Biometry: Difference between revisions

From
Jump to navigation Jump to search
(Removed unnecessary copy of the slides, will add real content soon)
Line 1: Line 1:


=Overview=
*Broad Overview on Biometric Criteria
*Facial recognition
**Use, Scenario, Features
**General course
**Approaches
**Summary
*Insights on Fingerprints
**Features
**Acquisition
**Recognition
**Demonstration
**Problems

=Short Introduction=
*I biometry: the statistical analysis of biological
observations and phenomena (Merriam-Webster
Online Dictionary)
*I biometric: a measurable, physical characteristic or
personal behavioral trait used to recognize the
identity, or verify the claimed identity of a person
*I Three levels:
**1. I know something (passwords)
**2. I have something (tokens)
**3. I am something (biometry)

=Classification=
Two diffent modes must be distinguished:
*Identification “Who is it?”
*Authentication “Is it her?”

=Quality indices=
False Rejection Rate (frr)
*Rate of authentication attempts from legitimate users that are rejected.
False Acceptance Rate (far)
*Rate of authentication attemps from illegitimate users (e.g. attackers) that are accepted.
Equal Error Rate (eer)
*The eer equals the far and frr when the system is configured so that far = frr.
Failure to Enroll Rate (fer)
*Rate of users that can’t enroll into the system at all.

=Hand geometry=
*Hand is placed on a reflective surface
*Hand is lit by some light source (e.g. bright LED)
*a camera and some mirrors are used to gather images of several parts of the hand from several angles
*the template consists of measurements extracted from the image

=Retina scanning=
*was available before iris scanning
*good (e.g. low) far
*a low intensity light source is used to scan the vascular pattern

=Other techniques=
*voice verification
*signature verification
*vein pattern scanning
*scent
*keystroke patterns

=Use=
*artifical intelligence
**autonomic systems should interact with human, recognize and interpret
**facial expressions as essential component
*civil authentification
**drivers licence, credit cards, access
**inconspicuous, good acceptance by users expected
**question: reliability, frontiers (twins)
*identification in delinquency (crime)
**cameras, automatical identification of suspects
**support search for missing persons

=Scenario=
*controlled environment
**uniform head position, cooperative users, good
image quality
*uncontrolled environment
**face has to be found, position, orientation, size, illumination (shadows), bakground, are variable and have to be compensated
**facial expression (laughing) has big influence
**face partially hidden, beard, hairstyle, glasses, hat can hide parts of the facial information
**injuries, holiday, age change the face


=Definition of Features=
*before identification
**face has to be found and separated from the background
**separating background and illumination are big problems
*manual definition of features
*calculation of features often not reliable
*amount of manually defined features too small to separate different people
*immense variety of features has to be expected


=Generating Templates=
comparison
*different procedures are used
*general:
**byte-comparison of two templates
**use of algorithms (vector operations)
**grade of similarity
**if within tolerance then identical
*algorithms:
**template matching
**elastical bunch graph matching
**geometrical features
**“eigenfaces”


=Template Matching=
*similarity between image and template is calculated
*template: for whole face or parts (eye, mouth, nose)
*unknown face is compared with all that were saved
*problems
**mask has to match for a lot of faces
**a lot of time necessary, quality depends from mask

=Elastic Bunch Graph Matching=
*Labeled Graph (LG): nodes at certain parts of face (nose, mouth,..); universal face graph
*Bunch Graph (BG): every node gets different features as a subgraph (specializing the LG)
*Facial Recognition: find face, find certain parts, calculate BG and compare graphs
*save useful variation

=Deformable Templates=
*analyze face with geometrical figures
*alignment, shape, size, but also especially the position of the elements to each other
*samples (templates) are adapted to concrete face
*notes
**Templates comparable with LG; has to be adapted to concrete face
**Extraction of edges necessary; not very reliable


=Recognition with geometrical features=
*geometrical features are extracted from face
**simple extraction, difficult classification
*possible features
**horizontal and vertical projection of parts (eyes,nose, . . .)
**position, central point, width, thickness, radius of parts of the face


="Eigenfaces"=
*beginning: amount of faces:
**1. mean value calculation of the sample faces
**2. mean value from step 1 subtracted from every sample face
**3. “Kovarianzmatrix” calculation of normalized images from step 2
**4. mathematical procedure gives optimal base of Eigenfaces
*base for effizient facial recognition / data compression
*condition: all faces to be recognized were trained before and represented: (calculation of “Eigenfaces-Base”)
*recognition of an image
**projection into “Eigenfaces-Base”
**Comparison of resulting values
**assign to registered face (person) thats value is next to
*problem: classify unknown faces


=3D Recognition=
*Features:
**developed in israel
**further development at Siemens/Munich
**“contoured face mask” is built up
**superior quality compared with 2D images
**very fast and reliable
**does not care about the position of the face
*How it works:
**project coloured lines
**at varying heights no straight lines
**position of each pixel is calculated to geometric data
**(3D Image at precision of 0.2 x 0.2 x 0.2mm within 40 ms)
**image analysed by using classical recognition methods
**! more secure
**! impossible to cheat the system by placing a photo in front of the camera

=Summary=
*Evaluation and Comparison
**feature based approaches
***can handle different orientations of faces
***manual definition of features
***automatical extraction of features / classification not very reliable
**appearance based approaches
***for every view separate image of the person is necessary
***simple to realize, automatical feature extraction


=Insights on Fingerprints=
*Features found on fingers
*Acquisition of fingerprints
*Recognition of fingerprints
*Some demonstration
*Problems of fingerprints


=Classification of fingerprints=
In the Henry system of fingerprint classification there are five different classes of fingerprints:
*Right Loop
*Left Loop
*Whorl
*Arch
*Tented Arch
The frequency of each class seems to vary with ethnic origin: Europeans have mostly loops, Pygmies and African bush men mostly have archs and Orientals have plenty of whorls.

=Minutiae=
Different types of minutiae:
*endings
*bifurcations

=Devices=
There’s a plethora of different sensor types:
*capacitive
*optical (several principles)
*thermic
*ultrasonic
*pressure
Acquisition methodology:
touching vs. sweeping


=Typical extraction flow=
*fingerprint image
*binarization
*thinning
*minutiae extraction
*post processing
*minutiae


=Problems=
Encryption . . . Fingerprints
*are easy to steal
*can’t be changed once they are stolen
*are easy to fake on the most common sensor devices
*are usually not universally applicable (fer 5%)


=References=
=References=
*Ashbourn, J. (2000). Biometrics: Advanced identity verification: The complete guide. London: Springer.
*Ashbourn, J. (2000). Biometrics: Advanced identity verification: The complete guide. London: Springer.
*Bhanu, B., & Tan, X. (2004). Computational algorithms for fingerprint recognition. Boston / Dordrecht/ London: Kluwer Academic Publishers.
*Bhanu, B., & Tan, X. (2004). Computational algorithms for fingerprint recognition. Boston / Dordrecht/ London: Kluwer Academic Publishers.
*Thalheim, L., Krissler, J., & Ziegler, P.-M. (2002). Koerperkontrolle [Body check]. In c’t 11/2002. Hannover: Heise. (English version at http: //www.heise.de/ct/english/02/11/114/)
*Thalheim, L., Krissler, J., & Ziegler, P.-M. (2002). Koerperkontrolle [Body check]. In c’t 11/2002. Hannover: Heise. (English version at [http://www.heise.de/ct/english/02/11/114/ heise online])

Also see the slides at [http://www.informatik.hu-berlin.de/~ploetz/biometry] (PDF format, 5.5 MB).

Revision as of 09:50, 21 February 2005

References

  • Ashbourn, J. (2000). Biometrics: Advanced identity verification: The complete guide. London: Springer.
  • Bhanu, B., & Tan, X. (2004). Computational algorithms for fingerprint recognition. Boston / Dordrecht/ London: Kluwer Academic Publishers.
  • Thalheim, L., Krissler, J., & Ziegler, P.-M. (2002). Koerperkontrolle [Body check]. In c’t 11/2002. Hannover: Heise. (English version at heise online)

Also see the slides at [1] (PDF format, 5.5 MB).