You are on page 1of 40

Biometrics

Biometrics can be sorted into two classes:


• Physiological
Examples: face, fingerprint, hand geometry
and iris recognition

• Behavioral
Examples: signature and voice

• Types are used for:


• identification
• verification
 Two types of biometrics
◦ physiological
◦ behavioral
 Types are used for:
◦ identification
◦ verification
Biometric Identifiers

Common: Others:
DNA
Fingerprint Recognition
Retina recognition
Face Recognition Gait
Speaker Recognition Keystroke
Iris Recognition Ear recognition
Skin reflection
Hand Geometry Lip motion
Signature verification Body odor
Data Types and Associated Biometric
Technologies
Comparison
Biometric Type Accuracy Ease of Use User Acceptance

Fingerprint High Medium Low

Hand Geometry Medium High Medium

Voice Medium High High

Retina High Low Low

Iris Medium Medium Medium

Signature Medium Medium High

Face Low High High


Biometric matching: process flow
• A user initially enrolls in biometric systems by providing biometric data,
which is converted into a template.
• Templates are stored in biometric systems for the purpose of subsequent
comparison.
• In order to be verified or identified after enrollment, the user provides
biometric data, which is converted into a template.
• The verification template is compared with one or more enrollment
templates.
• The result of a comparison between biometric templates is rendered as a
• score or confidence level, which is compared to a threshold used for a
specific technology, system, user, or transaction.
• If the score exceeds the threshold, the comparison is a match, and that
result is transmitted.
• If the score does not meet the threshold, the comparison is not a match,
and that result is transmitted.
Enrollment and Template Creation
• Enrollment. The process by which a user’s biometric
data is initially acquired, assessed, processed, and
stored in the form of a template for ongoing use in a
biometric system is called enrollment.
• Presentation. After a user provides whatever personal
information is required to begin enrollment, such as
name or user ID, he or she presents biometric data.
Presentation is the process by which a user provides
biometric data to an acquisition device—the hardware
used to collect biometric data.
Enrollment and Template Creation
• Biometric data. The biometric data users
provide is an unprocessed image or recording
of a characteristic. This unprocessed data is
also referred to as raw biometric data or as a
biometric sample.
• Raw biometric data cannot be used to
perform biometric matches.
Enrollment and Template Creation
• Feature extraction. The automated process of locating
and encoding distinctive characteristics from biometric
data in order to generate a template is called feature
extraction.
• Templates: The template is a defining element of
biometric technology and systems, and is critical to
understanding how biometrics operate.
A template is a small file derived from the distinctive
features of a user’s biometric data, used to perform
biometric matches. Biometric systems store and
compare biometric templates, not biometric data.
important facts about biometric
templates:
• Most templates occupy less than 1 kilobyte,
and some technologies’ templates are as small
as 9 bytes; template sizes also differ from
vendor to vendor. Such small file sizes allow
for very rapid matching, allow biometrics to
be stored on devices such as tokens and smart
cards, and facilitate rapid transmission and
encryption.
important facts about biometric
templates:
• Templates are proprietary to each vendor and
each technology. There is no common biometric
template format—a template created in vendor
A’s system cannot be used through vendor B’s
technology
• Biometric data such as fingerprints and facial
images cannot be reconstructed from biometric
templates. Templates are not merely
compressions of biometric data, but extractions
of distinctive features.
important facts about biometric
templates:
• One of the most interesting facts about most
biometric technologies is that unique
templates are generated every time a user
presents biometric data.
Biometric templates versus
identifiable biometric data
Biometric Matching
• The comparison of biometric templates to
determine their degree of similarity or
correlation is called matching. The process of
matching biometric templates results in a
score, which, in most systems, is compared
against a threshold. If the score exceeds the
threshold, the result is a match; if the score
falls below the threshold, the result is a
nonmatch.
Biometric Matching…
The following are steps in involved in matching:
•Scoring: Biometric match/no-match decisions are
based on a score—a number indicating the degree
of similarity or correlation resulting from the
comparison of enrollment and verification
templates.
•Biometric systems utilize proprietary algorithms to
process templates and generate scores. There is no
standard scale used for biometric scoring: Some
biometric systems employ a scale of 1 to 100;
others use a scale of -1 to 1.
Biometric Matching…
• Threshold. Once a score is generated, it is
compared to the verification attempt’s
threshold.
• Decision. The result of the comparison
between the score and the threshold is a
decision.
Accuracy in Biometric Systems
• The key performance metrics in biometrics are
false match rate, false nonmatch rate, and
failure-to-enroll rate.
• No single metric indicates how well a
biometric system or device performs: Analysis
of all three metrics is necessary to assess the
performance of a specific technology.
False Match Rate(FMR)
• A biometric solution’s false match rate is the
probability that a user’s template will be
incorrectly judged to be a match for a
different user’s template.
• Vendors claim false match rates of 1 per
100,000, 1 per billion, even 1 in 1078
• The false match rate is often referred to as the
false acceptance rate (FAR).
False Nonmatch Rate
• A biometric solution’s false nonmatch rate
(FNMR) is the probability that a user’s
template will be incorrectly judged to not
match his or her enrollment template.
• Asolution’s false nonmatch rate is often
referred to as false rejection rate (FRR)
Failure-to-Enroll (FTE) Rate
• Vendors have paid less attention to the third
critical accuracy metric: failure-to-enroll rate
• A system’s failure-to-enroll (FTE) rate
represents the probability that a given user
will be unable to enroll in a biometric system.
FTEs occur when users have insufficiently
distinctive or replicable biometric data or
when the design of the biometric solution is
such that providing consistent data is difficult.
Equal Error Rate (EER)
• It is the rate at which the FNMR is equal to the
FMR.
Ability-to-Verify (ATV) Rate
• ATV is a combination of the failure-to-enroll
and false nonmatch rates, and indicates the
overall percentage of users who will be
capable of authenticating on a daily basis.
• ATV = (1 - FTE)(1- FNMR)
Fingerprint Identification
• Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long
been used for identification because of their
immutability and individuality.
• Immutability refers to the permanent and
unchanging character of the pattern on each
finger. Individuality refers to the uniqueness of
ridge details across individuals; the probability
that two fingerprints are alike is about 1 in
1.9x1015.
Some approaches of fingerprint
recognition
• Based on minutiae located in a fingerprint
• Based on frequency content and ridge
orientation of a fingerprint
Approach: Based on minutiae located
in a fingerprint
• Most automatic systems for fingerprint
comparison are based on minutiae matching
• Minutiae are local discontinuities in the
fingerprint pattern.
• A total of 150 different minutiae types have
been identified.
• In practice only ridge ending and ridge
bifurcation minutiae types are used in
fingerprint recognition.
The building blocks of a fingerprint
recognition system are:
Image Acquisition
• A number of methods are used to acquire
fingerprints. Among them, the inked
impression method remains the most popular
one. Inkless fingerprint scanners are also
present eliminating the intermediate
digitization process.
Image Acquisition…
• Two types of degradation usually affect
fingerprint images:
1)the ridge lines are not strictly continuous since
they sometimes include small breaks (gaps);
2)parallel ridge lines are not always well separated
due to the presence of cluttering noise.
• The resolution of the scanned fingerprints must
be 500 dpi while the size is 300x300.
Edge Detection
• An edge is the boundary between two regions
with relatively distinct gray level properties.
• In practice, the set of pixels obtained from the
edge detection algorithm seldom characterizes a
boundary completely because of noise, breaks in
the boundary and other effects that introduce
spurious intensity discontinuities. Thus, edge
detection algorithms typically are followed by
linking and other boundary detection procedures
designed to assemble edge pixels into meaningful
boundaries.
Thinning
• An important approach to representing the
structural shape of a plane region is to reduce it
to a graph. This reduction may accomplished by
obtaining the skeleton of the region via thinning
(also called skeletonizing) algorithm.
• The thinning algorithm while deleting unwanted
edge points should not:
– Remove end points.
– Break connectedness
– Cause excessive erosion of the region
Feature Extraction
• Extraction of appropriate features is one of the
most important tasks for a recognition system.
• A multilayer perceptron (MLP) of three layers is
trained to detect the minutiae in the thinned
fingerprint image of size 300x300. The first layer
of the network has nine neurons associated with
the components of the input vector. The hidden
layer has five neurons and the output layer has
one neuron. The network is trained to output a
“1” when the input window in centered on a
minutiae and a “0” when it is not.
Training set
Core points on different fingerprint
patterns

(a) tented arch, (b) right loop, (c) left loop, (d) whorl
Classifier
• After scanning the entire fingerprint image, the
resulting output is a binary image revealing the
location of minutiae. In order to prevent any
falsely reported output and select “significant”
minutiae, two more rules are added to enhance
the robustness of the algorithm:
1)At those potential minutiae detected points, we
re-examine them by increasing the window size
by 5x5 and scanning the output image.
2)If two or more minutiae are to close together
(few pixels away) we ignore all of them.
Classifier…
To insure translation, rotation and scale-invariance, the
following operations will be performed:
•The Euclidean distance d(i) from each minutiae detected
point to the center is calculated. The referencing of the
distance data to the center point guarantees the
property of positional invariance.
•The data will be sorted in ascending order from d(0) to
d(N), where N is the number of detected minutiae points,
assuring rotational invariance.
•The data is then normalized to unity by shortest distance
d (0), i.e: dnorm(i) = d(0)/d(i); This will assure scale
invariance property.
Verification
The last phase is the verification phase where
testing fingerprint image:
1) is inputted to the system
2) minutiae are extracted
3) Minutiae matching: comparing the distances
extracted minutiae to the one stored in the
database
4) Identify the person
Thank You

You might also like