66
An Introduction to Biometric Recognition Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, IEEE Transactions on Circuits and Systems for Video Technologies, vol. 14, no. 1, Jan. 2004 Multimedia Security

An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

Embed Size (px)

Citation preview

Page 1: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

An Introduction to Biometric

RecognitionAnil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE,

IEEE Transactions on Circuits and Systems for Video Technologies, vol. 14, no. 1, Jan. 2004

Multimedia Security

Page 2: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

2

Outline (1/2)

• Part Ⅰ. Introduction

• Part Ⅱ. Biometric System

• Part Ⅲ. Biometric System Errors

• Part Ⅳ. Comparison of Various Biometrics

• Part Ⅴ. Application of Biometric Systems

Page 3: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

3

Outline (2/2)

• Part Ⅵ. Advantage and Disadvantage of

Biometrics

• Part Ⅶ. Limitation of (Unimodal) Biometric

Systems

• Part Ⅷ. Multimodal Biometric Systems

• Part Ⅸ. Social Acceptance and Privacy

Issues

Page 4: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

4

Ⅰ. Introduction (1/5)

• The term biometric comes from the Greek

words bios (life) and metrikos (measure).

• Biometrics – individuals’ physiological

and/or behavioral characteristics.

Page 5: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

5

Ⅰ. Introduction (2/5)

• Biometric Recognition

– “who she is” vs. “what she possesses”

Page 6: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

6

Ⅰ. Introduction (3/5)

• What biological measurements qualify to

be a biometric?

a) Universality

b) Distinctiveness

c) Permanence

d) Collectability

Page 7: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

7

Ⅰ. Introduction (4/5)

• In a practical biometric system, there are

a number of other issues that should be

considered…

a) Performance

b) Acceptability

c) Circumvention

Page 8: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

8

Ⅰ. Introduction (5/5)

In conclusion, the system should meet…

a) Accuracy

b) Speed

c) Resource requirement

d) Be harmless to the users

e) Be accepted by the intended population

f) Be sufficient robust to various attack

Page 9: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

9

Ⅱ. Biometric System (1/10)

• A biometric system is essentially a pattern

recognition system.

Page 10: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

10

Ⅱ. Biometric System (2/10)

• A biometric system is designed using the following four main modules.

1) Sensor module(encapsulating a quality checking module)

2) Feature module

3) Matcher module (encapsulating a decision making module)

4) System database module

Page 11: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

11

Ⅱ. Biometric System (3/10)

A sample flow chart:

FeatureExtractor

Sensor

Qualifychecker

SystemDatabase

True / False

Matcher

DecisionMaker

template

The templates in the system databasemay be updated over time.

Page 12: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

12

Ⅱ. Biometric System (4/10)

• A biometric system may operate either in

verification mode or identification mode.

a) Verification mode:“Does this biometric data belong to Bob? ”

b) Identification mode:“Whose biometric data is this? ”

Page 13: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

13

Ⅱ. Biometric System (5/10)

SystemDatabase

LoginInterface

Get Name & Snapshot

QualityChecker

Check Quality

FeatureExtractor

Enrollment

Template

Page 14: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

14

Ⅱ. Biometric System (6/10)

SystemDatabase

True / False

LoginInterface

Get Name & SnapshotOne template

FeatureExtractor

Extract Features

Matcher

One match

Verification

Claimed identity

Page 15: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

15

Ⅱ. Biometric System (7/10)

SystemDatabase

User’s identity or“user unidentified”

LoginInterface

Get Name & SnapshotN templates

FeatureExtractor

Extract Features

Matcher

N match

Identification

Page 16: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

16

Ⅱ. Biometric System (8/10)

• “Recognition” is the generic term of

verification and identification.

• We do not make a distinction between

verification and identification.

Page 17: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

17

Ⅱ. Biometric System (9/10)

Describing the verification problem:

a) An input feature vector: XQ

b) A claimed identity: I

c) The biometric template corresponding to I : XI

d) The similarity between XQ and XI: S(XQ, XI)

e) The predefined threshold of similarity: t

f) True (a genuine user): ω1 ; False (an imposter): ω2

otherwise

),(S if

,2

,1),(

tXX

ω

ωXI

IQ

Q

Page 18: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

18

Ⅱ. Biometric System (10/10)

The identification problem…a) The identity enrolled in the system: Ik, k=1, 2,…, N

b) The reject case: IN+1

c) The biometric template corresponding to Ik : XIk

otherwise

,,2,1,)},(Sax{ if

,

,

1

NktXXm

I

IX kIQ

N

k

Q

Page 19: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

19

Ⅲ. Biometric System Errors (1/9)

• A biometric verification system makes two types of errors:

1) mistaking biometric measurements from two different persons to be from the same person (called false match)

2) mistaking two biometric measurements from the same person to be from two different persons (called false non-match)

Page 20: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

20

Ⅲ. Biometric System Errors (2/9)

Hypothesis testing:

1) H0: input XQ does not come from the

same person as the template XI

2) H1: input XQ comes from the same

person as the template XI

Page 21: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

21

Ⅲ. Biometric System Errors (3/9)

If S (XQ , XI) ≧ t , then decide D1 , else decide D0 .

Decision:

D0: person is not who she claims to be

D1: person is who she claims to be.

Page 22: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

22

Ⅲ. Biometric System Errors (4/9)

• Such a hypothesis testing formulation

contains two type of error:

• Type Ⅰ(α): false match (D1, when H0)

• Type Ⅱ(β): false non-match (D0, when H1)

FMR is the probability of Type I errorFNMR is the probability of Type II error

Page 23: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

23

Ⅲ. Biometric System Errors (5/9)

DecisionThreshold (t )

Matching Score (s )

Pro

babili

ty (

p)

∞-∞

ImposterDistribution

p (s|H0)

GenuineDistribution

p (s|H1)

FNMR = P (D0|H1) FMR = P (D1|H0)

Page 24: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

24

Ⅲ. Biometric System Errors (6/9)

The errors in identification mode:

FMRN: the identification false match rate

FNMRN: the identification false non-match rate

• FMRN = 1 – (1 – FMR)N ~ N × FMR

• FNMRN ~ FNMR

Page 25: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

25

Ⅲ. Biometric System Errors (7/9)

• Some situation may lead to following

formulation of FMRN and FNMRN.

a) FNMRN = RER + (1 - RER) × FNMRRER: retrieval error rate

b) FMRN = 1 – (1 – FMR)N×P

P: the average percentage of database searched

during the identification

Page 26: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

26

Ⅲ. Biometric System Errors (8/9)

False Non-match Rate (FNMR)

Fals

e M

atc

h R

ate

(FM

R)

ForensicApplications

High-securityApplications

CivilianApplications

Page 27: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

27

Ⅲ. Biometric System Errors (9/9)

• Important specifications in a biometric

system:

1) FMR: false match rate

2) FNMR: false non-match rate

3) FTC: failure to capture (e.g., a faint fingerprint)

4) FTE: failure to enroll

Page 28: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

28

Ⅳ. Comparison of Various

Biometrics (1/10)

• Each biometric has its strengths and

weaknesses.

• No biometric is “optimal”.

• A brief introduction of the commonly used

biometrics is given below…

Page 29: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

29

Ⅳ. Comparison of Various

Biometrics (2/10)

DNA

– 1-D ultimate unique code

– identical twins have identical DNA patterns

– contamination and sensitivity

– automatic real-time recognition issues

– privacy issues

Ears

– The shape of the ear

– the structure of the cartilaginous tissue of the pinna

Page 30: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

30

Ⅳ. Comparison of Various

Biometrics (3/10)

Face - Also used by humans

1) the location and shape of facial attributes

2) the overall analysis of the face image

Requiring a simple background and illumination

In practice, …

– Detect the face

– Locate the face

– Recognize the face

Page 31: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

31

Ⅳ. Comparison of Various

Biometrics (4/10)

Facial, hand, and hand vein infrared thermogram

– A thermogram-based system does not require

contact and is non-invasive

– Infrared sensors are prohibitively expensive

手掌靜脈辨識系統資料來源:FUJITSU, Taiwan

Page 32: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

32

Ⅳ. Comparison of Various

Biometrics (5/10)

Fingerprint

– A fingerprint scanner costs about US $20

– Single vs. Multiple

Page 33: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

33

Ⅳ. Comparison of Various

Biometrics (6/10)

Gait

Hand and finger

Geometry

Page 34: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

34

Ⅳ. Comparison of Various

Biometrics (7/10)

Iris– stabilize during the first two years of life

– the irises of identical twins are different

– extremely difficult to surgically tamper the texture of

the iris

Page 35: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

35

Ⅳ. Comparison of Various

Biometrics (8/10)

Keystroke

Odor

Palmprint

Page 36: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

36

Ⅳ. Comparison of Various

Biometrics (9/10)

Retinal scan

– the most secure biometric

– reveal some medical conditions

Signature

– professional forgers may be able to reproduce signatures that fool the system

Voice

– a combination of physiological and behavioral biometrics

Page 37: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

37

Ⅳ. Comparison of Various

Biometrics (10/10)

Page 38: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

38

Ⅴ. Application of Biometric

Systems (1/3)

• The application of biometric can be

divided into three main groups:

1) CommercialATM, credit card, cellular phone, distance learning, etc.

2) GovernmentID card, driver’s license, social security, passport control, etc.

3) Forensicterrorist identification, missing children, etc.

Page 39: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

39

Ⅴ. Application of Biometric

Systems (2/3)

Page 40: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

40

Ⅴ. Application of Biometric

Systems (3/3)

250.9

399.5

523.9

729.1

1049.6

1440.6

1905.4

0

200

400

600

800

1000

1200

1400

1600

1800

2000

1999 2000 2001 2002 2003 2004 2005

SOURCE: The `123' of Biometric Technology

REVEN

UE (

US$m

)

Page 41: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

41

Ⅵ. Advantage and Disadvantage of

Biometrics (1/2)

Advantage

• All the users of the system have equal

security level.

• Between 20% and 50% of all help desk

calls are for password resets.

Page 42: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

42

Ⅵ. Advantage and Disadvantage of

Biometrics (2/2)

Disadvantage

• Speed is perceived as the biggest problem.

• FMR will increase when scaling up an

identification application.

Page 43: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

43

Ⅶ. Limitation of (Unimodal)

Biometric Systems (1/2)

1) Noise in sensed data

2) Intra-class variations

Page 44: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

44

Ⅶ. Limitation of (Unimodal)

Biometric Systems (2/2)

3) Distinctivenesse.g. Hand geometry, face, etc.

4) Non-universality

5) Spoof attacks

Page 45: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

45

Ⅷ. Multimodal Biometric Systems

(1/19)

Data Fusion Level of Fusion

a) Fusion at Sensor level

b) Fusion at Feature level

c) Fusion at Opinion level

d) Fusion at Decision level

Page 46: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

46

Ⅷ. Multimodal Biometric Systems

(2/19)

decision

FeatureExtraction

Biometricsnapshot

MatchingDecisionMaking

FeatureExtraction

Biometricsnapshot

Fusion

SystemDatabase

features

features

Page 47: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

47

Ⅷ. Multimodal Biometric Systems

(3/19)

• This combination strategy is usually done

by a concatenation of the feature vectors

extracted by each feature extractors.

• This yields an extended size vector set.

Page 48: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

48

Ⅷ. Multimodal Biometric Systems

(4/19)

Two drawbacks:

1) There is little control over the contribution

of each vector component on the result.

2) Both feature extractors should provide

identical vector rates.

Page 49: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

49

Ⅷ. Multimodal Biometric Systems

(5/19)

• Although it is a common belief that the

earlier the combination is done, the better

result is achieved, state-of-the-art data

fusion relies mainly on the opinion and

decision level.

Page 50: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

50

Ⅷ. Multimodal Biometric Systems

(6/19)

decision

FeatureExtraction

Biometricsnapshot Matching

DecisionMaking

FeatureExtraction

Biometricsnapshot

FusionSystemDatabase

Matching

rank values

rank values

Page 51: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

51

Ⅷ. Multimodal Biometric Systems

(7/19)

• The score must be adjusted first:

( Normalization must be done. )

– The similarity measures must be converted

into distance measures.

– The score generated by each classifier must

have same range. [ex. 0-100]

Page 52: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

52

Ⅷ. Multimodal Biometric Systems

(8/19)

• The combination strategies can be

classified into three main groups:

– Fixed rules / equal weight

– Trained rules / unequal weight

– Adaptive rules / adaptive weight

Page 53: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

53

Ⅷ. Multimodal Biometric Systems

(9/19)

• The most popular schemes are:

– Weight sum

– Weight product

– Decision trees ( base on if-then-else )

Page 54: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

54

Ⅷ. Multimodal Biometric Systems

(10/19)

Classifier 1 Classifier 2 Classifier 3

Score1 > t1

Score2 > t2

Score3 > t3 False True

Yes

Yes Yes

No

No No

NoYes

Score2 > t2

False

False True

Page 55: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

55

Ⅷ. Multimodal Biometric Systems

(11/19)

decision

FeatureExtraction

Biometricsnapshot Matching

FusionSystemDatabase

Matching

DecisionMaking

DecisionMaking

FeatureExtraction

Biometricsnapshot

decision

decision

Page 56: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

56

Ⅷ. Multimodal Biometric Systems

(12/19)

• In this last case, the Borda count method

can be used for combining the classifiers’

outputs.

• This approach overcomes the scores

normalization that was mandatory for the

opinion fusion level.

Page 57: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

57

Ⅷ. Multimodal Biometric Systems

(13/19)

Classifier 1

Classifier 2

Classifier 3

class 2

class 1

class 3

class 1

class 2

class 3

class 2

class 3

class 1

class 2=2

class 1=1

class 3=0

class 1=2

class 2=1

class 3=0

class 2=2

class 3=1

class 1=0

class 2=5

class 1=3

class 3=1

Page 58: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

58

Ⅷ. Multimodal Biometric Systems

(14/19)

• One problem that appears with decision

level fusion is the possibility of ties.

• For verification applications, at least three

classifiers are needed.

Page 59: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

59

Ⅷ. Multimodal Biometric Systems

(15/19)

• An important combination scheme at the

decision level is the serial and parallel

combination, also known as “AND” and

“OR” combination.

System 1 System 2

System 1

System 2

Page 60: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

60

Ⅷ. Multimodal Biometric Systems

(16/19)

• The AND combination improves the False

Acceptance Ratio.

• The OR combination improves the False

Rejection Ratio.

Page 61: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

61

Ⅷ. Multimodal Biometric Systems

(17/19)

MultimodalBiometrics

Multiplematchers

Multiplesnapshots

Multipleunits

Multiplebiometrics

Multiplesensors

right index &middle fingers

optical &capacitance

sensors

minutiae &non-minutiae

based matchers

face &fingerprint

two attempts ofright index finger

Page 62: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

62

Ⅷ. Multimodal Biometric Systems

(18/19)

Example of Multimodal Biometric Systems

“Person Identification Using Multiple Cues” Face, Voice

“Expert Conciliation for Multimodal Person Authentication Systems using Bayesian Statistics” Face, Speech

“Integrating Faces and Fingerprints for Personal Identification” Face, fingerprint

“Personal Verification using Palmprint and Hand Geometry Biometric” Palmprint and Hand Geometry

“Bioid: A Multimodal Biometric Identification System” voice, lip motion, face

Page 63: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

63

Ⅷ. Multimodal Biometric Systems

(19/19)

• A combination of uncorrelated modalities

is expected to result in a better

improvement in performance.

• A combination of uncorrelated modalities

can significantly reduce the FTE.

• However, the cost of the system may

increase and the system may cause

inconvenience.

Page 64: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

64

Ⅸ. Social Acceptance and Privacy

Issues (1/3)

Social Acceptance

• The ease and comfort in interaction with a

biometric system contribute to its

acceptance.

• Biometric characteristics captured without

the knowledge of the user is perceived as

a threat to privacy by many individuals.

Page 65: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

65

Ⅸ. Social Acceptance and Privacy

Issues (2/3)

Privacy Issues

• Biometrics can be used as one of the most

effective means for protecting individual

privacy.

• Biometric characteristics may provide

additional information about the

background of an individual.

Page 66: An Introduction to Biometric Recognition - 國立臺灣 …cmlab.csie.ntu.edu.tw/~ipr/mmsec2008/data/lecture/Lecture12 - An...An Introduction to Biometric Recognition Anil K. Jain,

66

Ⅸ. Social Acceptance and Privacy

Issues (3/3)

• Legislation is necessary to ensure that

such information remains private and that

its misuse is appropriately punished.

• Most of the commercial biometric systems

available today store a template in an

encrypted format.