1 / 34

Biométrie

Biométrie. Méthodes alternatives. Biométries alternatives. Gait (démarche) Keystroke (frappe au clavier) Ear (forme de l’oreille). Reconnaissance de la démarche. Démarche (suite).

chiku
Download Presentation

Biométrie

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biométrie Méthodes alternatives

  2. Biométries alternatives • Gait (démarche) • Keystroke (frappe au clavier) • Ear (forme de l’oreille)

  3. Reconnaissance de la démarche

  4. Démarche (suite) • Gait recognition by radar focuses on the gait cycle formed by the movements of a person's various body parts move over time.."Researchers correctly identified 80 to 95 percent of individual subjects, with variances in that range among the three experiment days. In experiments last year, subjects started walking 50 feet away from the radar and then walked within 15 feet of it. Utilisation Doppler

  5. Spectrogram

  6. Harmoniques

  7. Homme ou chien ?

  8. Mesures Mesures effectuées sur 6 personnes: aspct: aspect ratio of moving region

  9. Mesures (suite)

  10. Problèmes en 3d

  11. Approches avec modèle

  12. Espace d’états Ankle=cheville Knee=genou

  13. Résultats

  14. Modèles élaborés

  15. Keystroke (frappe au clavier)

  16. The comparison between Keystroke Dynamics and other biometric solutions - software-only versus hardware-based - really emerges as an advantage when translated into real savings from an implementation and deployment perspective. As a software-only solution, • This technology requires no physical hardware to install and no manpower needed for client-side installations or upgrades. • The technology can be embedded in any in-house software application to augment entitlement-based access. • The implementation provides a seamless method to harden remote-access security. • It can be wrapped into your corporation's existing single-signon solution as a secondary authentication mechanism. • Simplified templates can be embedded into documents as a biometric signature (different from digital signature), and then verified from anywhere Frappe au clavier

  17. Keystroke Dynamics has already found its way into many areas in the past two years. For corporations, this technology has found uses in Network Security (single-signon, multi-password management, RADIUS, application access and document control management) as well as Asset Identification (online training, document signing, software licensing and PKI). The future of this technology in the corporation will hardly be seen by the end users. It will be embedded into many aspects of network infrastructure, and invisibly so. The consumer market has seen some integration of this technology in Personal Information Security (individual document encryption, online purchase verification, and secure laptop access). The greatest growth for this technology will be seen in the consumer market. As refinements in this technology allow verification with less input and alternative forms of input (stylus, for example), it will find its way into PDAs, Tablet PCs, RIM, ATMs, Cell phones, and Home Security Access Pads. Keystroke Dynamics is one of those subtle technologies that will raise the bar on access security without users ever knowing it. Aspect «marketing »

  18. Comment ça marche ? La reconnaissance par la frappe clavier prend analyse la manière de frapper un texte au clavier. L'utilisateur s'enregistre en tapant les mêmes mots un certain de nombre de fois. La vérification se base sur le rythme de frappe qui est particulier pour chaque personne. Les statistiques des temps de frappe entre deux personnes montre les différences

  19. Quelles caractéristiques ?

  20. exemples

  21. Organigramme et métrique

  22. Données statistiques

  23. Attaques

  24. Mouvements des lèvres

  25. Figure 5: Lip signature examples in the form of LS-DCT components: (top) across an utterance (with dc component removed for clarity); (bottom) for a single frame

  26. EEG

  27. EEG comme outil biométrique Modèle AR X(k)=S aiX(k-i)+Ek

  28. Ordre du modèle AR et performances

  29. Dentition La dentition est utilisée depuis longtemps en médecine légale, mais n'est pas vraiment considérée comme de la biométrie car ce n'est pas une méthode automatisée avec une acquisition de données sur l'individu vivant. Ceci dit, un système automatique d'identification de la dentition est développé (ADIS à l'université de Virginie Occidentale).

  30. suite • La forme de la couronne dentaire est analysée pour effectuer la reconnaissance

  31. « Tooth-print » • L'empreinte dentaire (morsure) n'est pas vraiment considérée comme une technique biométrique car elle n'est pas encore complètement automatisée, partant d'une capture sur un sujet vivant (c'est plutôt du domaine de la médecine légale), et la question de l'unicité des empreintes dentaires n'est toujours pas établies. • Voir aussi: US patent 4,580,977 (Ames, 1985).

  32. Biométrie fiction ? • Identification par TEP • ADN • Odeur • Expression faciale • Réaction cognitive • ?????

More Related