0% found this document useful (0 votes)
21 views

Introduction To Biometrics (121090) : Raymond Veldhuis September 2008

This document provides an introduction to the course "Introduction to Biometrics" which covers important biometric modalities like fingerprint, face, and iris recognition. The course aims to help students understand biometric principles, assess system performance, and select suitable systems for applications. It consists of 7-8 lectures addressing topics such as biometric systems architecture, error rates, fingerprint and face recognition techniques, classification theory, multibiometrics, sample quality, and template protection. References are provided for further reading on each topic.

Uploaded by

rahulsrm
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Introduction To Biometrics (121090) : Raymond Veldhuis September 2008

This document provides an introduction to the course "Introduction to Biometrics" which covers important biometric modalities like fingerprint, face, and iris recognition. The course aims to help students understand biometric principles, assess system performance, and select suitable systems for applications. It consists of 7-8 lectures addressing topics such as biometric systems architecture, error rates, fingerprint and face recognition techniques, classification theory, multibiometrics, sample quality, and template protection. References are provided for further reading on each topic.

Uploaded by

rahulsrm
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Introduction to Biometrics (121090)

Raymond Veldhuis
September 2008

Contents
1 Introduction 2

2 Contents of the course 2

3 Preliminary Overview 3

References 3

1
1 Introduction
Recognition of individuals based on physiological characteristics, such as the face, the iris or fingerprint, and
behavioural traits, such as gait, is a promising research domain. Biometric algorithms allow for the recognition
of individuals in physical or logical access control systems and thus provide an efficient and convenient alternative
to knowledge-based or token-based security systems. The lecture covers the most important modalities in today’s
biometric systems: fingerprint recognition, face recognition, and iris recognition. The course includes background
theory, multibiometrics, and evaluation schemes for biometric systems. It will also address template protection
as a means for secure storage of biometric information. The goal of the course is to develop:
• An understanding of the principles used in biometric systems.
• Knowledge of the most important biometric approaches.
• The capability to assess the performance and the security properties of a biometric system.
• An understanding of the relationships between biometric systems and environmental conditions (e.g. illu-
mination, pose variations etc.) and their impact on performance.
• The capability to select a suitable biometric system for a given application context.
• Sufficient background knowledge on biometrics to read and understand scientific publications on this topic.
The course will consist of 7 or 8 lectures. Study material consists of the slides presented and the articles and
reports [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14] The references [1]–[13] address specific topics, with some overlap,
discussed in the course. Reference [14] can be regarded as a reference book. References can be downloaded from
the course website http://www.sas.el.utwente.nl/open/courses/intro_biometrics.

2 Contents of the course


1. Introduction
• Goal of ‘Introduction to Biometrics’
• Definition of biometric recognition
• Advantages, disadvantages and expectations of biometrics
• Examples of biometric modalities
• Applications: Access control, token ownership authentication, surveillance
• Overview of ‘Introduction to Biometrics’
2. Biometric systems
• Usage: Verification, Identification, Watch lists
• Scenarios: Cooperative vs. Uncooperative, Overt vs. Covert
• Biometric system architecture
• Comparison scores
• Process stages: Verification/Identification, Enrolment, Training
3. Performance
• Error rates: False match rate – False non-match rate, Failure to acquire – Failure to enrol, False
acceptance rate – False rejection rate, Receiver operating characteristic, Equal error rate, Cumulative
match graph – Rank 1 recognition rate
• Evaluation of biometric systems
– Verification experiments: Single vs. multiple enrolment, Similarity matrix
– Identification experiments
– Confidence of measured error rates

2
4. Fingerprint Recognition
• Minutiae based
• Non-minutiae based
• Applications
5. Face Recognition
• Principles: Eigenfaces, Bunch graphs, Local Binary Patterns
• Problems: Pose, Illumination, Expression
• Preprocessing: Normalization, Registration
• 3D Face recognition
• Applications
6. Iris Recognition

• Iris code
• Applications
7. Classification theory
• Verification: Neyman-Pearson approach, Likelihood ratio, Gaussian case, Bayesian approach
• Identification: MAP approach
• Other classifiers: Euclidian distance, Mahanalobis distance, Support Vector Machine
• Feature extraction: PCA, LDA
8. Multibiometrics
• Fusion: Multi-modal, Multi-algorithm, Multi-instance
• Score-level fusion
• Decision-level fusion
9. Sample quality
10. Template protection
• Security and privacy issues
• Fuzzy commitment scheme

3 Preliminary Overview
Lecture Topics Reader
1 Introduction [1, 2]
Biometric Systems [2]
Performance [3, 4]
2 Fingerprint recognition [5, 8]
3 Face recognition [6]
4 Iris recognition [7]
5 Classification theory [8, 9]
6 Multibiometrics [10, 11]
Sample quality [12]
7 Template protection [13]

3
References
[1] A.K. Jain. Biometric recognition. Nature, 449:38–40, September 2007.
[2] A.K. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Transactions on
Circuits and Systems for Video Technology, 14(1):4–20, January 2004.

[3] T. Mansfield, G. Kelly, D. Chandler, and J. Kane. Biometric product testing final report. Internal report,
Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2001.
[4] T. Mansfield and J. Wayman. Best practices in testing and reporting performance of biometric devices.
Internal report, Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2002.
[5] D. Maltoni. A tutorial on fingerprint recognition. In M. Tistarelli, J. Bigun, and E. Grosso, editors,
Biometrics School 2003, LNCS 3161, pages 43–68. Springer Verlag, Berlin, Heidelberg, 2005.
[6] W. Zhao, R. Chellappa, P. Phillips, and A. Rosenfeld. Face recognition: A literature survey. ACM Computing
Surveys, 35(4):399–458, December 2003.
[7] J. Daugman. How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology,
14(1):21–30, January 2004.
[8] A.M. Bazen and R.N.J. Veldhuis. Likelihood-ratio-based biometric verification. IEEE Transactions on
Circuits and Systems for Video Technology, 14(1):86–94, January 2004.
[9] A.K. Jain, R.P.W. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Transactions on
Pattern Analysis and Machine Intelligence, 22(1):4–37, 2000.

[10] A. Ross. An introduction to multibiometrics. In Proceedings of the 15th European Signal Processing Con-
ference (EUSIPCO), pages 20–24, Poznan, Poland, 2007.
[11] A. Ross, A.K. Jain, and J.-Z. Qian. Information fusion in biometrics. In Proceedings Proc. of 3rd International
Conference on Audio- and Video-Based Person Authentication (AVBPA), pages 354–359, Sweden, 2001.

[12] P. Grother and E. Tabassi. Performance of biometric quality measures. IEEE Transactions on Pattern
Analysis and Machine Intelligence, Special Issue on Face Recognition, 24(4):531–543, 2007.
[13] M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. Akkermans, and F. Zuo. Face biometrics with renewable
templates. In Proceedings of the SPIE:Security, Steganography, and Watermarking of Multimedia Contents
VIII, volume 6072, January 2006.
[14] NSTC Subcommittee on Biometrics and Identity Management. Biometrics foundation documents. Internal
report, National Science and Technology Council, 2006. http://www.biometrics.gov/ReferenceRoom.

You might also like