SlideShare a Scribd company logo
1 of 43
Assistant Prof. Dr.Abbas H.
Alasadi
Email : abbashh2002@gmail.com
Course Syllabus
1. Introduction to Biometrics
2. Fingerprint Recognition
3. Face Recognition
4. Iris Recognition
5. Hand Geometry Recognition
6. Gait Recognition
7. The Ear as a Biometric
Lecture 1

Pages 2
Course Syllabus
8. Voice Biometrics
9. A Palmprint Authentication System
10. On-Line Signature Verification
11. Hand Vascular Pattern Technology
12. Introduction to Multibiometrics
13. Biometric System Security
14. Biometrics databases
Lecture 1

Pages 3
Introduction to Biometrics


The term “biometrics” is derived from the Greek
words “bio” (life) and “metrics” (to measure).
Automated biometric systems have only become
available over the last few decades, due to
significant advances in the field of computer
processing.



Many of these new automated techniques, however,
are based on ideas that were originally conceived
hundreds, even thousands of years ago.

Lecture 1

Pages 4
Introduction to Biometrics


One of the oldest and most basic examples of a
characteristic that is used for recognition by humans
is the face.



Since the beginning of civilization, humans have used
faces to identify known (familiar) and unknown
(unfamiliar) individuals.



This simple task became increasingly more
challenging as populations increased and as more
convenient methods of travel introduced many new
individuals into- once small communities.
Lecture 1

Pages 5
Introduction to Biometrics


The concept of human recognition is also seen in
behavioral-predominant biometrics such as speaker
and gait recognition. Individuals use these
characteristics, somewhat unconsciously, to
recognize known individuals on a day-to-day basis.



Other characteristics have also been used
throughout the history of civilization as a more
formal means of recognition.

Lecture 1

Pages 6
Introduction to Biometrics


Some examples are:

•

In a cave estimated to be at least 31,000 years old,
the walls are decorated with paintings believed to be
created by prehistoric men who lived there.
Surrounding these paintings are numerous
handprints that are felt to “have…acted as an unforgeable signature” of its originator.

Lecture 1

Pages 7
Introduction to Biometrics
• There is also evidence that fingerprints were used
as a person’s mark as early as 500 B.C.
“Babylonian business transactions are recorded in
clay tablets that include fingerprints.”
• Joao de Barros, a Spanish explorer and writer,
wrote that early Chinese merchants used
fingerprints to settle business transactions. Chinese
parents also used fingerprints and footprints to
differentiate children from one another.
Lecture 1

Pages 8
Introduction to Biometrics
•

In early Egyptian history, traders were identified
by their physical descriptors to differentiate
between trusted traders of known reputation and
previous successful transactions, and those new
to the market.

Lecture 1

Pages 9
History of Biometrics


By the mid-1800s, with the rapid growth of cities
due to the industrial revolution and more
productive farming, there was a formally
recognized need to identify people. Merchants and
authorities were faced with increasingly larger and
more mobile populations and could no longer rely
solely on their own experiences and local
knowledge.

Lecture 1

Pages 10
History of Biometrics


Influenced by the writings of Jeremy Betham and
other Utilitarian thinkers, the courts of this period
began to codify concepts of justice that endure with
us to this day. Most notably, justice systems sought
to treat first time offenders more leniently and repeat
offenders more harshly.

Lecture 1

Pages 11
History of Biometrics
 This created a need for a formal system that recorded
offenses along with measured identity traits of the
offender. The first of two approaches was the Bertillon
system of measuring various body dimensions, which
originated in France. These measurements were
written on cards that could be sorted by height, arm
length or any other parameter. This field was called
anthropometrics.
Lecture 1

Pages 12
History of Biometrics


The other approach was the formal use of
fingerprints by police departments. This process
emerged in South America, Asia, and Europe.



By the late 1800s a method was developed to index
fingerprints that provided the ability to retrieve
records as Bertillon’s method did but that was based
on a more individualized metric – fingerprint patterns
and ridges.

Lecture 1

Pages 13
History of Biometrics


The first such robust system for indexing
fingerprints was developed in India by Azizul
Haque for Edward Henry, Inspector General of
Police, Bengal, India. This system, called the
Henry System, and variations on it are still in use
for classifying fingerprints.

Lecture 1

Pages 14
History of Biometrics


True biometric systems began to emerge in the
latter half of the twentieth century, coinciding with
the emergence of computer systems.



The nascent field experienced an explosion of
activity in the 1990s and began to surface in
everyday applications in the early 2000s.

Lecture 1

Pages 15
Overview of Biometrics
“Biometrics” is a general term used alternatively to
describe a characteristic or a process.
A a characteristic:
s
1. A measurable biological (anatomical and
physiological) and behavioral characteristic that can be
used for automated recognition.
A a process:
s
1.Automated methods of recognizing an individual
based on measurable biological (anatomical and
physiological) and behavioral characteristics.

Lecture 1

Pages 16
Overview of Biometrics
Biometric systems have been researched and tested
for a few decades, but have only recently entered into
the public consciousness because of high profile
applications, usage in entertainment media (though
often not realistically) and increased usage by the
public in day-to-day activities.

Lecture 1

Pages 17
Overview of Biometrics
Example
deployments within the United States Government
include the FBI’s Integrated Automated Fingerprint
Identification System (IAFIS), the US-VISIT program,
the Transportation Workers Identification Credentials
(TWIC) program, and the Registered Traveler (RT)
program
Lecture 1

Pages 18
Overview of Biometrics
 Many companies are also implementing biometric
technologies to secure areas, maintain time records,
and enhance user convenience.
 For example, for many years Disney World has
employed biometric devices for season ticket holders
to accelerate and simplify the process of entering its
parks, while ensuring that the ticket is used only by
the individual to whom it was issued.
Lecture 1

Pages 19
Overview of Biometrics
 A typical biometric system is comprised of five
integrated components:
1. A sensor is used to collect the data and convert the
information to a digital format.
2.Signal processing algorithms perform quality control
activities and develop the biometric template.
3. A data storage component keeps information that new
biometric templates will be compared to.
Lecture 1

Pages 20
Overview of Biometrics
4. A matching algorithm compares the new biometric
template to one or more templates kept in data storage.
5. Finally, a decision process uses the results from the
matching component to make a system-level decision.

Lecture 1

Pages 21
Sensors
Recording & converting biometric traits to
computer usable data ,sensors are needed.
e.g.. Fingerprint verification.

Lecture 1

Pages 22
Biometric Modalities
 Commonly implemented or studied biometric modalities
include fingerprint, face, iris, voice, signature and hand
geometry... etc. Many other modalities are in various
stages of development and assessment.
 There is not one biometric modality that is best for all
implementations.
 Many factors must be taken into account when
implementing a biometric device including location,
security risks, task (identification or verification), expected
number of users, user circumstances, existing data, etc.

Lecture 1

Pages 23
Characteristics of Biometrics
1. Universality





Universality: Every person should possess this
characteristic
In practice, this may not be the case
Otherwise, population of nonuniversality must be
small < 1%

Lecture 1

Pages 24
Characteristics of Biometrics
2. Uniqueness





Lecture 1

Uniqueness: No two individuals possess the same
characteristic.
 Genotypical – Genetically linked (e.g. identical twins
will have same biometric)
 Phenotypical – Non-genetically linked, different
perhaps even on same individual
Establishing uniqueness is difficult to prove analytically
May be unique, but “uniqueness” must be
distinguishable
Pages 25
Characteristics of Biometrics


3. Permanence
 Permanence: The characteristic does not change in
time, that is, it is time invariant
 At best this is an approximation
 Degree of permanence has a major impact on the
system design and long term operation of
biometrics. (e.g. enrollment, adaptive matching
design, etc.)
 Long vs. short-term stability

Lecture 1

Pages 26
Characteristics of Biometrics


4. Collectability
 Collectability: The characteristic can be quantitatively
measured.
 In practice, the biometric collection must be:
 Non-intrusive
 Reliable and robust
 Cost effective for a given application

Lecture 1

Pages 27
Biometrics Today
Voice
Infrared Facial and Hand Vein Thermograms
Fingerprints
Face
Iris
Ear
Gait
Keystroke Dynamics
DNA
Signature
Odor
Retinal Scan
Hand and Finger Geometry
Lecture 1

Pages 28
IDENTIFICATION
 Search

a sample against a database of
templates.
 Typical application: identifying fingerprints

?

Lecture 1

Pages 29
VERIFICATION
 Compare

a sample against a single stored

template
 Typical application: voice lock

?

Lecture 1

Pages 30
Practical Applications

FACE RECOGNITION

IRIS
RECOGNITION
Lecture 1

HANDGEOMETRY

FINGERPRINT
Pages 31
APPLICATIONS


Physical access control of, for example, an airport.
Here the airport infrastructure, or travel infrastructure
in general, is the application.



Logical access control of, for example, a bank
account; i.e., the application is the access to and the
handling of money.



Ensuring uniqueness of individuals. Here the focus is
typically on preventing double enrollment in some
application, for example, a social benefits program.
Security– authentication
Forensic sciences– individualization




Lecture 1

Pages 32
APPLICATIONS

Lecture 1

Pages 33
Finger-scan
A live acquisition of a
person’s fingerprint.
 Image Acquisition →
Image Processing →
Template Creation →
Template Matching
 Acquisition Devices:






Lecture 1

Glass plate
Electronic
Ultrasound
Pages 34
FEATURES


Strengths:






don’t change over time
Unique

W
eaknesses: Scars

Attacks:





Lecture 1

Finger Decapitation
“Gummy fingers”
Corruption of the database
Surgery to alter
Pages 35
Iris Scan
Image Acquisition →
Image Processing →
Template Creation →
Template Matching
 Uses to date:





Lecture 1

Physical access
control
Computer
authentication

Pages 36
FEATURES


Strengths:




W
eaknesses:







300+ characteristics; 200 required for match
Fear
Discomfort
Algorithms may not work on all individuals
No large databases

Attacks:


Lecture 1

Surgery (M rity Re p o rt )
ino
Pages 37
Hand Scan






Typical systems measure 90
different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
Strengths:
 Reasonably robust systems
W
eaknesses:
 Accuracy is limited;
 Bulky scanner

Lecture 1

Pages 38
DNA IDENTIFICATION
 Widely

accepted for
crime scenes
 Twin problem

Lecture 1

Pages 39
Template Size
Biometric
Voice
Face
Signature
Fingerprint
Hand Geometry
Iris
Retina
Lecture 1

Appr. Template Size
70k – 80k
84 bytes – 2k
500 – 1000 bytes
256 bytes – 1.2k
9 bytes
256 – 512 bytes
96 bytes
Pages 40
2003 comparative share
Keyst r oke Scan
0. 3%

Faci al Scan
11. 4%

Hand Scan
10. 0%
M ddl ewar e
i
12. 4%

Fi nger Scan
52. 1%
Lecture 1

Si gnat ur e Scan
2. 4%

Voi ce Scan
4. 1%

I r i s Scan
7. 3%

Pages 41
CONCLUSION
Trust in these electronic transactions
is essential to the healthy growth of
the global economy.
Finger scan, voice authentication and
signature verification are the three
fastest-growing segments .Imagine
a secure world without passwords.

Lecture 1

Pages 42
Thank
you
Lecture 1

Pages 43

More Related Content

What's hot

What's hot (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaDrishty Sharma
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsAnivar Aravind
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to AnalyticsMichael Bloom
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To AnalyticsAlex Meadows
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopGhassan Al-Yafie
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For YouInterQuest Group
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Experimental research
Experimental research Experimental research
Experimental research Shafqat Wattoo
 

Viewers also liked (19)

Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
biometrics
biometricsbiometrics
biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
How To Make DevOps Work For You
How To Make DevOps Work For YouHow To Make DevOps Work For You
How To Make DevOps Work For You
 
Data science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebookData science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebook
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Experimental research
Experimental research Experimental research
Experimental research
 

Similar to Introduction to Biometric lectures... Prepared by Dr.Abbas

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptxBryCunal
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsCSCJournals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
HW 11. List the main modules of a biometric system.A) Sensor M
HW 11. List the main modules of a biometric system.A) Sensor MHW 11. List the main modules of a biometric system.A) Sensor M
HW 11. List the main modules of a biometric system.A) Sensor MNarcisaBrandenburg70
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 

Similar to Introduction to Biometric lectures... Prepared by Dr.Abbas (20)

Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics Report ppt
Biometrics Report pptBiometrics Report ppt
Biometrics Report ppt
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
BiometricsPresentation.pptx
BiometricsPresentation.pptxBiometricsPresentation.pptx
BiometricsPresentation.pptx
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
seminar_report
seminar_reportseminar_report
seminar_report
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Ai
AiAi
Ai
 
Protection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular BiometricsProtection of Patient Identity and Privacy Using Vascular Biometrics
Protection of Patient Identity and Privacy Using Vascular Biometrics
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
HW 11. List the main modules of a biometric system.A) Sensor M
HW 11. List the main modules of a biometric system.A) Sensor MHW 11. List the main modules of a biometric system.A) Sensor M
HW 11. List the main modules of a biometric system.A) Sensor M
 
Biometrics ppt.pptx
Biometrics ppt.pptxBiometrics ppt.pptx
Biometrics ppt.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Introduction to Biometric lectures... Prepared by Dr.Abbas

  • 1. Assistant Prof. Dr.Abbas H. Alasadi Email : abbashh2002@gmail.com
  • 2. Course Syllabus 1. Introduction to Biometrics 2. Fingerprint Recognition 3. Face Recognition 4. Iris Recognition 5. Hand Geometry Recognition 6. Gait Recognition 7. The Ear as a Biometric Lecture 1 Pages 2
  • 3. Course Syllabus 8. Voice Biometrics 9. A Palmprint Authentication System 10. On-Line Signature Verification 11. Hand Vascular Pattern Technology 12. Introduction to Multibiometrics 13. Biometric System Security 14. Biometrics databases Lecture 1 Pages 3
  • 4. Introduction to Biometrics  The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing.  Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago. Lecture 1 Pages 4
  • 5. Introduction to Biometrics  One of the oldest and most basic examples of a characteristic that is used for recognition by humans is the face.  Since the beginning of civilization, humans have used faces to identify known (familiar) and unknown (unfamiliar) individuals.  This simple task became increasingly more challenging as populations increased and as more convenient methods of travel introduced many new individuals into- once small communities. Lecture 1 Pages 5
  • 6. Introduction to Biometrics  The concept of human recognition is also seen in behavioral-predominant biometrics such as speaker and gait recognition. Individuals use these characteristics, somewhat unconsciously, to recognize known individuals on a day-to-day basis.  Other characteristics have also been used throughout the history of civilization as a more formal means of recognition. Lecture 1 Pages 6
  • 7. Introduction to Biometrics  Some examples are: • In a cave estimated to be at least 31,000 years old, the walls are decorated with paintings believed to be created by prehistoric men who lived there. Surrounding these paintings are numerous handprints that are felt to “have…acted as an unforgeable signature” of its originator. Lecture 1 Pages 7
  • 8. Introduction to Biometrics • There is also evidence that fingerprints were used as a person’s mark as early as 500 B.C. “Babylonian business transactions are recorded in clay tablets that include fingerprints.” • Joao de Barros, a Spanish explorer and writer, wrote that early Chinese merchants used fingerprints to settle business transactions. Chinese parents also used fingerprints and footprints to differentiate children from one another. Lecture 1 Pages 8
  • 9. Introduction to Biometrics • In early Egyptian history, traders were identified by their physical descriptors to differentiate between trusted traders of known reputation and previous successful transactions, and those new to the market. Lecture 1 Pages 9
  • 10. History of Biometrics  By the mid-1800s, with the rapid growth of cities due to the industrial revolution and more productive farming, there was a formally recognized need to identify people. Merchants and authorities were faced with increasingly larger and more mobile populations and could no longer rely solely on their own experiences and local knowledge. Lecture 1 Pages 10
  • 11. History of Biometrics  Influenced by the writings of Jeremy Betham and other Utilitarian thinkers, the courts of this period began to codify concepts of justice that endure with us to this day. Most notably, justice systems sought to treat first time offenders more leniently and repeat offenders more harshly. Lecture 1 Pages 11
  • 12. History of Biometrics  This created a need for a formal system that recorded offenses along with measured identity traits of the offender. The first of two approaches was the Bertillon system of measuring various body dimensions, which originated in France. These measurements were written on cards that could be sorted by height, arm length or any other parameter. This field was called anthropometrics. Lecture 1 Pages 12
  • 13. History of Biometrics  The other approach was the formal use of fingerprints by police departments. This process emerged in South America, Asia, and Europe.  By the late 1800s a method was developed to index fingerprints that provided the ability to retrieve records as Bertillon’s method did but that was based on a more individualized metric – fingerprint patterns and ridges. Lecture 1 Pages 13
  • 14. History of Biometrics  The first such robust system for indexing fingerprints was developed in India by Azizul Haque for Edward Henry, Inspector General of Police, Bengal, India. This system, called the Henry System, and variations on it are still in use for classifying fingerprints. Lecture 1 Pages 14
  • 15. History of Biometrics  True biometric systems began to emerge in the latter half of the twentieth century, coinciding with the emergence of computer systems.  The nascent field experienced an explosion of activity in the 1990s and began to surface in everyday applications in the early 2000s. Lecture 1 Pages 15
  • 16. Overview of Biometrics “Biometrics” is a general term used alternatively to describe a characteristic or a process. A a characteristic: s 1. A measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition. A a process: s 1.Automated methods of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics. Lecture 1 Pages 16
  • 17. Overview of Biometrics Biometric systems have been researched and tested for a few decades, but have only recently entered into the public consciousness because of high profile applications, usage in entertainment media (though often not realistically) and increased usage by the public in day-to-day activities. Lecture 1 Pages 17
  • 18. Overview of Biometrics Example deployments within the United States Government include the FBI’s Integrated Automated Fingerprint Identification System (IAFIS), the US-VISIT program, the Transportation Workers Identification Credentials (TWIC) program, and the Registered Traveler (RT) program Lecture 1 Pages 18
  • 19. Overview of Biometrics  Many companies are also implementing biometric technologies to secure areas, maintain time records, and enhance user convenience.  For example, for many years Disney World has employed biometric devices for season ticket holders to accelerate and simplify the process of entering its parks, while ensuring that the ticket is used only by the individual to whom it was issued. Lecture 1 Pages 19
  • 20. Overview of Biometrics  A typical biometric system is comprised of five integrated components: 1. A sensor is used to collect the data and convert the information to a digital format. 2.Signal processing algorithms perform quality control activities and develop the biometric template. 3. A data storage component keeps information that new biometric templates will be compared to. Lecture 1 Pages 20
  • 21. Overview of Biometrics 4. A matching algorithm compares the new biometric template to one or more templates kept in data storage. 5. Finally, a decision process uses the results from the matching component to make a system-level decision. Lecture 1 Pages 21
  • 22. Sensors Recording & converting biometric traits to computer usable data ,sensors are needed. e.g.. Fingerprint verification. Lecture 1 Pages 22
  • 23. Biometric Modalities  Commonly implemented or studied biometric modalities include fingerprint, face, iris, voice, signature and hand geometry... etc. Many other modalities are in various stages of development and assessment.  There is not one biometric modality that is best for all implementations.  Many factors must be taken into account when implementing a biometric device including location, security risks, task (identification or verification), expected number of users, user circumstances, existing data, etc. Lecture 1 Pages 23
  • 24. Characteristics of Biometrics 1. Universality    Universality: Every person should possess this characteristic In practice, this may not be the case Otherwise, population of nonuniversality must be small < 1% Lecture 1 Pages 24
  • 25. Characteristics of Biometrics 2. Uniqueness    Lecture 1 Uniqueness: No two individuals possess the same characteristic.  Genotypical – Genetically linked (e.g. identical twins will have same biometric)  Phenotypical – Non-genetically linked, different perhaps even on same individual Establishing uniqueness is difficult to prove analytically May be unique, but “uniqueness” must be distinguishable Pages 25
  • 26. Characteristics of Biometrics  3. Permanence  Permanence: The characteristic does not change in time, that is, it is time invariant  At best this is an approximation  Degree of permanence has a major impact on the system design and long term operation of biometrics. (e.g. enrollment, adaptive matching design, etc.)  Long vs. short-term stability Lecture 1 Pages 26
  • 27. Characteristics of Biometrics  4. Collectability  Collectability: The characteristic can be quantitatively measured.  In practice, the biometric collection must be:  Non-intrusive  Reliable and robust  Cost effective for a given application Lecture 1 Pages 27
  • 28. Biometrics Today Voice Infrared Facial and Hand Vein Thermograms Fingerprints Face Iris Ear Gait Keystroke Dynamics DNA Signature Odor Retinal Scan Hand and Finger Geometry Lecture 1 Pages 28
  • 29. IDENTIFICATION  Search a sample against a database of templates.  Typical application: identifying fingerprints ? Lecture 1 Pages 29
  • 30. VERIFICATION  Compare a sample against a single stored template  Typical application: voice lock ? Lecture 1 Pages 30
  • 32. APPLICATIONS  Physical access control of, for example, an airport. Here the airport infrastructure, or travel infrastructure in general, is the application.  Logical access control of, for example, a bank account; i.e., the application is the access to and the handling of money.  Ensuring uniqueness of individuals. Here the focus is typically on preventing double enrollment in some application, for example, a social benefits program. Security– authentication Forensic sciences– individualization   Lecture 1 Pages 32
  • 34. Finger-scan A live acquisition of a person’s fingerprint.  Image Acquisition → Image Processing → Template Creation → Template Matching  Acquisition Devices:     Lecture 1 Glass plate Electronic Ultrasound Pages 34
  • 35. FEATURES  Strengths:     don’t change over time Unique W eaknesses: Scars Attacks:     Lecture 1 Finger Decapitation “Gummy fingers” Corruption of the database Surgery to alter Pages 35
  • 36. Iris Scan Image Acquisition → Image Processing → Template Creation → Template Matching  Uses to date:    Lecture 1 Physical access control Computer authentication Pages 36
  • 37. FEATURES  Strengths:   W eaknesses:      300+ characteristics; 200 required for match Fear Discomfort Algorithms may not work on all individuals No large databases Attacks:  Lecture 1 Surgery (M rity Re p o rt ) ino Pages 37
  • 38. Hand Scan    Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure Strengths:  Reasonably robust systems W eaknesses:  Accuracy is limited;  Bulky scanner Lecture 1 Pages 38
  • 39. DNA IDENTIFICATION  Widely accepted for crime scenes  Twin problem Lecture 1 Pages 39
  • 40. Template Size Biometric Voice Face Signature Fingerprint Hand Geometry Iris Retina Lecture 1 Appr. Template Size 70k – 80k 84 bytes – 2k 500 – 1000 bytes 256 bytes – 1.2k 9 bytes 256 – 512 bytes 96 bytes Pages 40
  • 41. 2003 comparative share Keyst r oke Scan 0. 3% Faci al Scan 11. 4% Hand Scan 10. 0% M ddl ewar e i 12. 4% Fi nger Scan 52. 1% Lecture 1 Si gnat ur e Scan 2. 4% Voi ce Scan 4. 1% I r i s Scan 7. 3% Pages 41
  • 42. CONCLUSION Trust in these electronic transactions is essential to the healthy growth of the global economy. Finger scan, voice authentication and signature verification are the three fastest-growing segments .Imagine a secure world without passwords. Lecture 1 Pages 42

Editor's Notes

  1. http://gfx.dagbladet.no/dinside/2003/08/25/iris_scan_sak.jpg