirmed by simply staring at the screen.
  • 14. DetailsDetails • Source of data: Single image, video sequence, 3D image and Near Infrared • Models: weak models of the human face that model face shape in terms of facial texture  Face appearance Examples: eigenfaces  Face geometry Examples: feature-based method
  • 15. ExamplesExamples MIT Media LaboratoryVision and Modeling Group Face Recognition Demo
  • 16. 3. Voice Recognition • Voice recognition is not the same as speech recognition, it is speaker recognition • Considered both physiological and behavioral • Popular and low-cost, but less accurate and sometimes lengthy enrollment
  • 17. Application categoriesApplication categories • Fixed text • Text dependent • Text independent • Conversational
  • 18. FeaturesFeatures • Advantage  Acoustic features : 1. Misspoken or misread phrases; 2. The human voice's tremendous variability, due to colds, aging, and simple tiredness  Can be captured surreptitiously by a third party and replayed  Less requirements for users, such that they do not have to go through a separate process for verification  Very little hardware is required, and ideally suited to telephone- based system for a remote identification  Zero client-side cost, no special reader needs to be installed • Disadvantage
  • 19. 4. Iris recognition • Analysis of the iris of the eye, which is the colored ring of tissue that surrounds the pupil of the eye. • Based on visible features, i.e. rings, furrows, freckles and the corona. Features and their location are used to form the Iriscodes, which is the digital template. • Widely regarded as the most safe, accurate biometrics technology and capable of performing 1-to-many matches at extraordinarily high speeds, without sacrificing accuracy.
  • 21. ApplicationsApplications • Iris recognition is a highly mature technology with a proven track record in a number of application areas. • Used very effectively all over the world. Heathrow Airport (London) - Iris
  • 22. 5. Hand geometry • • Hand geometry systems are commonly available in two main forms. Full hand geometry systems take an image of the entire hand for comparison while Two Finger readers only image two fingers of the hand. • Hand recognition technology is currently one of the most deployed biometrics disciplines world wide
  • 23. How does it workHow does it work • A camera capture an image of the hand, with the help of a mirror to get also the edge. The silhouette of the hand is extracted, and some geometrical characteristics stored. ( See Jain et al. A Prototype Hand Geometry-based Verification System )
  • 24. ApplicationsApplications BenGurion Airport - Hand Geometry INSPASS - Hand Geometry see INS Passenger Accelerated Service S
  • 25. 6. Signature Verification • Static/Off-line: the conventional way • Dynamic/On-line: using electronically instrumented device  Principle: the movement of the pen during the signing process rather than the static image of the signature.  Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes
  • 26. ApplicationsApplications Examples of Commercial products: • Cyber-SIGN PenOp • CIC Communication Intelligence Corp. "The power to sign online" For more technical information: • IBM online signature verification
  • 27. Biometrics in Early StagesBiometrics in Early Stages DNA Retina recognition Thermograms Gait Keystroke Ear recognition Skin reflection Lip motion Body odor
  • 28. I. DNA • DNA has been called the “ultimate identifier” • Identify information from every cell in the body in a digital form • Not yet fully automated, not fast and expensive • Theoretical limitation: Identical twins have the same DNA • Privacy issue – DNA contains information about race, paternity, and medical conditions for certain disease
  • 29. Comparison ChartComparison Chart DNA Conventional Biometrics Requires an actual physical sample Uses an impression, image, or recording Not done in real-time; not all stages of comparison are automated Done in real-time; “lights-out” automated process Does a comparison of actual samples Uses templates or feature extraction
  • 30. II. Retina recognition • The pattern of blood vessels that emanate from the optic nerve and disperse throughout the retina depends on individuals and never changes. • No two retinas are the same, even in identical twins. • Commercial products: Retinal Technologies
  • 31. III. Thermograms • Thermograms requires an infrared camera to detect the heat patterns of parts of the body that are unique to every human being (such as the face) • Normally expensive because of the sensors • Useful paper: Illumination Invariant Face Recognition Using Thermal Infrared Imagery (Solikinski & als)
  • 32. IV. Gait • The final objective: to recognize persons using standard cameras in any conditions. • Gait recognition is particularly studied as it may enable identification at distance. Examples for measurements (from Georgia Institute of Technology)
  • 33. V. Keystroke • 100% software-based, requiring no sensor more sophisticated than a home computer • Example • The rhythms with which one types at a keyboard are sufficiently distinctive to form the basis of the biometric technology known as keystroke dynamics
  • 34. VI. Ear recognition • Ear geometry recognition uses the shape of the ear to perform identification • Suggestions have been made that the shapes and characteristics of the human ear are widely different • An infrared image can be used to eliminate hair • Might be recognized at a distance
  • 36. VII. Skin reflection • Lumidigm Inc. has established that the absorption spectrum of the skin depends on the individuals. • In a range of wavelengths over 6mm patch, several LEDs send light into the skin, and photodiodes read the scattered light, which is analyzed to perform the authentication.
  • 37. VIII. Lip motion • Compares the characteristic lip motions of people while they speak. • Helps identification associated with speaker recognition. • Different imaging conditions: Infrared (high security & cost) and Near Infrared (cheap, normally used for active sensing)
  • 38. IX. Body odor • It’s absolutely clear that people with differing immunity genes produce different body odors • Electronic/artificial noses: developed as a system for the automated detection and classification of odors, vapors, gases. Prometheus (Alpha Mos) , an example of electronic nose Schematic Diagram of Artificial nose •Artificial noses are not yet sophisticated enough to do all the job
  • 39. The FutureThe Future “Your body as password” ?  Technical issues  legal and privacy issues Challenges: Are biometric technologies ready for what is being expected of them?