11 CS1AC16 Biometrics
11 CS1AC16 Biometrics
Computer vision includes methods for the acquisition, processing, analysis and comprehension of
images in order to produce a numerical or symbolic information. Computer vision is about
interpretation of images from all types of sources. Processing also involves preprocessing e.g. forms of
image enhancement.
An example of analysis and comprehension is working out where people are in surveillance camera and
what they're doing.
Pattern recognition is classification based on image analysis. It's used in most machine intelligence
systems built for decision making.
Getting a computer to recognize a picture is difficult. For humans it's very easy and there is no proof
how exactly it is done so there is nothing to base on. There is some non-conclusive evidence that human
brains perform a form of feature extraction.
Humans can instinctively separate an object from the background but a computer can't do that – to a
computer a picture is just a matrix. The challenge is to get a computer to determine a set of features
that lets it discriminate between classes. There's many different systems to do that, some are based on
what's already known about computer vision, others are based on guesses about computer vision.
Recognition:
One to many – comparing the sample with images in the database to see if it matches with any
One to one – verification rather than recognition, for example comparing face with passport
photo
A relatively new way is periocular recognition – identifying people using the region around their eyes –
particularly usable if the full face is not visible. It uses 2D and 3D techniques:
2D for texture – finding details on the skin
3D for shape – more efficient against variaitons in facial expression, illumination, partial
occlusion
Iris recognition
Iris recognition is becoming increasingly popular. However, it poses problems with collectivity – it's hard
to get a good quality iris picture.
The steps of iris recognition are:
Image capturing
Iris segmentation
Normalization – it's important in any biometric recognition to normalize out differences in
acquisition that are not important to recognition, e.g. the exact position in the image
Feature extraction – results in obtaining a biometric signature
Matching to obtain similarity value.
All of these steps are separate research topics.
Feature extraction
Gabor filter – based on how human vision works
Imaginary part and real part together form iris code which is 256 bytes long
Matching
The computer looks for differences in bit pattern. A decision to accept or reject is made on the
basis of comparison of that value with a set threshold
The problem is that if the database is very large, the iris may be falsely recognized – the same
problems arises with face recognition
Some mobile phones use iris recognition. The sensor is a NIR camera and infra-red illumination is used.
To help iris location, the phone also displays circles for the user to position their eyes reflection.
Fingerprint recognition
The ideal situation is where you enroll and verify on the same sensor – sensor characteristics may vary
across sensors
Methods of acquisition:
Offline – ink technique
Live-scan – optical and ultrasound sensors
Fingerprint features
The recognition process as a whole is based on the outcome of consecutive steps:
The initial steps (direction map and foreground mask estimation) influence all the following steps.
Direction map estimation is determining the ridges flow direction and foreground mask estimation is
distinguishing foreground and background regions
Matching methods:
Correlation based – computing the correlation between corresponding pixels for different
alignments (comparing the image with database pixel by pixel)
Minutiae based – finding the alignment between the template and input minutiae sets that
results in the maximum number of pairings
Ridge feature based – comparing in terms of features
Unimodal system performs the recognition based on a single source of biometric information – a single
trait. It can be affected by:
Noise in the acquired biometric data
Non-universality of a certain trait
Lack of individuality
It is also susceptible to circumvention.
Multimodal biometrics combines multiple biometric traits – addressing the problem of non-universality.
It also increases the resistance against spoofing.
The fusion of biometrics can be done at different levels – sensor, feature, score or decision.
An example of multimodality is a system that combines 3 biometrics – face, iris and voice recognition.
How to evaluate efficiency of a biometric recognition system?
Every identity is a class.
Intra-class comparison – comparing the images of the same person – produces the genuine
score
Inter-class comparison – comparing images of different people – produces the imposter score
If the score is higher than some decision threshold, then the match is accepted. Otherwise it is rejected.
Imposter/genuine distribution
To set the decision threshold you need to decide what type of error is more important to avoid – this
depends on the application of the system. If the threshold is low, it will have a high rate of false
matches. If it is high, it will have a high rate of false rejections.
Confusion matrix
Spoofing methods evolve together with the development of technology. There are many materials to
replicate biometrics, some of which are cheap and easy to make. In addition, people leave their
biometrics in public all the time: fingerprints, images, voice...
Some spoofing examples are: silicon fingers to cheat fingerprints scanner or masks to cheat face
recognition.
Anti-spoofing techniques
Presentation attack detection – detecting attacks at sensor level made by presenting fake samples
Key points:
Find a set of discriminant features
Build an appropriate classifier
Predict the probability of sample vitality given the extracted set of features.
Biometrics is more reliable than methods based on passwords or access cards, as these can be stolen,
lost or forgotten. It is also faster and more convenient.