Chapter 15 - Biometrics

Similar documents
Regarding g DNA and other Forensic Biometric Databases:

Challenges of Fingerprint Biometrics for Forensics

Introduction to Forensic Science and the Law. Washington, DC

A History of Fingerprinting

Come in and get your notebooks out. We have notes today!

classmates to the scene of a (fictional) crime. They will explore methods for identifying differences in fingerprints.

TV forensic dramas have caused the CSI effect

1. Police investigation of sex crimes. (1) Serious injury or death of victim. (3) Arrest of suspect. 2. Response to sexual assault report.

Honest Lies? The Impact Of Memory On Criminal Investigations

NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION

A Study of Identical Twins Palmprints for Personal Authentication

Handbook Crime Scene Search Methods To Locate Fingerprints

Discovering Identity Problems: A Case Study

Famous or Infamous Cases in the History of Forensics. Wanted Poster

CHAPTER 1. A New Discipline Emerges. Chapter 1 Multiple Choice Select a single answer for each multiple choice question.

Analyze and synthesize the information in this lesson to write a fiveparagraph essay explaining the problems with DNA testing.

Chapter 2 Crime Scene

Crime scene investigation the golden hour

Cold Case Investigation

Evidence for Expertise in Fingerprint Identification

Chapter 1 Observation Skills

The Investigative Process. Detective Commander Daniel J. Buenz

Forensic Psychology Psyc 350

Criminal Justice III Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes

Observations on the Illinois Lineup Data Nancy Steblay, Ph.D. Augsburg College May 3, 2006

Forensic Science. Read the following passage about how forensic science is used to solve crimes. Then answer the questions based on the text.

Confirmation Bias: The Pitfall of Forensic Science

Human and Algorithm Facial Recognition Performance: Face in a Crowd

Pros & Cons of Testimonial Evidence ONLINE VERSION

BIOMETRICS PUBLICATIONS

SCOPE AND SEQUENCE. Career and Technical Education Criminal Investigation. Course Name:

Forensics Final Review. 1. Fill in the following table about search methods. Search Method Picture When it is Used Strip or Line Search

Physical Evidence Chapter 3

ENQUIRING MINDS EQM EP 5 SEG 1

Forensic Anthropology. Introduction

The koala is one of the few mammals (other than primates) that has fingerprints. In fact, koala fingerprints are remarkably similar to human

Pros & Cons of Testimonial Evidence. Presentation developed by T. Trimpe

TRUSTLINE REGISTRY The California Registry of In-Home Child Care Providers Subsidized Application

Forensic Science An Introduction 2011

Criminology MODULAR TECHNOLOGY EDUCATION. Scope & Sequence 81450

FINGERPRINT BASED GENDER IDENTIFICATION USING FREQUENCY DOMAIN ANALYSIS

4. (p. 20) Jacob says, Why would I want to be friends with kids who are nasty to people like me anyway? What does this tell us about Jacob?

Fingerprint Patterns and the Analysis of Gender Differences in the Patterns Based on the U Test

FREE INTRODUCTION MODULE

Lesson 1: Gaining Influence and Respect

Book Review of Witness Testimony in Sexual Cases by Radcliffe et al by Catarina Sjölin

WISCONSIN ASSOCIATION FOR IDENTIFICATION NEWSLETTER

Free Kindle Books Fundamentals Of Forensic Science

Mental capacity and mental illness

INTRODUCTION TO PSYCHOLOGY. Lecturer: Dr. Paul Narh Doku Contact: Department of Psychology, University of Ghana

FORENSIC SCIENCE. Forensic Science CORPUS DELICTI. Body of the Crime. INTRODUCTION Crime Scene Investigation

Existentialism. Introduction AP EUROPEAN HISTORY. Purpose. Essential Questions. Contextualization. Objective Knowledge and Subjective Visions 10:

Brad Schaffer Forensic Psychology July 22, Schaffer 1

INDEX ACCOUNTANTS, FORENSIC,

Ron Smith & Associates, Inc. Curriculum Vitae (Brief Form)

The Detection of Deception. Dr. Helen Paterson Phone:

Pros & Cons of Testimonial Evidence. Presentation developed by T. Trimpe 2006

DISSECTING THE CSI EFFECT

Crime Scene Investigation. Story

Russell V. Lenth Department of Statistics and Actuarial Science The University of Iowa

Forensic Science Final Review

Worksheet. Gene Jury. Dear DNA Detectives,

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

THE RELIABILITY OF EYEWITNESS CONFIDENCE 1. Time to Exonerate Eyewitness Memory. John T. Wixted 1. Author Note

Among the Hidden By: Margaret Peterson Haddix

Instructional Strategies! &! Classroom Management! The student-centered classroom & Choice Theory!

COUNTY CRIME LAB: HIGH QUALITY TEST RESULTS, CHRONICALLY DELAYED

FORENSIC SCIENCES AND CONTEMPORARY SECURITY CHALLENGES

Chapter 2 Crime Scene

Brain Fingerprinting Technology

READY. Book. CURRICULUM ASSOCIATES, Inc. A Quick-Study Program TEST

Building a Face, and a Case, on DNA

Running head: FALSE MEMORY AND EYEWITNESS TESTIMONIAL Gomez 1

KEEPING TRACE EVIDENCE VIABLE- BOTH SIDES OF THE EVIDENCE: COLLECTING YOURSELF OR HAVING IT BROUGHT TO YOU

Cybercrime: Technology Turns into a Curse. Technology has advanced drastically over the years. Specifically, computers continue to

POLICE IDENTIFICATION PROCEDURES: A TIME FOR CHANGE

Criminal Justice (CJUS)

Public Policy and DNA

Evison, M.P. (2017) Facial enigma. CSEye, May 2017, 2-5. Available Online:

Forensic Science. Definition and Scope of Forensic Science

Unit 1: Introduction to Forensic Science Notes Definitions and Background

EMPLOYMENT APPLICATION

THE INVINCIBLE FINGERPRINT: UNDERSTANDING THE BASICS, DEFEATING THE MYTHS. NYSBA Criminal Justice Section Fall Meeting. Oct.

Test Bank Questions for Chapter 1

Letter to the Editor Re: XCAT (Capillary Analysis Test) Validation Study: Practical Field Use of Presumptive Gunshot Residue Test. J. For. Ident.

X13 VSA Voice Stress Analysis Lie Detector Software

Fitness to Stand Trial

Biometric Authentication through Advanced Voice Recognition. Conference on Fraud in CyberSpace Washington, DC April 17, 1997

Unit of Forensic Anthropology. Gait as evidence. Niels Lynnerup

Bias Elimination in Forensic Science to Reduce Errors Act of 2016

Unit title: Criminology: Crime Scenes (SCQF level 5)

The Insanity Defense Not a Solid Strategy. jail card. However, this argument is questionable itself. It is often ignored that in order to apply

Background of keynote speakers of the EAPL conference Turku 2018

MEDICAL EXPERTS: THE GOOD, THE BAD, AND THE UGLY. Itiel Dror University College London (UCL) & Cognitive Consultants International (CCI)

T. Tomm Forensic Science

The Face Recognition Problem. Is a single image database sufficient for face recognition? A Psychological Experiment

SWGFAST Quality Assurance Guidelines for Latent Print Examiners

Fingerprinting. A game-changing science that detects concealed information stored in the brain

Quantifying Latent Fingerprint Quality

Ac*vity Level Interpreta*on Of Forensic Evidence. Some defini*ons. NCSTL BJA Atlanta, August 2012

Transcription:

Chapter 15 - Biometrics Alex Slutsky Computer security seminar Spring 2014 University of Haifa

What is Biometrics? Biometrics refers to the quantifiable data (or metrics) related to human characteristics and traits such as: Individual anatomy or physiology: hand geometry. Ingrained skill or behavior: handwritten signature. Combination of the two: your voice.

Handwritten Signatures Handwritten signatures are a very weak authentication mechanism by themselves but have worked well for centuries. Signature of shimon Peres. Source: Wikipedia

Forged Signatures The law in Israel states that a forged document is null and void. Israeli banks are held accountable for accepting forged cheques. Bank tellers may struggle to authenticate a signature, as shown by the next experiment: An experiment showed that 105 professional document examiners, who each did 144 pairwise comparisons, misattributed 6.5% of documents.

Automatic Recognition of Handwritten Signatures This turns out to be a very difficult image processing task because of the variability between one genuine signature and another. The most popular method today is dynamic recognition, also known as online. Example of dynamic signature. Source: Wikipedia

Errors Explained Fraud (false acceptance rates) and insult (false rejection) rates. Equal error rate. UK banks set a target for biometrics of a fraud rate of 1% and an insult rate of 0.01%.

Receiver Operating Characteristic All images taken from Wikipedia

Face Recognition Recognizing people by their facial features is the oldest identification mechanism of all, going back at least to our early primate ancestors. Image taken from Wikipedia.

Recognizing People But even if we are good at recognizing friends in the flesh, how good are we at identifying strangers by photo ID?

Facial Recognition Experiment 44 students, each with 4 different photographs: 1. Good, Good: 3. Good, Bad: 2. Bad, Good: 4. Bad, Bad:

Facial Recognition Even picking out faces from an image of a crowd is a non-trivial computational task. Error rates were up to 20%.

Bertillonage Image taken from Wikipedia.

Bertillonage System based on bodily measurements, such as height standing and sitting, the length and width of the face, and the size and angle of the ear. This technique has made a comeback in the form of hand-geometry readers.

Fingerprints The use of fingerprints to identify people was discovered independently a number of times: In the Spanish version of history, they were first used in Argentina where they secured a murder conviction in 1892; while Cuba, which set up its fingerprint bureau in 1907, beat the USA whose first conviction was in Illinois in 1911. The Croatian version notes that the Argentinian system was developed by one Juan Vucetich, who had emigrated from Dalmatia. The German version refers to Professor Purkinje of Breslau, who wrote about fingerprints in 1828. Success truly has many fathers!

Verifying Positive or Negative Identity Claims American police forces have historically used fingerprints to: Identify arrested suspects to determine whether they are currently wanted by other agencies. Whether they have criminal records. Whether they have previously come to attention under other names.

Vulnerability An old trick was for a crook to distract (or bribe) the officer fingerprinting him. Fingerprints could be molded and cloned quickly and cheaply using cooking gelatin. Breathing on a finger scanner to reactivate a latent print left there by a previous, authorized, user.

Crime Scene Forensics 16-point fingerprint match was considered to be incontrovertible evidence. In Israel 12-point, 9-point and even 7-point fingerprint is mentioned in court. But then came Shirley McKie. Image taken from Ross Andresson's book ``Security Engineering''

Are Fingerprints Reliable? Psychologist Itiel Dror conducted an experiment: Six experts who each looked at eight prints, all of which they had examined for real in the previous few years. Only two of the experts remained consistent. The other four experts made six inconsistent decisions between them. The prints had a range of difficulty, and in only half of the cases was misleading contextual information supplied.

Important points Dror s work confirmed that the cases in which misidentifications occur tend to be the difficult ones. It was inevitable that sooner or later, in a large enough database a 16-point mismatch would be found. The belief that any security mechanism is infallible creates the complacency and carelessness needed to undermine its proper use. A belief of infallibility ensures that the consequences of the eventual failure will be severe.

Iris Codes Image taken from Ross Andresson's book Security Engineering.

Iris Codes Iris codes provide the lowest false accept rates of any known verification system zero. So far as is known, every human iris is measurably unique. The iris pattern contains a large amount of randomness, and appears to have many times the number of degrees of freedom of a fingerprint.

Iris Codes - Problems Many things, from eyelashes to hangovers, can cause the camera to not see enough of the iris. Failure to enroll certain people. Getting the picture cheaply without being too intrusive.

Voice Recognition Voice recognition is the attempt to authenticate a person using recordings of his/hers voice. There are some interesting attacks on these systems.

Other Biometrics Typing patterns. Vein patterns. Literary analysis. Facial thermograms. DNA typing.

What Goes Wrong? Forensic biometrics often do not tell as much as one might assume. Another aspect of freshness is that most biometric systems can, at least in theory, be attacked using suitable recordings. Most biometrics are not as accurate for all people, and some of the population can not be identified as reliably as the rest (or even at all).

What Goes Wrong? continued A point that follows from this is that systems may be vulnerable to collusion. The statistics are often not understood by system designers, and the birthday paradox is particularly poorly appreciated. Another aspect of statistics comes into play when designers assume that by combining biometrics they can get a lower error rate.

What Goes Wrong? continued Many vendors have claimed that their products protect privacy. Automating biometrics can subtly change the way in which security protocols work, so that stuff that used to work now does not. It is worth thinking what happens when humans and computers disagree.

Research Problems Is it possible to build a system other than iris scanning which will meet the banks goal of a 1% fraud rate and a 0.01% insult rate? Is it possible to build a static signature verification system which has a good enough error rate? Are there any completely new biometrics that might be useful in some circumstances?

Question?

Applause