Artificial Intelligence & Multimodal Biometrics

Neural network mimics the brain for improved decision-making in biometric security systems (EurekAlert!)

“Our goal is to improve accuracy and as a result improve the recognition process,” says Gavrilova, a professor in the Faculty of Science. “We looked at it not just as a mathematical algorithm, but as an intelligent decision making process and the way a person will make a decision.”

The algorithm can learn new biometric patterns and associate data from different data sets, allowing system to combine information, such as fingerprint, voice, gait or facial features, instead of relying on a single set of measurements.

A system like this is a very long way from seeing the light of day in an actual real-world deployment, but the concept strikes me as having huge potential for extremely complex high value deployments of the future such as airport ID.

Biometric Chat on Voice Biometrics June 14

UPDATE June 14, 2012: @m2sys has put a transcript of today’s biometric chat up at Storify

When: June 14, 2012

11:00 am EDT, 8:00 am PDT, 16:00 pm BST, 17:00 pm (CEST), 23:00 pm (SGT), 0:00 (JST)

Where: tweetchat.com/room/biometricchat (or Twitter hashtag #biometricchat)

What: Tweet chat on voice biometrics.

Topics: The science behind voice biometric technology, technical challenges, non-telephone-based voice applications, market applications, and customer impact.

More information at the M2SYS blog.

I always enjoy these.

Tune in, dial up, surf over (or do whatever it is you do to navigate the interwebs) and join in the conversation.

Evolving Understanding of the Evolving Iris

Ageing eyes hinder biometric scans (Nature)

“One iris biometric marketing claim has been that the iris allowed ‘a single enrolment for a lifetime’. This claim is now proven to be false,” he says.

The likelihood of software incorrectly matching two irises from different people is around 1 in 2 million (known as the false match rate). So in practical terms, Bowyer’s results suggest that the false match rate for a system would increase to 2.5 in 2 million after three years had elapsed. This rate sounds low, but the effect appears to be cumulative, says Bowyer: “So although you might not really notice the problem after one year or two years, after five or ten years it can become a huge problem,” he explains.

But some are not convinced that the iris ageing effect will make a noticeable difference to the false match rate — even in huge national iris-identification schemes such as India’s, which so far has more than 200 million people enrolled. Biometrics expert Vijayakumar Bhagavatula of Carnegie Mellon University in Pittsburgh, Pennsylvania, says: “In my opinion, the impact of this research is to suggest that iris templates should be periodically updated.”

The iris isn’t the only thing that is changing over time, though. The matching algorithm changes, too. It seems to me that it’s important to know whether iris matching algorithms are becoming “smarter” faster than a person’s iris can change.

Customers should probably keep current on their support contract, just in case.

Voice Biometrics and ID Management in Call Centers

Voice Biometrics as a Fraud Fighter (Bank Info Security)

The biometric technology analyzes voice characteristics, such as dialect, speaking style and pitch. By collecting and archiving voice characteristics of customers, banks, in theory, could authenticate customers’ identities when they call in.

Call center fraud has been escalating. U.S. banks have reported upticks in call-center schemes that rely on social-engineering tricks. The attack: Convince customer service representatives to share or change account details.

The installed base of telephone technology pretty much guarantees that there will be huge incentives for voice recognition technology companies to develop better and better products and for financial companies to adopt them.

This article does a great job with the incentives and challenges of ID management by telephone.

See also:
The Con is Mightier than the Hack
Up to 20% of voice biometric samples could be fooled by ‘wolves’ (UK Register)
Phone ‘Line Noise’ As ID Management Technique
Voice Recognition ≠ Speech Recognition

Using the Body as a Unique Link Between Gadgets

Using the human body as a unique link between gadgets will not lead to novel biometric modalities.

Recently, a couple of different groups have created prototypes that use the human body as a link between two gadgets, one mobile and the other, stationary. The first used an acoustic signal transmitted from a smartphone through the user’s body to a doorknob to unlock the door. The second used electrical signals to transmit an MP3 file through the users body to a speaker system. That’s pretty cool.

In their most basic use cases (using the body as a wire), these innovations accomplish little that couldn’t be accomplished with a USB cable. But if these technologies come to incorporate a biometrics and ID management element, they could kick start a revolution in mobile computing and ID management.

It’s not hard to see how future iterations of similar systems might use biometric modalities already in use — such as integrating a fingerprint reader with the conduction sensor for authenticating a data link — but both sets of innovators have something more profound in mind: using the electrical/acoustic properties of the body itself as an identifier.

The company is looking at different applications. Bhikshesvaran said the company was exploring the notion that it could end up being a new biometric footprint, since bodies all possess a unique energy signature. The company hasn’t quite figured that one out yet.

and

Amento and his colleagues think they can add another layer of security to the smartphone key, too — one that’s based on the unique properties of people’s skeletons. Because of differences in bone lengths and density, people’s skeletons should carry vibrations differently, they think.

My guess is that the fingerprint verification at one end of the link will be relatively straightforward, provide strong authentication and will work well enough to render the development of the new conduction/acoustic modalities impractical even over the very long term.

This is because in order to displace the well-understood modality of fingerprints and in order to make developing them worthwhile, the novel approaches will have to prove themselves to offer advantages far in excess of fingerprints (in order to justify the R&D outlay) and I don’t see this happening.

Q: Are the electronic and acoustic properties of individuals stable?
A: Compared to fingerprints, I doubt it. Changing the chemistry or mass of a body will lead to minute changes in its electric or acoustic properties. Drinking a sports drink will change electrolyte levels and cause a tiny change in electric properties. Visiting a buffet, wearing a heavy backpack or changing shoes will change the acoustic properties of a person at least a little.

Q: Are the electronic and acoustic properties of individuals unique?
A: Compared to fingerprints, I doubt it. Fingerprints can be as funky as they want to be without killing anyone; not so with the chemistry behind conductivity or the skeletal structure of a person.

Q: How easy is it to measure the properties involved?
A: Conductive and acoustic properties may be unique enough for a team of doctors with infinite resources and lots of time to make a positive ID but not unique enough to enable a very fast, cheap and confident identification.

But the biggest reason these novel approaches are extremely unlikely to be adopted in the competitive marketplace is the very nature of the technology (skin on hardware) lends itself perfectly to the cheap, well-understood and reliable fingerprint tech. No other modality actual or theoretical stands to recommend itself more highly than finger/hand based biometrics and no profit seeking organization will likely devote the resources necessary to establish the reliability conduction/acoustic biometrics that will at best only ever be equal to fingerprints.

The more novel approaches will probably only ever be used as a method of weak authentication such as liveness testing so as to thwart the old rubber finger trick.