Anyone want to guess how long it takes the ACLU/AmNasty International to cry; "Your Invading their Right to Privacy and Compelling them to Give Evidence in violation of their rights!!!"??????
This is Applied Digital Solutions. They are the ones that came out with the chips being used for NAIS
More on NAIS:
http://www.freerepublic.com/focus/keyword?k=tagging
http://biometrics.cse.msu.edu/icprareareviewtalk.pdf
Biometrics: A Grand Challenge
Anil K. Jain, Sharath Pankanti, Salil Prabhakar,
Lin Hong, Arun Ross, and James L. Wayman
Michigan State University, IBM T. J. Watson Research Center, DigitalPersona Inc.,
Siemens Corporate Research, West Virginia University, San Jose State University
http://biometrics.cse.msu.edu
Person Identification
Identifying fellow human beings has been crucial
to the fabric of human society
In the early days of civilization, people lived in
small communities and everyone knew each other
With the population growth and increase in
mobility, we started relying on documents and
secrets to establish identity
Person identification is now an integral part of the
infrastructure needed for diverse business sectors
such as banking, border control, law enforcement..
Identification Problems
Security Threats:
We now live in a global society of increasingly desperate
and dangerous people whom we can no longer trust
based on identification documents which may have been
compromised
Senator? Terrorist? A Watch List Stops Kennedy at
Airport:
Senator Edward M. Kennedy, Democrat of Mass., discussed the problems faced by ordinary citizens mistakenly placed on terrorist watch lists. Between March 1 and April 6,
airline agents tried to block Mr. Kennedy from boarding airplanes on five occasions because his name resembled an alias used by a suspected terrorist who had been barred from flying on airlines in the United States.
RACHEL L. SWARNS,NY Times,Aug 20, 2004
Identification Problems
Identity Theft:
Identity thieves steal PIN (e.g., date of
birth) to open credit card accounts, withdraw money from
accounts and take out loans 3.3 million identity thefts in U.S. in 2002; 6.7 million victims of credit card fraud Surrogate representations of identity such as passwords and ID cards no longer suffice
Too Many Passwords to Remember!
Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file.
(2002 NTA Monitor Password Survey)
Biometrics
Automatic recognition of people based on their distinctive
anatomical (e.g., face, fingerprint, iris, retina, hand geometry) and behavioral (e.g., signature, gait) characteristics recognition of a person by their body, then linking that body to an externally established identity, forms a very powerful tool
John Smith
Biometric Functionalities
Positive Identification
Is this person truly known to the system?
Provide log-in access to a valid user
Large Scale Identification
Is this person in the database?
Prevent issuing multiple driver licenses to the same person
Screening
Is this a wanted person?
Airport watch-list
Query image
(Vincent)
Template image
(Vincent)
Vincent
XG
Dennis
Ross
Silviu
Kim
Query image
Only biometrics can provide negative
identification (i.e., I am not he) capability
Biometrics: A Killer P.R. Application
A Challenging Pattern Recognition Problem
Enabling Technology to make our society safer,
reduce fraud and offer user convenience (user-
friendly man-machine interface)
Policy-makers worldwide concede this is one of the
crucial components of reliable person identification
Given its unique capability of identifying persons
based on their intrinsic characteristics, it will emerge
as a pervasive tool for personal identification
Biometrics: A Grand Challenge
A fundamental problem in science and engineering with
broad economic and scientific Impact
Accuracy
Scale
Usability
Unusable
Hard to Use
Easy to Use
Transparent to User
10
1
10
3
10
5
10
7
90%
99%
99.99%
99.999%
The grand challenge is to design a biometric system that
would operate on the extremes of all these three axes
simultaneously
As part of the enhanced procedures, most visitors traveling on visas will have two fingerprints scanned by an inkless device and a digital photograph taken. All of the
data and information is then used to assist the border inspector in determining whether or not to admit the traveler.
These enhanced procedures will add only seconds to the visitors overall processing time.
(DHS US-VISIT web-site)
The electronic fingerprint scanner will allow inspectors to
check identities of visitors against those on terrorist watch lists. (Stephen J. Boitano, AP)
There are 500 million border crossings/year (each way) in the U.S.
Want to Charge It?
Beepcard, a company in California, has designed a
credit card that works only when it recognizes the
voice of its rightful owner
Enclosed in the card is a tiny microphone, a loudspeaker and a speech recognition chip that compares the spoken password with a recorded sample.
Total credit card fraud amounts to billions of dollars every year
Point of sale
Secure multimedia
Biometric Applications
Disney World
Haj pilgrims in Saudi Arabia
URL at your fingertip
Mobile phone
Iris-based ATM
Sharbat Gula in 1985, 1992
Biometrics is Not New!
Bertillon system (1882) took subject's photograph, and recorded height, the length of one foot, an arm and index finger
Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900
FBI set up a fingerprint identification division in 1924
AFIS installed in 1965 with a database of 810,000 fingerprints
First face recognition paper published in 1971 (Goldstein et al.)
FBI installed IAFIS in 2000 with a database of 47 million 10 prints; average of 50,000 searches per day; 15% of searches are in lights out mode. 2 hour response time for criminal search
Emphasis now is to automatically perform reliable person
identification in unattended mode, often remotely (or at a distance)
Biometric Market Growth
International Biometric Group
Why is Biometrics so Difficult?
Intra-class variability and inter-class similarity
Segmentation
Noisy input & population coverage
System performance (error rate, speed, cost)
Individuality of biometric characteristics
Fusion of multiple biometric attributes
Scalability
Attacks on the biometric system
Privacy Issues
Intra-class and Inter-class Variations
Variability observed in the face image of a single person due to change in pose, expression, lighting and eye glasses
Faces that look similar
R.-L. Hsu, Face Detection and Modeling for Recognition, Ph.D. Thesis, 2002
Recognizing the Smile
Home Office prohibits happy biometric passports
The Home Office says all new passport photographs must be of an unsmiling face with its gob firmly shut because open mouths can confuse facial recognition systems.
The new guidelines state that photographs must have a strong definition between the face and background; be of the full face facing straight at the camera; show no shadows, and that subjects must have "a neutral expression, with your mouth closed".
A Sun report confidently tells its readers that "immigration Service officials will run the passport through scanners which will cross-check them against worldwide crime memory banks" and that "the 'biometric' tests ensure that people cannot use stolen or fake documents".
- Lucy Sherriff, The Register, Aug. 6, 2004
Sensor Interoperability
Sensors used during enrollment and verification may be different
Noisy Images
3
poor quality fingerprint images
Four impressions of a users fingerprint
Segmentation: Face Detection
*Theo Pavlidis, http://home.att.net/t.pavlidis/comphumans/comphuman.htm
State-of-the-art Error Rates
Test
Test
Parameter
False
Reject Rate
False
Accept Rate
Fingerprint
FVC
[2004]
20 years
(average age)
2%
2%
Face
FRVT
[2002]
Varied lighting,
outdoor/indoor
10%
1%
Voice
NIST
[2000]
Text
Independent
10-20%
2-5%
At NY airports, an average of 200,000 passengers pass through daily. If all of these used biometric-authenticated smart cards for identification, there would be 4000 falsely rejected (and inconvenienced) passengers per day for fingerprints, 20,000 for face and 30,000 for voice. Similar
numbers can be computed for false accepts
FVC 2004 Results
Algoritm EER (%)
Avg Enroll
Time (sec)
Avg
Match
Time
(sec)
Avg Model
Size (KB)
Bioscrypt
Inc.
2.07
0.08
1.48
2.07
0.67
0.71
1.19
24
Sonda Ltd
2.10
2.07
1.3
Chinese Academy of Sciences
2.30
0.35
16.4
Gevarius
2.45
0.69
2.0
Jan Lunter
2.90
1.01
3.1
Database:
DB1: optical sensor "V300" by CrossMatch
DB2: optical sensor "U.are.U 4000" by Digital Persona
DB3: thermal sweeping sensor "FingerChip FCD4B14CB" by Atmel
DB4: synthetic fingerprints
Typical Intrinsic Matcher (1:1)
Performance Requirements
Typical Intrinsic Matcher (1:1)
Performance Requirements
Functionality
FNMR %
FMR %
Authentication
0.1
0.1
Large Scale
Identification
10.0
0.0001
Screening
1.0
0.0001
It is assumed that large-scale identification consists of 1 million identities and screening involves 500 identities. FTA and FTE are assumed to be zero. These numbers are based on what the authors believe to be the order of magnitude
estimate of the performance needed for viability of a typical application.
Given an input fingerprint with n minutiae, compute the
probability that it will share q minutiae with any other
template fingerprint containing m minutiae, p(M, m, n, q).
The corresponding minutiae should match in location and
Individuality of Fingerprints orientation.
(C)
(A)
(a) M=52
m=n=q=26
P = 2.40 x 10
-30
(b) M=52
m=n=26, q=10
P = 5.49 x 10
-4
*Pankanti, Prabhakar, Jain, "On the Individuality of Fingerprints", IEEE Transactions on
PAMI, Vol. 24, No. 8, pp. 1010-1025, 2002.
Multibiometrics
Limited discrimination and non-universality of a biometric
Face
Hand
geometry
Fingerprint
Helps improve accuracy and population coverage
Page 29
Fusing Face & Fingerprint Systems
Fusing Face & Fingerprint Systems
Min-Max
Normalization of
matching scores
Sum Rule
1000 Subjects
EER is reduced from 3% for the best individual matcher to <1% for multimodal system
Soft Biometrics
Eye color
Gender, Skin Color, Hair color
Height
http://ology.amnh.org/genetics/longdefinition/index3.html
© American Museum of Natural History, 2001
http://anthro.palomar.edu/adapt/adapt_4.htm
© Corel Corporation, Ottawa, Canada
http://www.altonweb.com/history/wadlow/p2.html
© Alton Museum of History and Art
http://www.laurel-and-hardy.com/
goodies/home6.html © CCA
Weight
Identification at a Distance
Height: 5.9 ft.
Eye color: black
Gender: Male
Ethnicity: Asian
Face: LDA Coefficients
Identity: Unsang
Scalability of Biometric Systems
How does the number of identities in the database affect the
speed and accuracy of the system?
Few published studies on reliable indexing of biometric patterns
Fingerprint Classification
Assign fingerprints into one of pre-specified types (coarse
classification for indexing);
Best 4-class performance is only 95%
Plain Arch
Tented Arch
Right Loop
Left Loop
Plain Whorl
Accidental
Pocket Whorl
Double Loop
Vulnerability of a Biometric System
Like any system, biometric systems can be attacked in different ways
Ratha et al., An Analysis of Minutiae Strength, AVBPA 2001
Fake Biometric
Replay old data
Override feature extractor
Synthesized feature vector
Override matcher
Modify template
Intercept the channel
Override final decision
Liveness detection
Template Protection
Encrypting or watermarking templates in the database
Storing only a transformed and unrecoverable version of a
users template to protect the original template
Cancelable biometric
Jain,Uludag, Hsu, "Hiding a Face in a Fingerprint Image", Proc. of ICPR, Aug., 2002
Ratha, Connell, Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40,
no. 3, 2001, pp. 614-634.
©
Ratha, Connell, Bolle (IBM)
Biometric Enabled Smart Card
Template resides in the personal smart card of a user
Verification takes place via a built-in chip on the card
Template does not leave the card; no centralized biometric
database is required
Siemens Matcher on Card
Version 1.1
Precise Biometrics
5th
Sense from Veridicom
Privacy Concerns
Biometric can help in protecting individual privacy; because biometrics provides stronger identification than password, it can be used to guard personal & sensitive information (Health Information Privacy Protection Act)
Will biometric data be used to track people (secretly) violating their right to privacy?
Functionality creep: Will biometric data be used only for their intended purpose? Will various biometric databases be linked?
Religious/Cultural Objections
© Orlando Sentinel
This is no different than acceptance of some other technologies
Summary
Reliable and automatic person identification is becoming
a necessity; emerging applications include national ID
card, border crossing, access control Internet shopping,
and computer data security
There is no substitute to biometrics for effective person
identification; it is becoming a necessary component of
any ID management system
Biometric sensors are cheap; fingerprint, face and voice
sensors are available in laptops & mobile phones
But, biometric system performance is not meeting the
expectations
Summary
Research is needed in (i) new representations, (ii)
matching algorithms, (iii) database indexing, (iv)
fusion of biometric modalities, (v) liveness detection,
(vi) template protection, (vi) error rate estimation
Need more system testing and evaluation on large
standardized databases
Biometrics has great potential to improve our privacy,
but government regulations are needed
No security system, including biometric system, is
foolproof
Need cost/benefit analysis for the deployment of
biometric systems; quantifying deterrence has proved
extremely difficult
Future Directions
User Adaptation
Observing how the user interacts with the biometric device (e.g., user approaching a hand geometry device)
Soft Biometrics
Utilize soft biometric traits like color of eye, color of hair, gender to reinforce identity
Tracking
Monitor user behavior over an entire session (e.g., not just at login time) in order to validate identity
Applied Digital Solutions new "Verichip" about the size
of a grain of rice, is the first-ever computer ID chip,
that could be embedded beneath a persons skin.
Yahoo! News 27 Feb 02
Verichip
(AP Photo/Applied Digital Solutions)
ping
Why are camels called the "Ships of the Desert"????
Because they are full of Iranian Sea men.