Introduction To Biometrics (121090) : Raymond Veldhuis September 2008
Introduction To Biometrics (121090) : Raymond Veldhuis September 2008
Raymond Veldhuis
September 2008
Contents
1 Introduction 2
3 Preliminary Overview 3
References 3
1
1 Introduction
Recognition of individuals based on physiological characteristics, such as the face, the iris or fingerprint, and
behavioural traits, such as gait, is a promising research domain. Biometric algorithms allow for the recognition
of individuals in physical or logical access control systems and thus provide an efficient and convenient alternative
to knowledge-based or token-based security systems. The lecture covers the most important modalities in today’s
biometric systems: fingerprint recognition, face recognition, and iris recognition. The course includes background
theory, multibiometrics, and evaluation schemes for biometric systems. It will also address template protection
as a means for secure storage of biometric information. The goal of the course is to develop:
• An understanding of the principles used in biometric systems.
• Knowledge of the most important biometric approaches.
• The capability to assess the performance and the security properties of a biometric system.
• An understanding of the relationships between biometric systems and environmental conditions (e.g. illu-
mination, pose variations etc.) and their impact on performance.
• The capability to select a suitable biometric system for a given application context.
• Sufficient background knowledge on biometrics to read and understand scientific publications on this topic.
The course will consist of 7 or 8 lectures. Study material consists of the slides presented and the articles and
reports [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14] The references [1]–[13] address specific topics, with some overlap,
discussed in the course. Reference [14] can be regarded as a reference book. References can be downloaded from
the course website http://www.sas.el.utwente.nl/open/courses/intro_biometrics.
2
4. Fingerprint Recognition
• Minutiae based
• Non-minutiae based
• Applications
5. Face Recognition
• Principles: Eigenfaces, Bunch graphs, Local Binary Patterns
• Problems: Pose, Illumination, Expression
• Preprocessing: Normalization, Registration
• 3D Face recognition
• Applications
6. Iris Recognition
• Iris code
• Applications
7. Classification theory
• Verification: Neyman-Pearson approach, Likelihood ratio, Gaussian case, Bayesian approach
• Identification: MAP approach
• Other classifiers: Euclidian distance, Mahanalobis distance, Support Vector Machine
• Feature extraction: PCA, LDA
8. Multibiometrics
• Fusion: Multi-modal, Multi-algorithm, Multi-instance
• Score-level fusion
• Decision-level fusion
9. Sample quality
10. Template protection
• Security and privacy issues
• Fuzzy commitment scheme
3 Preliminary Overview
Lecture Topics Reader
1 Introduction [1, 2]
Biometric Systems [2]
Performance [3, 4]
2 Fingerprint recognition [5, 8]
3 Face recognition [6]
4 Iris recognition [7]
5 Classification theory [8, 9]
6 Multibiometrics [10, 11]
Sample quality [12]
7 Template protection [13]
3
References
[1] A.K. Jain. Biometric recognition. Nature, 449:38–40, September 2007.
[2] A.K. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Transactions on
Circuits and Systems for Video Technology, 14(1):4–20, January 2004.
[3] T. Mansfield, G. Kelly, D. Chandler, and J. Kane. Biometric product testing final report. Internal report,
Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2001.
[4] T. Mansfield and J. Wayman. Best practices in testing and reporting performance of biometric devices.
Internal report, Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2002.
[5] D. Maltoni. A tutorial on fingerprint recognition. In M. Tistarelli, J. Bigun, and E. Grosso, editors,
Biometrics School 2003, LNCS 3161, pages 43–68. Springer Verlag, Berlin, Heidelberg, 2005.
[6] W. Zhao, R. Chellappa, P. Phillips, and A. Rosenfeld. Face recognition: A literature survey. ACM Computing
Surveys, 35(4):399–458, December 2003.
[7] J. Daugman. How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology,
14(1):21–30, January 2004.
[8] A.M. Bazen and R.N.J. Veldhuis. Likelihood-ratio-based biometric verification. IEEE Transactions on
Circuits and Systems for Video Technology, 14(1):86–94, January 2004.
[9] A.K. Jain, R.P.W. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Transactions on
Pattern Analysis and Machine Intelligence, 22(1):4–37, 2000.
[10] A. Ross. An introduction to multibiometrics. In Proceedings of the 15th European Signal Processing Con-
ference (EUSIPCO), pages 20–24, Poznan, Poland, 2007.
[11] A. Ross, A.K. Jain, and J.-Z. Qian. Information fusion in biometrics. In Proceedings Proc. of 3rd International
Conference on Audio- and Video-Based Person Authentication (AVBPA), pages 354–359, Sweden, 2001.
[12] P. Grother and E. Tabassi. Performance of biometric quality measures. IEEE Transactions on Pattern
Analysis and Machine Intelligence, Special Issue on Face Recognition, 24(4):531–543, 2007.
[13] M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. Akkermans, and F. Zuo. Face biometrics with renewable
templates. In Proceedings of the SPIE:Security, Steganography, and Watermarking of Multimedia Contents
VIII, volume 6072, January 2006.
[14] NSTC Subcommittee on Biometrics and Identity Management. Biometrics foundation documents. Internal
report, National Science and Technology Council, 2006. http://www.biometrics.gov/ReferenceRoom.