Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 03/13/2006 4:14:27 PM PST by SandRat
[ Post Reply | Private Reply | View Replies ]


To: 2LT Radix jr; 68-69TonkinGulfYachtClub; 80 Square Miles; A Ruckus of Dogs; acad1228; AirForceMom; ..

Anyone want to guess how long it takes the ACLU/AmNasty International to cry; "Your Invading their Right to Privacy and Compelling them to Give Evidence in violation of their rights!!!"??????


2 posted on 03/13/2006 4:16:50 PM PST by SandRat (Duty, Honor, Country. What else needs to be said?)
[ Post Reply | Private Reply | To 1 | View Replies ]

This is Applied Digital Solutions. They are the ones that came out with the chips being used for NAIS

More on NAIS:
http://www.freerepublic.com/focus/keyword?k=tagging

http://biometrics.cse.msu.edu/icprareareviewtalk.pdf


Biometrics: A Grand Challenge

Anil K. Jain, Sharath Pankanti, Salil Prabhakar,
Lin Hong, Arun Ross, and James L. Wayman
Michigan State University, IBM T. J. Watson Research Center, DigitalPersona Inc.,
Siemens Corporate Research, West Virginia University, San Jose State University
http://biometrics.cse.msu.edu

Person Identification
• Identifying fellow human beings has been crucial
to the fabric of human society
• In the early days of civilization, people lived in
small communities and everyone knew each other
• With the population growth and increase in
mobility, we started relying on documents and
secrets to establish identity
• Person identification is now an integral part of the
infrastructure needed for diverse business sectors
such as banking, border control, law enforcement..

Identification Problems
Security Threats:
We now live in a global society of increasingly desperate
and dangerous people whom we can no longer trust
based on identification documents which may have been
compromised
Senator? Terrorist? A Watch List Stops Kennedy at
Airport:
Senator Edward M. Kennedy, Democrat of Mass., discussed the problems faced by ordinary citizens mistakenly placed on terrorist watch lists. Between March 1 and April 6,
airline agents tried to block Mr. Kennedy from boarding airplanes on five occasions because his name resembled an alias used by a suspected terrorist who had been barred from flying on airlines in the United States.
RACHEL L. SWARNS,NY Times,Aug 20, 2004

Identification Problems
Identity Theft:
Identity thieves steal PIN (e.g., date of
birth) to open credit card accounts, withdraw money from
accounts and take out loans 3.3 million identity thefts in U.S. in 2002; 6.7 million victims of credit card fraud Surrogate representations of identity such as passwords and ID cards no longer suffice

Too Many Passwords to Remember!
• Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file.
(2002 NTA Monitor Password Survey)

Biometrics
Automatic recognition of people based on their distinctive
anatomical (e.g., face, fingerprint, iris, retina, hand geometry) and behavioral (e.g., signature, gait) characteristics recognition of a person by their body, then linking that body to an externally established “identity”, forms a very powerful tool
John Smith

Biometric Functionalities
• Positive Identification
Is this person truly known to the system?
Provide log-in access to a valid user
• Large Scale Identification
Is this person in the database?
Prevent issuing multiple driver licenses to the same person
• Screening
Is this a wanted person?
Airport watch-list
Query image
(Vincent)
Template image
(Vincent)
Vincent
XG
Dennis
Ross
Silviu
Kim
Query image
Only biometrics can provide negative
identification (i.e., I am not he) capability


Biometrics: A Killer P.R. Application
• A Challenging Pattern Recognition Problem
• Enabling Technology to make our society safer,
reduce fraud and offer user convenience (user-
friendly man-machine interface)
• Policy-makers worldwide concede this is one of the
crucial components of reliable person identification
• Given its unique capability of identifying persons
based on their intrinsic characteristics, it will emerge
as a pervasive tool for personal identification

Biometrics: A Grand Challenge
“A fundamental problem in science and engineering with
broad economic and scientific Impact”
Accuracy
Scale
Usability
Unusable
Hard to Use
Easy to Use
Transparent to User
10
1
10
3
10
5
10
7
90%
99%
99.99%
99.999%
The grand challenge is to design a biometric system that
would operate on the extremes of all these three axes
simultaneously


As part of the enhanced procedures, most visitors traveling on visas will have two fingerprints scanned by an inkless device and a digital photograph taken. All of the
data and information is then used to assist the border inspector in determining whether or not to admit the traveler.
These enhanced procedures will add only seconds to the visitor’s overall processing time.
(DHS US-VISIT web-site)
The electronic fingerprint scanner will allow inspectors to
check identities of visitors against those on terrorist watch lists. (Stephen J. Boitano, AP)
There are 500 million border crossings/year (each way) in the U.S.

Want to Charge It?
Beepcard, a company in California, has designed a
credit card that works only when it recognizes the
voice of its rightful owner
Enclosed in the card is a tiny microphone, a loudspeaker and a speech recognition chip that compares the spoken password with a recorded sample.
Total credit card fraud amounts to billions of dollars every year


Point of sale
Secure multimedia

Biometric Applications
Disney World
Haj pilgrims in Saudi Arabia
URL at your fingertip
Mobile phone
Iris-based ATM
Sharbat Gula in 1985, 1992


Biometrics is Not New!
• Bertillon system (1882) took subject's photograph, and recorded height, the length of one foot, an arm and index finger
• Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900
• FBI set up a fingerprint identification division in 1924
• AFIS installed in 1965 with a database of 810,000 fingerprints
• First face recognition paper published in 1971 (Goldstein et al.)
• FBI installed IAFIS in 2000 with a database of 47 million 10 prints; average of 50,000 searches per day; 15% of searches are in lights out mode. 2 hour response time for criminal search
Emphasis now is to automatically perform reliable person
identification in unattended mode, often remotely (or at a distance)



Biometric Market Growth
International Biometric Group

Why is Biometrics so Difficult?
• Intra-class variability and inter-class similarity
• Segmentation
• Noisy input & population coverage
• System performance (error rate, speed, cost)
• Individuality of biometric characteristics
• Fusion of multiple biometric attributes
• Scalability
• Attacks on the biometric system
• Privacy Issues


Intra-class and Inter-class Variations
Variability observed in the face image of a single person due to change in pose, expression, lighting and eye glasses
Faces that look similar
R.-L. Hsu, “Face Detection and Modeling for Recognition”, Ph.D. Thesis, 2002

Recognizing the Smile
Home Office prohibits happy biometric passports
• The Home Office says all new passport photographs must be of an unsmiling face with its gob firmly shut because open mouths can confuse facial recognition systems.
• The new guidelines state that photographs must have a strong definition between the face and background; be of the full face facing straight at the camera; show no shadows, and that subjects must have "a neutral expression, with your mouth closed".
• A Sun report confidently tells its readers that "immigration Service officials will run the passport through scanners which will cross-check them against worldwide crime memory banks" and that "the 'biometric' tests ensure that people cannot use stolen or fake documents".
- Lucy Sherriff, The Register, Aug. 6, 2004


Sensor Interoperability
• Sensors used during enrollment and verification may be different

Noisy Images
• 3
poor quality fingerprint images
Four impressions of a user’s fingerprint


Segmentation: Face Detection
*Theo Pavlidis, http://home.att.net/t.pavlidis/comphumans/comphuman.htm


“State-of-the-art” Error Rates
Test
Test
Parameter
False
Reject Rate
False
Accept Rate
Fingerprint
FVC
[2004]
20 years
(average age)
2%
2%
Face
FRVT
[2002]
Varied lighting,
outdoor/indoor
10%
1%
Voice
NIST
[2000]
Text
Independent
10-20%
2-5%
At NY airports, an average of 200,000 passengers pass through daily. If all of these used biometric-authenticated smart cards for identification, there would be 4000 falsely rejected (and inconvenienced) passengers per day for fingerprints, 20,000 for face and 30,000 for voice. Similar
numbers can be computed for false accepts

FVC 2004 Results
Algoritm EER (%)
Avg Enroll
Time (sec)
Avg
Match
Time
(sec)
Avg Model
Size (KB)
Bioscrypt
Inc.
2.07
0.08
1.48
2.07
0.67
0.71
1.19
24
Sonda Ltd
2.10
2.07
1.3
Chinese Academy of Sciences
2.30
0.35
16.4
Gevarius
2.45
0.69
2.0
Jan Lunter
2.90
1.01
3.1
• Database:
– DB1: optical sensor "V300" by CrossMatch
– DB2: optical sensor "U.are.U 4000" by Digital Persona
– DB3: thermal sweeping sensor "FingerChip FCD4B14CB" by Atmel
– DB4: synthetic fingerprints


Typical Intrinsic Matcher (1:1)
Performance Requirements
Typical Intrinsic Matcher (1:1)
Performance Requirements
Functionality
FNMR %
FMR %
Authentication
0.1
0.1
Large Scale
Identification
10.0
0.0001
Screening
1.0
0.0001
It is assumed that large-scale identification consists of 1 million identities and screening involves 500 identities. FTA and FTE are assumed to be zero. These numbers are based on what the authors believe to be the order of magnitude
estimate of the performance needed for viability of a typical application.


• Given an input fingerprint with n minutiae, compute the
probability that it will share q minutiae with any other
template fingerprint containing m minutiae, p(M, m, n, q).
The corresponding minutiae should “match” in location and


Individuality of Fingerprints orientation.
(C)
(A)
(a) M=52
m=n=q=26
P = 2.40 x 10
-30
(b) M=52
m=n=26, q=10
P = 5.49 x 10
-4
*Pankanti, Prabhakar, Jain, "On the Individuality of Fingerprints", IEEE Transactions on
PAMI, Vol. 24, No. 8, pp. 1010-1025, 2002.


Multibiometrics

Limited discrimination and non-universality of a biometric
Face
Hand
geometry
Fingerprint
Helps improve accuracy and population coverage
Page 29
Fusing Face & Fingerprint Systems
Fusing Face & Fingerprint Systems
Min-Max
Normalization of
matching scores
Sum Rule
1000 Subjects
EER is reduced from 3% for the best individual matcher to <1% for multimodal system



Soft Biometrics
Eye color
Gender, Skin Color, Hair color
Height
http://ology.amnh.org/genetics/longdefinition/index3.html
© American Museum of Natural History, 2001
http://anthro.palomar.edu/adapt/adapt_4.htm
© Corel Corporation, Ottawa, Canada
http://www.altonweb.com/history/wadlow/p2.html
© Alton Museum of History and Art
http://www.laurel-and-hardy.com/
goodies/home6.html © CCA
Weight


Identification at a Distance
Height: 5.9 ft.
Eye color: black
Gender: Male
Ethnicity: Asian
Face: LDA Coefficients
Identity: Unsang

Scalability of Biometric Systems
• How does the number of identities in the database affect the
speed and accuracy of the system?
• Few published studies on reliable indexing of biometric patterns

Fingerprint Classification

• Assign fingerprints into one of pre-specified types (coarse
classification for indexing);
• Best 4-class performance is only 95%
Plain Arch
Tented Arch
Right Loop
Left Loop
Plain Whorl
Accidental
Pocket Whorl
Double Loop


Vulnerability of a Biometric System
Like any system, biometric systems can be attacked in different ways
Ratha et al., An Analysis of Minutiae Strength, AVBPA 2001
Fake Biometric
Replay old data
Override feature extractor
Synthesized feature vector
Override matcher
Modify template
Intercept the channel
Override final decision
Liveness detection


Template Protection
• Encrypting or watermarking templates in the database
• Storing only a transformed and unrecoverable version of a
user’s template to protect the original template
• Cancelable biometric
Jain,Uludag, Hsu, "Hiding a Face in a Fingerprint Image", Proc. of ICPR, Aug., 2002
Ratha, Connell, Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, vol. 40,
no. 3, 2001, pp. 614-634.
©
Ratha, Connell, Bolle (IBM)


Biometric Enabled Smart Card
• Template resides in the personal smart card of a user
• Verification takes place via a built-in chip on the card
• Template does not leave the card; no centralized biometric
database is required
Siemens Matcher on Card
Version 1.1
Precise Biometrics
5th
Sense from Veridicom

Privacy Concerns
• Biometric can help in protecting individual privacy; because biometrics provides stronger identification than password, it can be used to guard personal & sensitive information (Health Information Privacy Protection Act)
• Will biometric data be used to track people (secretly) violating their right to privacy?
• Functionality creep: Will biometric data be used only for their intended purpose? Will various biometric databases be “linked”?


Religious/Cultural Objections
© Orlando Sentinel
This is no different than acceptance of some other technologies

Summary

• Reliable and automatic person identification is becoming
a necessity; emerging applications include national ID
card, border crossing, access control Internet shopping,
and computer data security
• There is no substitute to biometrics for effective person
identification; it is becoming a necessary component of
any ID management system
• Biometric sensors are cheap; fingerprint, face and voice
sensors are available in laptops & mobile phones
• But, biometric system performance is not meeting the
expectations

Summary
• Research is needed in (i) new representations, (ii)
matching algorithms, (iii) database indexing, (iv)
fusion of biometric modalities, (v) liveness detection,
(vi) template protection, (vi) error rate estimation
• Need more system testing and evaluation on large
standardized databases
• Biometrics has great potential to improve our privacy,
but government regulations are needed
• No security system, including biometric system, is
foolproof
• Need cost/benefit analysis for the deployment of
biometric systems; quantifying deterrence has proved
extremely difficult

Future Directions
• User Adaptation
– Observing how the user interacts with the biometric device (e.g., user approaching a hand geometry device)
• Soft Biometrics
– Utilize soft biometric traits like color of eye, color of hair, gender to reinforce identity
• Tracking
– Monitor user behavior over an entire session (e.g., not just at login time) in order to validate identity



Applied Digital Solutions new "Verichip" about the size
of a grain of rice, is the first-ever computer ID chip,
that could be embedded beneath a persons skin.
Yahoo! News 27 Feb ’02

Verichip
(AP Photo/Applied Digital Solutions)


3 posted on 03/13/2006 7:20:54 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: RedBloodedAmerican

ping


6 posted on 03/13/2006 7:26:10 PM PST by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SandRat
They should be collecting DNA from inside the female organs of camels and goats.

Why are camels called the "Ships of the Desert"????

Because they are full of Iranian Sea men.

8 posted on 03/13/2006 7:30:04 PM PST by HP8753 (My cat loves watching "When Animals Attack")
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson