Top Banner
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha
16

User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

User Verification System

by

William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe

Client

Dr.Cha

Page 2: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Aim:

To improve confidence level by hybridizing multiple biometrics such as Face, Finger print, Handwriting, Hand geometry, Iris and Voice.

Confidence Level: Percentage of correct answers, valid user accepted and invalid user rejected.

To reduce false positive and false negative errors :- valid user rejected - invalid user accepted

Page 3: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Types of Biometrics decided for this project experiment:

• Face

• Handwriting

• Voice

• Finger print

Page 4: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

biomouse Fingerprint

scanner

DigitalCamera

LCD Pentablet Microphone

Multi-modality Biometric AuthenticationMulti-modality Biometric Authentication

Embeded & Hybrid User Verification

system

System that requires user verification

Page 5: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Hand Writing features:

• Width• Height• Drag count• Total stroke time • Total stroke distance• Stroke direction sequence string• Acceleration

Tools used:

LCD Pen Tablet for data collection

Java application for feature extraction

Page 6: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Each person writes differently.

Page 7: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Face Recognition:

• Photos collected have to be properly sized and also be gray scale.

• Eigen face technology is used to calculate the mean face/value

• Recognition is done using Nearest Neighbor method.

Tools Used:

• Digital Camera for data collection

• Mathworks’ Matlab for training and recognition

Page 8: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Each person has different faces.

Page 9: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

?Query

Face DB

Face Recognition SystemFace Recognition System

Page 10: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

width, length

User 1

User 2

User1 s1 = ( 12 , 16 )

User1 s2 = ( 11 , 20 )

User2 s1 = ( 9 , 8 )

User2 s2 = ( 10 , 7 )

Truth features

MeasurementsMeasurements

Page 11: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

slant

width

user1

user2

= user1?

Nearest Neighbor ClassifierNearest Neighbor Classifier

too slow for users to wait for the output.

Page 12: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Data Acquisition

Feature Extraction

Training an ANN

Classification System

Handwriting Done Done - -

Face Done ** ** **

Voice Done - - -

Finger print - - - -

Modality

Steps

Project Status

** - Eigen face and nearest neighbor methods used.

Page 13: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Advantages:

• Higher accuracy of determining an individual

• Reliable by having multiple recognition techniques or biometrics

• Increased security in companies

• Reduced amount of time to identify a suspect or criminal for law enforcement

• Difficult to challenge the system by forging names and mimicking voices making it virtually impossible to pass as someone else

• Possible use in a court of law to prove criminal cases

• Low maintenance software

Page 14: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Future Plan:

Handwriting training and classification.

Voice feature extraction methods

Finger print data collection

Page 15: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Demonstration

Handwriting

Face Recognition

Page 16: User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.

Sub-classing with Java1. Data Collection Module

VoiceCollector.c lass HandW ritingCollector.c lass FaceCollector.c lass

DataCollector.c lassABST RACT

2. Feature Exctration Module

VoiceExtractor.c lass HandW ritingExtractor.c lass FaceExtractor.c lass

FeatureExtractor.classABST RACT