biometrics fusion - najis.org · - no physical contact with scanner ... - iris remains unchanged...
TRANSCRIPT
What is it?
Biometrics consists of methods for uniquely recognizing or identifying individuals based upon one or more physical or behavior traits.
The next wave of identification is biometric fusion which incorporates a variety of biometrics.
Future systems may integrate photo matching, fingerprint & palm matching, iris matching and voice matching.
Physical Examples
Physical examples include but are not limited to:
- fingerprints
- face recognition
- DNA
- palm prints
- iris recognition
- voice recognition
- ear shape
Status Quo
As this group knows, fingerprints are currently the most common and reliable physiological biometric identifiers.
More recently, many agencies have also started maintaining a database of palmprints.
Facial Recognition
Facial Recognition applications convert the facial image into digital code, known as a faceprint.
Algorithms are used to compare one faceprint to another in the existing database.
The Pennsylvania Justice Network (JNET) system also utilizes demographics such as gender and race, hair and eye color and height and weight to help narrow the search.
JNET is in the process of upgrading their facial recognition system to include the capacity for a mobile application and for ability to capture and search an iris database.
Facial Recognition
Facial Identification Scientific Working Group (FISWG)
- mission to develop consensus standards, guidelines and best practices for facial recognition
- working to develop criteria for positive id for court
Facial Recognition Challenges
Facial identification problems/issues
- target camera geometry
- changes in facial expression
- differences in imaging system (cameras and recording devices)
Long range challenge
- linkable/searchable databases
multiple agencies with databases but not necessarily compatible or shareable
quality of images usually poor
- ANSI/NIST standard will improve quality and help data sharing
Iris Recognition
compares unique patterns of the iris
- a digital camera uses both visible and near-infrared light to capture image of iris—like fingerprints no two irisprints are alike.
- compares unique patterns of the iris
- comparing against a database is fast with high level of accuracy
iris scanning
- no physical contact with scanner
- however, iris scan requires agent to be in close proximity of subject
- can be used with glasses and contacts
- iris remains unchanged with age and post surgery
Iris Overview
iris formation
- iris is formed by a process called chaotic morphogenesis
- tearing outwards of the membrane from the center of the eye forming the detail found in the iris
- complete by the time a person is 12-18 months of age and the iris stays the same over the life of an individual
benefits
- speed (fastest vs. other biometrics)
- accuracy (lowest chance of false ID vs. other biometrics)
- scalability (smallest file template size)
- stable (most reliable vs. other biometrics)
- non-invasive/hygenic (no touching of sensors required)
iris recognition is NOT retinal scanning
- older technology, intrusive, not as stable or accurate
Biometric Footprints
Metric 10 Fingerprint 2-Iris Advantage
Match Speed (records/server/sec)
2 M 20 MIris is 10x FasterIris requires 10x Less Hardware
Template Size*(per record template)
10 Kbytes 2 Kbytes Iris is 5x smaller
Storage Size***(per record image)
1 Mbytes 7 KbytesIris requires 100x less storage space
* Affects cost of RAM since biometric templates stay in RAM
**Need to store biometric images in standard format in order to allow for future proofing, interoperability, interchangeability and guard against vendor lockup
12
Storage
AFIS Iris
Servers 1600 160
Total RAM 3 Terabytes <1 Terabyte
Total Storage 340 Terabytes 2 Terabytes
Based on throughput of 30K/hr340 Terabytes equivalent to 8 years of HDTV Video
example system hardware 300 million subjects
Iris Technology Devices
handheld enrollment devices- operator or self enrollment
mounted devices for enrollment
mobile devices for enrollment, local, or remote search- up to 500K subjects; iris search times less
than one minute- cellular connection for remote search
future device capabilities- iris on the move- iris at booking (6’ standoff)
Offender Tracking Systems
- integrated search engine and identity management
- used in the incarceration process to identify inmates
- utilize images from existing, legacy systems to reduce duplicate data entry
- event management, booking, release, visitor check, court ID, work release
- download to mobile devices for portable ID
Iris Deployments
corrections centers across the US
- sizes from 150 beds to 4,000+, iris databases of 75,000+ inmates enrolled
regional database
- program running in Missouri with several county jails and PDs cooperating and building a single database
NYPD
- scan irises of everyone who passes through NY Central Booking
- deployed to track suspects as they move through court system
immigration and control
- automatic border entry system operated by Amsterdam PD at Schiphol Airport
Possible Uses for Iris
corrections- inmate movement. medication dispensing, work release verification in the field, sex
offender registration in front offices or other locations outside of booking
investigations- search warrants for documenting suspects, witnesses, and video and audio evidence
- gang investigations documenting gang members and their clothing, tattoos, graffiti or tagging, etc
- crime scenes for documenting suspects, witnesses, and video and audio evidence (statements on the scene, visible fingerprints/footprints/etc)
- field interrogations during ongoing investigations
- verification of identification during arrest warrant service details
Possible Uses for Iris
patrol- verification of identity on car stops or other calls for service
courts- identification of defendants at court, witnesses, persons suspected of intimidation or
other crimes within the courts building
other activities involving biometric registration- child safety, Alzheimer's patients, employee identification
- concealed carry registration
- neighborhood watch activities
- criminal background checks
Challenges
- eyeglasses or sunglasses (remove to enroll)
- clear contact lenses – edge may impede capture
- colored or patterned contact lenses (remove for enroll)
- eyelashes or eyelids obscure iris
- disorders of the eye
Standards/Trends
ISO 19794-6, biometric data interchange formats;
Part 6: iris image data
- establishes iris formats to reduce archived image size
- cropping, and masking non-iris regions, preserves the coding budget
- pixels outside the ROI are fixed to constant values, for normal segmentation
NIST mobile ID device best practices recommendations, V1
- establishes subject acquisition profiles for iris capture on mobile devices
FBI NGI (Next Generation Identification)
- $1billion upgrade to IAFIS adding iris capability in the next three years
Iris Summary
iris biometrics
- highest accuracy biometric: supports scalability to database sizes up to one billion or more
- system footprint lowers total cost of ownership
- flexibility to add fusion with eyes or 10-print, controllable thresholds for different applications
- small template & image size makes iris ideal for consumer verification devices down the line & for mobile communication
- damage in iris is less common than damage in fingerprints
Voice Biometrics - Overview
similar to finger & face
- can be used for both 1:1 verification and 1:N identification
historically a manual process requiring a forensic expert
- improvements in algorithms and processing power now provide automatic functionality
voice has been accepted in courts since 1967
- has passed Frye, Daubert & federal rules of evidence challenges
Voice Biometrics - Process
FaceprintFingerprint
Voiceprint
These parameters are individual to each person, and can provide very useful information about the person’s identity.
Like a fingerprint or faceprint, a voiceprint also has available parameters that provide unique information about a person.
Voice Biometrics - Challenges
channel effects
– microphones (carbon-button, electret, hands-free…)
– acoustic environment (office, car, airport…)
– transmission channel (landline, cellular, VoIP…)
speaker voice variability
– emotional state
– physical condition (drugs, alcohol…)
– illness
amount of speech
- elimination of pauses and non-speech segments
non-challenges- language
- accents
- superficial voice disguise
Voice Biometrics - Benefits
no specialized equipment required for collection
– standard microphones/recorders can be used
availability of data
- passive
voice mail /answering machines
calls for services/support
911
video recordings
- active
phone taps
interrogation
video arraignment
during booking process
mobile ID
Voice Biometrics - Benefits
dual modality
- investigative - automated to include or exclude suspects
- forensic - analysis by expert for court evidence
Voice Biometrics – Use Cases
- domestic abuse
- sex offender registration/authentication
- phone calls in violation of restraining orders
- communications/911
- prank or false emergency calls
- agency radio traffic abuse
- terroristic threats
- inmate call monitoring
- kidnapping
- extortion
- video w/audio where camera operator is unknown
- any investigation where audio is the only lead or evidence
Voice Biometrics – Capabilities
current capabilities for 1:N voice matching
- EER of 1.8% best case scenario
- as little as 3 seconds of audio required but 30 seconds is ideal
- search speeds of up to 10,000 voice prints per second
verification 1:1 matching
- As accurate as any other biometric with enrollment & matching in ―active‖ environment.
Voice Biometrics – Capabilities
additional capabilities of voice
- language recognition
- emotional state
- lie/voice stress detection
- key word search/recognition
- recording device identification
- background sound identification
Voice Use & Emergence
Mexican federal & state deployments
- national system deployed in Mexico with over 600,000 record database projected to grow to over 1.1 million by the end of 2011
- state systems deployed in Mexico already used in solving both kidnapping and extortion cases
NIST
- developing type 11 record for voice biometrics
- yearly evaluations since 1996
Voice Use & Emergence
FBI NGI
“The future of identification systems is currently progressing beyond the dependency of a unimodal (e.g., fingerprint) biometric identifier towards multimodal biometrics (i.e., voice, iris, facial, etc.).”
FBI Biometric Center of Excellence
“A popular choice for remote authentication due to the availability of devices for collecting speech samples (e.g., telephone network and computer microphones) and its ease of integration.”
Voice components showing up in some US AFIS upgrade RFPs.
Voice Biometrics – Summary
Voice technology capabilities have reached the practical implementation stage.
United States is trailing other countries in implementation.
Voice can deliver capabilities to utilize data that is already being collected.
Voice can provide unique capabilities not provided by other biometrics.
Voice can enhance both investigative & forensic processes.
Biometric Quality
Biometric identification is only as good as the initial sample.
The quality of the initial enrollment is crucial.
And like fingerprints, most biometrics are subject to uncertainty.
Although fingerprints have been proven in court to be an acceptable method of identification most other biometrics have not yet reached that level of proof
Emerging Biometrics
The science of biometrics is advancing much faster than the court cases/challenges.
However, the emerging biometrics can be used now as an investigative tool.
Department of Defense
DoD collects, references and analyzes biometric data for identification, verification in support of mission goals
Plans in place to enhance interoperability with systems such as IAFIS and Homeland Security’s Automated Biometric Identification System (IDENT).
Multi-modal
ability to store and analyze multiple biometric modalities simultaneously (multi-modal biometric fusion)
multi-modal storage and matching (fingerprints, palms, irises, faces, etc.)
Future
Biometric identification technologies hold substantial promise for law enforcement.
However, there are always concerns such as:
- compromised data
- costs
- equipment durability
- accuracy
- reliability
- integration with other systems
Future
What works well in a lab may not work as well in real world.
Some systems may work better in some environments than others.
Accuracy and reliability of biometric technologies have to mature before they will be implemented on a large scale.
Contact Information
Harry Giordano
Pennsylvania Justice Network
Luci Stone
Pennsylvania Justice Network