Introduction To Biometrics And Biometric Systems

2y ago
33 Views
2 Downloads
2.34 MB
21 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Fiona Harless
Transcription

Introduction to Biometricsand Biometric SystemsAccomplishing tomorrows training requirements today.

Terminal Learning Objective Action: Describe common Biometriccollection and processing systems andassociated equipment and capabilities. Condition: Given student handouts andclass notes. Standard: Describe current BiometricSystems, equipment, and capabilities.Accomplishing tomorrows training requirements today.2

Administrative Data Safety Requirements: None.Risk Assessment: Low.Environmental Conditions: None.Evaluation: Student Checks.Accomplishing tomorrows training requirements today.3

Agenda Overview of BiometricsHow Biometrics Supports Your MissionTactics, Techniques and ProceduresSummary and QuestionsAccomplishing tomorrows training requirements today.

How Does BiometricTechnology Support YourMission?(U) 15 March, Fingerprint Match Made.Initial Information given to NGIC by both the BiometricManagement Office-Biometric Fusion Center (BMO-BFC)and FBI-Terrorist Explosives Device AnalyticalCenter (TEDAC) Name:Ali Hasan, Makar Raheed DOB: 19700101 Date of Arrest: 20031126 Arrest Charge: Weapons FBI Case #: HQ-C1441327-1619F01009600Accomplishing tomorrows training requirements today.

Biometrics Defined Bio (life) Metrics (measurement)– Biometrics is the Measurement of Life 2 types of biometrics: Physiological andBehavioral Used to verify the identity or claimedidentity of an individualAccomplishing tomorrows training requirements today.

Current Biometric ModalitiesPhysiologicalBehavioral– Iris Scan– Signature– Finger and Palm Prints– Keystroke– Hand/Finger Geometry– SpeechRecognition– Vascular Imaging– Facial Recognition– Gait– Voice Pattern– Retina Scan– DNA– Odor, Earlobe, Sweatpore, LipsAccomplishing tomorrows training requirements today.

Origin of CurrentBiometric Systems Origin of Biometric Automated Toolset (BAT) and theHandheld Interagency Identity Detection Equipment(HIIDE): US Forces in Kosovo lacked ability to positively identify LocalNational Hires (LNH); a LNH could be fired but could go to adifferent camp and get re-hired.Biometrics Automated Toolset (BAT) introduced in Kosovo in2001. BAT provided a concrete identification means.HIIDE developed to provide an untethered, portable biometriccollection and identification platform. Fielded to Army Spring2007.BISA developed for Iraq to provide for a system ofidentifying, vetting, and tracking local national hires(LNH) and locally employed personnel (LEP).Accomplishing tomorrows training requirements today.

What is BAT? Software program Collect Biometric and other Identifying info Save biometrics and info to database Query and Search the database (currently 1.2 Mil and growing)Panasonic CF 73/74 Current Uses Anti-terrorism/Force ProtectionScreening (AT/FP) Detainee Operations Sensitive Site Exploitation Intelligence/High Value Target Border Control/Port of EntryOperations Population Census and Control Civil Military OperationsAccomplishing tomorrows training requirements today.

Three Biometrics Used by BATAccomplishing tomorrows training requirements today.

Iris Recognition BAT incorporates a handheld Iris RecognitionDevice developed by Securimetrics, Inc. Scalable and fast, capable of providing realtime responses. Extremely accurate identification with a FalseAcceptance Rate of: 1:1.2 million. Represents each iris as a small, 512-byte IrisCode. An average jpeg photograph is 1.6Mb or1,600,000 bytes.Accomplishing tomorrows training requirements today.

Fingerprint Recognition BAT incorporates a Fingerprint capture andidentification engine developed byNeurotechnilogija One of the oldest and most recognizable biometricmodalities. Extremely accurate identification. Searchable against FBI Automated FingerprintIdentification System (AFIS) database Searches on Flat and Rolled PrintsAccomplishing tomorrows training requirements today.

Facial Recognition The Biometrics Automated Toolset incorporates a Face RecognitionEngine developed by Lau Technologies, Inc. Ability to take photos from BAT and make 3D images Accuracy reduced by external variables such as light, distance fromthe subject and facial position. Represents faces as an extremely concise 128-byte “eigenface”template for minimal storage and improved search speed Used by the State Department to find duplicate visa applicants, bymotor vehicle divisions, by law enforcement agencies and inDepartment of Defense initiatives.Accomplishing tomorrows training requirements today.

Handheld Interagency IdentityDetection Equipment (HIIDE) Handheld, Tactical,Multi-modal, BiometricEnrollment andIdentification Device Tactical extension ofthe BiometricsAutomated Toolset(BAT)Accomplishing tomorrows training requirements today.

HIIDE System Description Collects Iris, Fingerprint, photograph and Biographical data Creates a “portfolio” that can be imported into the BAT systemas a digital dossier. Watch lists can be imported into HIIDE from BAT for on theobjective identification.Accomplishing tomorrows training requirements today.

Biometric IdentificationSystem for Access (BISA) Collects biometric dataand biographicalinformation from allvisitors Uses ID Badge andbiometric to ensureperson is who he/shesays they are Vetted against otherdatabases via NPRnetAccomplishing tomorrows training requirements today.

Biometric ArchitectureOther DODAgencies/COCOMSDetainees,LEPs, Personsof InterestLatentsMain ServerQatarBTF-West55,000,000 SIPRNETNIPRNETOtherBiometric dataDoD ABISAccomplishing tomorrows training requirements today.IAFIS

Your role incollecting Biometrics Ties a person to their biometrics, not just their name Eases Identification of foreigners/possible enemies Collects other Intelligence information Database accessible/searchable by many Allows identification at the tactical level Provides information for criminal prosecutionCaution:Data is only as reliable as the person who collected andentered it!Accomplishing tomorrows training requirements today.

Summary Biometrics defined Purpose of Biometrics Core biometric functions Origin of current systems and architecture Mission; Tactics, Techniques and Procedures Biometric Modalities and SystemsAccomplishing tomorrows training requirements today.

QuestionsAccomplishing tomorrows training requirements today.

TRAINING CERTIFICATEThis is to certify thathas completed the Introduction to Biometrics and Biometric Systems training.SignatureDate

Initial Information given to NGIC by both the Biometric Management Office-Biometric Fusion Center (BMO-BFC) . BISA developed for Iraq to provide for a system of identifying, vetting, and tracking local national hires . has completed the Introducti

Related Documents:

Biometric system using single biometric trait is referred to as Uni-modal biometric system. Unfortunately, recognition systems developed with single biometric trait suffers from noise, intra class similarity and spoof attacks. The rest of the paper is organized as follows. An overview of Multimodal biometric and its related work are discussed .

comparison techniques. Author revealed the story of iris recognition and biometrics comparison and provided the step by step detail about iris biometrics recognition and also elaborated the use of iris recognition and mentioned the key role played by it in daily life. Keywords Iris recognition, Biometrics, Comparison 1. INTRODUCTION

the definition of a biometric reference in Clause 3.3.1616 of ISO/IEC 2382-37:2017 [ISO2382-37]. A biometric template17 is indeed one example of such biometric reference, but in other applications like the ICAO 9303 compliant passport, the biometric reference is a biomet

concept of Self-Sovereign Biometric IDs (SelfIs), which are cancelable biometric templates fully man-aged by the user. 2) A novel machine learning ap-proach capable of extracting features from encoded cancelable bloomed biometric templates. 2.Motivation Our goal is to provide a way to use biometrics in a secure, privacy-first way, without .

Rate (FRR) of a biometric system. Inter-class variations- It occurs mainly between twins. It refers to the overlap of feature spaces corresponding to multiple individuals. Large inter-class variations increase the False Acceptance Rate (FAR) of a biometric system. Spoofing- A biometric system may be circumvented by presenting a fake biometric .

biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect na-ture of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for the digital rights management systems.

the specifics of biometric technology is available elsewhere.3 Biometric technology continues to advance, new biometric measures are under development, and existing technological restrictions may disappear. A biometric identifier may work today only under ideal conditions with bright lights, close proximity, and a cooperative data subject.

existing password system. There are numerous pros and cons of Biometric system that must be considered. 2 BIOMETRIC TECHNIQUES Jain et al. describe four operations stages of a Unit-modal biometric recognition system. Biometric data has acquisition. Data evaluation and feature extraction. Enrollment (first scan of a feature by a biometric reader,