lec2 Introduction-cont

lec2 Introduction-cont - How are people identified?...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1 CSE190a Fal 06 Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 CSE190a Fal 06 How are people identified? • People are identified by three basic means: – Something they have (identity document or token) – Something they know (password, PIN) – Something they are (human body) CSE190a Fal 06 Problems with Possession- or Knowledge-based Approaches Card may be lost, stolen or forgotten – Password or PIN may be forgotten or guessed by the imposters –25% of people seem to write their PIN on their ATM card Estimates of annual identity fraud damages: – $56.6 billion in credit card transactions in U.S. alone in 2005* • 0.25% of internet transactions revenues, 0.08% of off-line revenues – $1 billion in fraudulent cellular phone use – $3 billion in ATM withdrawals The traditional approaches are unable to differentiate between an authorized person and an impostor * Spectrum July, 2006 CSE190a Fal 06 Requirements for an Ideal Biometric Identifier 1. Universality Every person should have the biometric characteristic 2. Uniqueness No two persons should be the same in terms of the biometric characteristic 3. Permanence The biometric characteristic should be invariant over time 4. Collectability The biometric characteristic should be measurable with some (practical) sensing device 5. Acceptability One would want to minimize the objections of the users to the measuring/collection of the biometric CSE190a Fal 06 Behavioral vs Physical Traits Behavioral vs Physical Traits • Physical Characteristics •Ir is •Ret ina • Vein Pattern •HandGeometry •Face • Fingerprint • Ear shape • Behavioral Characteristics •Keystrokedynam ics • Signature dynamics •Wa lk ingGa it •Vo
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 CSE190a Fal 06 Applications * There are ~500 million border crossings/year in the U.S. CSE190a Fal 06 UCSD Biometric Soda Machine Face Fingerprint CSE190a Fal 06 *As part of the enhanced procedures, most visitors traveling on visas will have two fingerprints scanned by an inkless device and a digital photograph taken . All of the data and information is then used to assist the border inspector in determining whether or not to admit the traveler. These enhanced procedures will add only seconds to the visitor’s overall processing time. The electronic fingerprint scanner
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/14/2008 for the course CSE 190A taught by Professor Kriegman during the Fall '06 term at UCSD.

Page1 / 8

lec2 Introduction-cont - How are people identified?...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online