DOC PREVIEW
UCSD CSE 190 - Introduction

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1CSE190a Fall 06IntroductionBiometricsCSE 190-aLecture 1CSE190a Fall 06Who are you??CSE190a Fall 06How are people identified?• People are identified by three basic means:– Something they have (identity document or token)– Something they know (password, PIN)– Something they are (human body)CSE190a Fall 06Person IdentificationPerson Identification• Identifying fellow human beings has been crucial to the fabric of human society• In the early days of civilization, people lived in small communities and everyone knew each other• With the population growth and increase in mobility, we started relying on documents and secrets to establish identity• Person identification is now an integral part of the infrastructure needed for diverse business sectors such as banking, border control, law enforcement.CSE190a Fall 06Automatic IdentificationDifferent means of automatic identification:– Possession-based (credit card, smart card)• “something that you have”– Knowledge-based (password, PIN)• “something that you know”––Biometrics-based (biometric identifier)• “something about or produced by your physical make-up”CSE190a Fall 06Problems with Possesion- or Knowledge-based Approaches• Card may be lost, stolen or forgotten– Password or PIN may be forgotten or guessed by the imposters• –25% of people seem to write their PIN on their ATM card• Estimates of annual identity fraud damages:– $56.6 billion in credit card transactions in U.S. alone in 2005*• 0.25% of internet transactions revenues, 0.08% of off-line revenues– $1 billion in fraudulent cellular phone use– $3 billion in ATM withdrawals• The traditional approaches are unable to differentiate between an authorized person and an impostor* Spectrum July, 20062CSE190a Fall 06Identification ProblemsIdentification ProblemsIdentity Theft: Identity thieves steal PIN (e.g., date of birth) to open credit card accounts, withdraw money from accounts and take out loans3.3 million identity thefts in U.S. in 2002; 6.7 million victims of credit card fraudSurrogate representations of identity such as passwords and ID cards no longer sufficeCSE190a Fall 06Too Many Passwords to Remember!Too Many Passwords to Remember!• Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file. (2002 NTA Monitor Password Survey)CSE190a Fall 06What are Biometrics?• Biometrics – science, which deals with the automated recognition of individuals (or plants/animals) based on biological and behavioral characteristics– Scientific follow-on to Bertillon’s body measurements of the late 1800s• Biometry – mathematical and statistical analysis of biological data• Biometric system – a pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric)• Anthropometry–measurement techniques of human body and its specific parts – Forensic (judicial) anthropometry–identification of criminals by these measurement techniquesCSE190a Fall 06Why Biometrics?Why Biometrics?3.14159Security LevelSomething you haveSomething you knowSomething you areMethod(c) Jain04CSE190a Fall 06Mentioning the ObviousCSE190a Fall 06Requirements for an Ideal Biometric Identifier1. Universality– Every person should have the biometric characteristic2. Uniqueness– No two persons should be the same in terms of the biometric characteristic3. Permanence– The biometric characteristic should be invariant over time4. Collectability– The biometric characteristic should be measurable with some (practical) sensing device5. Acceptability– One would want to minimize the objections of the users to the measuring/collection of the biometric3CSE190a Fall 06What are possible biometrics?CSE190a Fall 06Identifiable Biometric Characteristics • Biological traces– DNA (DeoxyriboNucleic Acid), blood, saliva,etc.• Biological (physiological) characteristics– fingerprints, eye irises and retinas, hand palms and geometry, and facial geometry• Behavioral characteristics– dynamic signature, gait, keystroke dynamics, lip motion• Combined–voiceCSE190a Fall 06Biometrics is Not New!Biometrics is Not New!• Bertillon system (1882) took a subject's photograph, and recorded height, the length of one foot, an arm and index finger• Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900• FBI set up a fingerprint identification division in 1924• AFIS installed in 1965 with a database of 810,000 fingerprints• First face recognition paper published in 1971 (Goldstein et al.)• FBI installed IAFIS in ~2000 with a database of 47 million 10 prints; average of 50,000 searches per day; ~15% of searches are in lights out mode; 2 hour response time for criminal searchEmphasis now is to automatically perform reliable person identification in unattended mode, often remotely (or at a distance)(c) Jain 2004CSE190a Fall 06Bertillon SystemBertillon SystemThe Bertillon system (1882) entailed photographing the subject looking directly at the camera, then in profile, with the camera centred upon the right ear. Besides the two photographs, the subject's height was recorded, together with the length of one foot, an arm and index finger. http://www.tld.jcu.edu.au/hist/stats/bert/(c) Jain 2004CSE190a Fall 06Alphonse Bertillon: Forensic AnthropometryCSE190a Fall 06Popular Biometric Characteristics (modalities)(Details later)4CSE190a Fall 06Comparison of Biometric TechniquesCSE190a Fall 06Using BiometricsEnrollment, Verification RecognitionCSE190a Fall 06Enrollment• Enrollment– Person entered into the databaseCSE190a Fall 06Verification• Verification: Am I who I claim to be?– One to one camparisonCSE190a Fall 06Identification• Identification: Who am I?– One to many comparisonCSE190a Fall 06Total Biometrics Market5CSE190a Fall 06Different BiometricsCSE190a Fall 06DNA (Deoxyribo Nucleic Acid)The Ultimate Biometric• One-dimensional unique code for one’s individuality, but identical twins have identical DNA patterns• Issues limiting the utility of DNA•Contamination• Access• Automatic real-time recognition issues• Privacy issues: information about susceptibilities of a person to certain diseases could be gained from the DNA patternCSE190a Fall 06Behavioral vs Physical TraitsBehavioral vs Physical Traits• Physical


View Full Document

UCSD CSE 190 - Introduction

Documents in this Course
Tripwire

Tripwire

18 pages

Lecture

Lecture

36 pages

Load more
Download Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?