SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ADAPTATION AND IMPLEMENTATION TO A GRADUATE COURSE
                    DEVELOPMENT IN BIOMETRICS
                           Eric P. Kukula1, Nathan C. Sickler 2, and Stephen J. Elliott Ph.D. 3


     Abstract  Biometric research centers on five                            Engineering, Computer Science, Political Science,
fundamental areas: data collection, signal processing,                        Ergonomics, Statistics, and Technology. In the fall semester
decision-making, transmission, and storage. Traditionally,                    of 2002, a class was developed in Biometric Technology and
research occurred in subsets of the discipline in separate                    Applications designed to encourage cross-disciplinary
departments within universities such as algorithm                             education, where all five functions of the biometric model
development in computer science, and speech and computer                      come together in a multi-disciplinary approach.
vision in electrical engineering. In the fall semester of 2002,               Encompassing these various disciplines into one educational
a class in Biometric Technology and Applications was                          environment will encourage discussion on issues such as
developed to encourage cross-disciplinary education, where                    rigorous     methodologies      for    measuring      statistical
all areas of the biometric model would come together and                      effectiveness and the implementation of biometrics in
address issues such as research methodologies and the                         society at large.
implementation of biometrics in society at large. The course                     During the fall of 2002, TECH 581S was offered for the
has been modified to accommodate a wider audience,                            first time, with 20 students participating. The course
incorporate graduate student research, which is the                           development and syllabus was outlined in a paper by [2],
foundation for modular mini-courses tailored to specific                      and described the course overview, outline, as well as
majors and issues. Having an interdisciplinary group of                       objectives. Over the past two semesters, the course has been
student’s better mirrors the makeup of jobs involved in                       modified to account for a wider audience, as well as to
biometrics, such as management, marketing, or research.                       incorporate graduate student research, and to use the course
The challenge lies in providing a course that accounts for                    as a foundation to develop modular short courses that can be
these diverse needs.                                                          tailored to specific educational programs and real world
                                                                              issues, such as aviation security.
Index Terms  Biometrics, Curriculum Development,                                Another motivating factor in adapting the course was to
Technology, Graduate Education                                                cater to a wider audience. In the first semester of the course,
                                                                              the majority of students enrolled were junior or senior
               MOTIVATION AND BACKGROUND                                      undergraduate students in Computer Information Systems
                                                                              Technology or Industrial Technology, both housed in the
  Biometric identification technology is defined as the                       School of Technology. The second semester saw an increase
“automatic identification or identity verification of (living)                in the number of non-undergraduate technology majors. Out
individuals based on behavioral and physiological                             of 27 students that were enrolled, seven were outside of
characteristics” [1]. The nucleus of biometric research is                    these majors, including students in Aviation Technology,
divided into five fundamental areas: data collection, signal                  Computer Science, and Information Security. Furthermore
processing, decision-making, transmission, and storage.                       the course was added as a School of Management elective
Traditional research in biometrics has been undertaken                        and an Information Security elective. Widening the base of
separately in different subsets of the discipline, such as voice              students creates new opportunities for the class, as this wider
or speech processing, or algorithm development. These                         interdisciplinary group of students better mirrors the makeup
subsets have been developed in separate departments or                        of jobs that are involved in biometrics, whether they are in
disciplines within academia; for example, algorithm                           management, sales, marketing, or algorithm development,
development has occurred traditionally within computer                        testing, and integration.
science, while speech and computer vision development has                        The challenge was therefore to provide a course that
been developed in electrical engineering.                                     accounted for the needs of such a group of students.
  Furthermore, dissemination of results is traditionally
divided along technology lines. As such, biometric research
is a convergence of numerous disciplines like Electrical

1
  Eric P. Kukula, Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA,
sjelliott@tech.purdue.edu
2
  Nathan C. Sickler, Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA,
sjelliott@tech.purdue.edu
3
  Stephen J. Elliott, Ph.D., Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA,
sjelliott@tech.purdue.edu



© 2004 WCETE                                                                 March 14 - 17, 2004, São Paulo, BRAZIL
                                    World Congress on Engineering and Technology Education
                                                              183
COURSE ADAPTATION AND IMPLEMENTATION                                   and multi biometrics – voice, lip
                                                                           and facial recognition.
   The first step focused on the weaknesses of the current              g) Understand   the   limitations of
course. During the first session of the graduate course in                 biometric technologies.
Biometrics, students were placed in groups and did a
                                                                    New objectives were developed, as a
literature review on possible major attacks to biometric           result of the change in curriculum, as
devices. At that time, Matsumoto had just released work on         well as experience with the course. The
sensor vulnerabilities, specifically relating to fingerprinting.   first objective was to examine the
His premise was fingerprints could be recreated using              fundamentals of testing and evaluation of
gelatin and the sensor would acquire the image [3]. One            biometric technologies. This is a broader
student group replicated his work and found several                objective    from    which     to    provide   a
                                                                   stronger foundation for the students.
weaknesses in his methodology. This group then presented           This also ties into the new group project
the results to the other research groups in the class, who then    that is described later.
adapted the methodology to see whether they could spoof             The second objective was to understand
the sensors. From this work, the students managed to find          the   process    of    biometric      standards,
weaknesses in sensors when fingerprints were taken                 performance, and assurance, all of which
cooperatively. This research is continued today by                 play a key role in biometric development
examining whether non-cooperatively lifted fingerprints can        and will contribute to the growth of the
                                                                   sector.    Students       with     a    detailed
be created to spoof fingerprint devices. Not only does this        understanding of the standards process
have specific cultural and security repercussions, but also the    will    be     invaluable       to     potential
creation of low cost fake fingers provides another insight to      employers, as the role of standards
the security of fingerprints.                                      within the biometric industry continue to
   In the second offering of the course, groups were smaller       grow in importance. Industry is now
and the projects were more diverse, resulting in a course-         working    on    standards       that    include
load that was harder to manage. Smaller groups of two, or          interchange         formats,           technical
                                                                   interfaces,     application      profiles    for
even individual projects may have enhanced individual              interoperability and data interchange for
learning, but it was not as effective as the first semester        transportation workers and border control
group work. Therefore, it was decided that for the next            applications.     Understanding performance
offering, one semester long project would be assigned to the       is also important in the biometrics
group, split up into different projects, centering on specific     field. Reference [4] outlined weaknesses
individuals strengths, directly relating to their respective       in facial recognition when measuring
                                                                   algorithm        performance           vis-à-vis
fields.                                                            illumination      levels.      Reference     [5]
   The authors also examined the weaknesses of the course          observed that there were challenges with
and specifically technology students’ knowledge in the key         the   quality     of    fingerprints      across
biometric areas. This revealed weaknesses in the areas of          different      populations,        specifically
biometric equations and the underlying mathematics,                between the elderly and eighteen to
specifically a lack of knowledge on image processing; and          twenty-five year olds. As students start
the how to develop algorithms. These issues will be                to work in the field of biometrics or the
                                                                   security industry, they will need to
particularly addressed in the adapted course through the           understand    how    tests     are    developed,
inclusion of graduate research in these specific fields.           formulated      and     results       presented.
     The objectives of the initial course are shown below:         Biometric       performance         can     vary
        a)          Classify                      biometric        drastically depending on the conditions
          applications.                                            with which the test was done, and as such
        b)          Identify          techniques           for     can impact an implementation [6]. The
          testing biometric devices.                               third   aspect     of    this    objective    is
        c)          Apply          “best          practice”        assurance of the biometric, specifically
          techniques for biometric project                         with regard to its vulnerability of the
          management and implementation.                           biometric sensor relationship.
        d)          Understand which biometrics                     The third objective was to examine the
          technology is best for a given                           advantages and disadvantages of each
          application.                                             biometric      technology.         Given     the
        e)          Understand         the      ethics       of    foundation established in the first two
          biometric technologies.                                  objectives, students will gain a broader
        f)          Understand the fundamentals                    understanding of the technology. For
          of fingerprinting, iris scanning,                        example, if objectives one and two were
          speaker             verification,               hand     not    covered      before      the     specific
          geometry,             dynamic           signature        technology, students may just examine the
          recognition, facial recognition,                         technology as opposed to the applications



© 2004 WCETE                                                            March 14 - 17, 2004, São Paulo, BRAZIL
                               World Congress on Engineering and Technology Education
                                                         184
and environments that the technology is                           documentation. They prepared the human subjects
used in.                                                          paperwork required as part of the project.
  The fourth objective was to adapt and                              The third group is the Network group. These individuals
implement the concepts already developed
in the first three objectives and relate                          design and built as well as simulated the test conditions. This
them to specific biometric applications.                          required the network group to provide network architecture
  The fifth objective was to generate,                            diagrams, write a manual for the test, and to ensure that the
evaluate, and critically report on real                           biometric devices communicate with the database.
world   biometric   implementations.  The                         Furthermore, the network group had to work with the
School of Technology strategic plan is to                         administrative team to answer any questions on the use of
provide students with an applied focus.                           the devices, enrollment issues, and threshold settings. The
By having students critically evaluate
biometric systems, they are be better                             network group also provided a report summarizing the
placed     to    evaluate    their    own                         results of the scenario test, and any particular issues that they
implementation schemes, developed as part                         found in the lab test that affected the deployment of the
of semester project.                                              biometric system.
                                                                     The Implementation team designed, built and operated the
                      GROUP PROJECT                               final installation, trained staff; oversaw user training, and
                                                                  other everyday operations of the biometric system that arose
   Following the experiences with two previous course
                                                                  during implementation.
strategies, it was decided that the class should do one project
                                                                     The concept behind the group project was to simulate a
which would be split into specific areas, focusing on an
                                                                  real world implementation project, but within an academic
individual’s core strengths. The group project will also
                                                                  setting. The groups all interacted with each together, with
encompass all of the course objectives, and provide students
                                                                  weekly reports submitted to each group, and collated by the
with a real-world application from which to draw
                                                                  project management team.
experiences on.
   Successful biometric implementations are highly
dependent on a number of factors, such as environment,                               SESSION OVERVIEW
population, user attitudes, etc. Each deployment of a
biometric technology will be different, and as such have            The course was divided up into ten sessions focusing on a
different results and performance. In order to provide the        particular concept, ranging from biometric standards,
client with a successful biometric implementation, a detailed     specific technologies, and implementation / project
site survey has to be completed. Students at Purdue               management. Each session was been restructured to give
University are fortunate to have a number of facilities at        students the ability to make presentations on particular
their disposal to do site surveys. This semester, students did    research topics relating to biometric implementations. Each
a site survey of the university recreation facility. The survey   session is three hours long, and was divided up into specific
included interviews of the recreational facility                  sections – the first, relating to contemporary issues of the
administrators, a detailed building and grounds assessment,       specific session, for example, testing and evaluation, or
an assessment of the population, the development of a             homeland security. The second part of the session was for
detailed test plan, and recommendation of the biometric           student to present on their specific findings from their own
technology and implementation strategy to use. Once all the       research. The third part of the session looked at specific case
students had completed the site survey, they presented their      studies and developed a correlation with the first two parts
findings in class, and a comprehensive document was               of the session.
produced. Students were then positioned into four subgroups
that concentrated on a number of areas.                                                   SESSION ONE
   The first subgroup was Project Management. This group
created a timeline for the course project, determined system        The first session overviewed and refreshed students of
expectations from the management and staff, analyzed              biometric technology. As the majority of students are
throughput data from the selected entry points, and               undergraduates from the School of Technology, specifically
summarized the site survey. They acted as managers for the        within the Computer Information Systems Technology and
other subgroups. The project management team will also            Industrial Technology majors, they would have taken IT 345
report their progress to the class each week.                     Introduction to Automatic Identification and Data Capture.
   The second subgroup is the Administrative team. They           This course would have exposed them to the fundamentals
investigated current procedures and best practices being          of biometric technologies, and given them ‘hands-on’
operated at other similar facilities. They established            experience in the laboratory. The lecture component of
procedures and generated instructions for the enrollment and      Session One was an introduction of Biometrics, as well as
verification of users, a procedures manual, and technical         the administrative information on the course and laboratory.
                                                                  Students had to prepare a memorandum, outlining as many
                                                                  biometric implementations as they can find, and create a five



© 2004 WCETE                                                            March 14 - 17, 2004, São Paulo, BRAZIL
                               World Congress on Engineering and Technology Education
                                                         185
minute oral presentation outlining their findings. The group                              SESSION FOUR
will use one of these presentations to complete the next
session’s activities.                                                  Session four is a transitional session, as the class makes
                                                                    the move from group project presentations to specific
                       SESSION TWO                                  technologies. The session started with a discussion on the
                                                                    findings of the site survey, and also featured a presentation
   The second session elaborated on biometric testing and           from a representative of the recreational facility. The second
evaluation, as well as an overview of the mathematical              part of the session included a discussion on dynamic
foundation of biometrics. Students read the U.K. Biometric          signature verification. Students made a brief presentation on
Best Practice document. This prepared them for group                applications within dynamic signature verification. The
project work. The Best Practice document is a                       lecture component outlined the fundamentals of dynamic
comprehensive guide to testing and evaluation. Students will        signature verification, the differences between digitized,
have to use this document extensively in their preparation          dynamic, and digital signatures, and how to forensically
for the group project, and note any deviations from the best        assess a signature. There was a discussion on the levels of
practice in any research that they may undertake. For an            information required to forge a signature. There was also a
evaluation to be accepted by the biometric community, the           discussion on the signature standard currently going through
details of the evaluation procedure must be published along         the standardization process at the US level (M1).
with the evaluation methodology and results. Each person
made a brief presentation from their homework assignment
(the memorandum). Following the presentation, several of                                  SESSION FIVE
these case studies were then used to demonstrate deviations
from the UK Best Practice document, and to examine the                Session five outlined a number of different technologies,
reasons behind the deviations. The next memorandum, or              including gait, lip, voice, keystroke, and odor. One of the
assignment, due in Session 3 was designed for students to           weaknesses of technology students is the fact that they do
conduct some preliminary research on hand geometry.                 not have any experiences with biometric algorithms. This
                                                                    lecture outlined how a keystroke dynamic algorithm works,
                      SESSION THREE                                 and how to create one. This session included laboratory
                                                                    activities, where they scheduled a two hour block of time in
  The third session discussed issues relating to large-scale        the Biometric Standards, Performance, and Assurance
biometrics, such as national ID systems, issues relating to         Laboratory giving them experiences in dynamic signature
homeland security, drivers’ licenses, and border security.          verification, participate in keystroke dynamic data
There was a discussion on hand geometry implementations             collection, and use a web-based voice recognition
in universities, such as the University of Georgia, San Diego       demonstration. The memorandum topic for the next week
State University, and Purdue University. There were other           was to research fingerprint technologies.
case studies relating to hand geometry, notably the San
Francisco International Airport. Hand geometry was                                         SESSION SIX
discussed at length as it is most likely to be the biometric
chosen in the semester project. The class was briefed on the          Session six examined the topic of fingerprint
group project, and developed a list of questions to ask the         authentication. The session began with oral presentations of
administrators, examined past surveys and developed a plan          the memorandums assigned in session 5, with students
of action for the site survey. Each student independently           describing implementations using fingerprint technologies.
visited the recreational facility and drew up their site survey     A graduate student presented his research on fingerprint
assignment. They then presented this information at the             quality [5] and a guest speaker described the implementation
beginning of Session 4. Students prepared a memorandum              of fingerprinting in automatic teller machines. Finally, there
on dynamic signature verification. Students were responsible        was a technical presentation on pattern based fingerprint
for completing a human subject test, in order to make them          recognition, and minutiae based recognition. Students had to
fully aware of the Institutional Review Board policy, which         schedule a one hour block of time in the lab so that they can
monitors research that involves the use of human subjects.          demonstrate the use of different types of fingerprint scanners
                                                                    available in the laboratory. The lab has quality software, and
                  SESSIONS FOUR - NINE                              students were able to use this software to assess quality.
                                                                    Students had to use Minitab to perform an Analysis of
  Sessions four through nine related to specific                    Variance on dynamic signature verification. This will expose
technologies. These technologies include dynamic signature          students to statistical software, specifically Minitab, and
verification; gait, lip, voice, keystroke, and odor; fingerprint;   provide them with experience in analyzing data.
face; iris; and emerging technologies. This section briefly
outlines each of these specific sessions.                                                SESSION SEVEN




© 2004 WCETE                                                             March 14 - 17, 2004, São Paulo, BRAZIL
                                World Congress on Engineering and Technology Education
                                                          186
Session seven described face recognition. Again, in a             Reference [4] research focused on the influence of
similar fashion to session six, graduate students presented       variations in illumination levels on the performance of a face
their work. The session began with oral presentations of the      recognition algorithm, specifically testing the significance
memorandums assigned in session six, based on facial              between verification attempts and enrollment conditions
recognition applications. A graduate student presented his        with respect to factors of age, gender, ethnicity, facial
research [4] and an undergraduate student presented his           characteristics and facial obstructions. Reference [4]
work on an implementation at Purdue University airport [9].       evaluated the performance of a commercially available facial
There was a demonstration of face recognition and the             recognition algorithm for the verification of an individual’s
effects of light on performance. Again, this is another           identity (1:1) across varying three illumination levels.
example of graduate research being transformed into the             This preliminary study showed that for low light
classroom.                                                        enrollment the verification rate for low light attempts was
                                                                      Low Light - 8   Lux   Medium Light –   High Light - 800
                      SESSION EIGHT                                                         423 Lux          Lux
   Session eight outlined iris recognition, where students
presented their research memorandums on iris recognition
deployments during the first part of the session. Following
the presentations, a lecture on iris recognition was given,
outlining the fundamentals of the technology, the structure
of the eye, followed by the iris recognition standard.                                FIGURE 1: SAMPLE VERIFICATION
Students scheduled a session in the laboratory to learn about                                     IMAGES
client server software and how to enroll and deploy iris
templates across a system. Other experiments will include         89.62%, 57.40% for medium light attempts, and 58.70% for
habituation experiments on the Panasonic Authenticam iris         high light attempts. For medium light enrollment the
camera. These laboratory activities were scheduled out of         verification rate for low light attempts was 73.88%, 91.48%
class, and lasted approximately 50 minutes.                       for medium light and 95.37% for high light attempts. For
                                                                  both low and medium light enrollments there was a
                      SESSION NINE                                statistically significant difference between verification
                                                                  attempts at α = 0.01. Lastly, for high light enrollment, the
  Session nine concluded the discussion on specific               verification rate for low light attempts was 80.55%, 89.44%
biometric technologies and how they relate to industrial case     for medium light attempts, and 94.25% for high light
studies. Students presented a memorandum on emerging              attempts. For the high light enrollment, there was no
technologies, and the formal lecture discussed these and the      statistically significant difference between verification
current state of the art technologies. The second part of the     attempts made at low, medium, or high light at α = 0.01. The
session discussed the semester project.                           broader impact of this work is that facial recognition
                                                                  technology from still or video sources is becoming a
                       SESSION TEN
                                                                  practical tool for law enforcement, security, and counter-
  Session ten was the final session of the semester, and          terrorist applications despite the limitations of current
included feedback from the semester project, analysis of the      technology. At this time, facial recognition holds promise
laboratory tests, as well as the implementation of the hand       and has been implemented in limited applications, but has
geometry project at the recreational facility. The session also   not been exhaustively researched in adverse conditions,
included a guest speaker who will pose a problem to the           which initiated this research aimed at improving algorithms
class, and they will then break up into groups and present        to compare images or representations of images to recognize
back to the guest approximately 45 minutes later. This will       a suspect in varying conditions [7].
be a capstone to all the knowledge gained in the course.             Another image quality issue is the lack of substantial
                                                                  research with the elderly population. According to the
                                                                  Fingerprint Verification Competition website [8]; “interest
     GRADUATE RESEARCH INITIATED BY THE                           in fingerprint-based biometric systems has grown
                 COURSE                                           significantly,” and as such, a fingerprint verification
                                                                  competition using fingerprint images was undertaken. Even
  Over the past year, the TECH 581 class has encouraged           this competition, one of the widest publicized competitions
students to participate in applied research. Three students       in fingerprinting, still has relatively small and homogenous
that have taken the course are now pursuing Masters               databases. Database 1 in the competition had fingerprints
Degree’s in the School of Technology, specifically relating       that were obtained from a low cost sensor, using up to four
to biometrics. Some of these examples are highlighted             fingerprints from each volunteer, aged mainly between 20 to
below.                                                            30 year olds and about 50% male. Database 2 was acquired



© 2004 WCETE                                                            March 14 - 17, 2004, São Paulo, BRAZIL
                               World Congress on Engineering and Technology Education
                                                         187
by using a low cost capacitive sensor, again with a                                              CONCLUSION
population of half males, aged between 20 to 30 year olds.
Database 3 had fingerprints from 19 volunteers aged 5 to 73,           This paper was written to provide practitioners with an
with 55% male distribution. One third of the volunteers in           update to the graduate course in Biometrics as first outlined
this database were over 55, and one third of the volunteers          in [2]. As courses develop and evolve, they change to
were under 18 years of age. Database 4 was made up of                accommodate new technologies and information. This
computer-generated fingerprints [8]. It is clear that the            course, in its third semester has continued to advance the
elderly are not well represented in this database as they are        biometrics education offered by the Department of Industrial
not an easy population to gain access to. Therefore, in many         Technology, provide students with the knowledge required
cases, biometric testing does not include them. By partnering        to design, build, and implement biometric solutions with
with the Gerontology department, the PI gained access to a           commercially available off-the-shelf products. The support
large testing pool, and therefore contributed significantly to       of several biometrics vendors has also helped in the
the biometric community. Furthermore, this is of significant         development of this course, as well as a grant from the e-
societal interest, as many countries are examining biometric         Enterprise Center at Discovery Park, Purdue University.
deployments on identity cards.
                                                                                                   REFERENCES
                                                                     [1]   Wayman, J., & Alyea, L. (2000). Picking the Best Biometric for Your
                                                                           Applications. In SJSU Biometrics. San Jose, California: San Jose State
                                                                           University. Retrieved April 14, 2000 from the World Wide Web:
                                                                           http://www.engr.sjsu.edu/biometrics/publications_tech.html
                                                                     [2]   Elliott, S. J., & Sutton, M. J. (2002a). Graduate Course Development
                                                                           in Biometrics. Proceedings of the 2002 ASEE/SEFI/TUB International
                                                                           Colloquium, Berlin, Germany.
                                                                     [3]   Matsumoto, H. M. T., Yamada, K., Hoshino, S. (2002). Impact of
                                                                           Artificial Gummy Fingers on Fingerprint Systems. Proceedings of
                                                                           SPIE Vol. #4677, Optical Security and Counterfeit Deterrence
                                                                           Techniques IV, 2002.
                                                                     [4]   Kukula, E. P., & Elliott, S. J. (2003). Securing a Restricted Site -
Figure 4. Visual display of the effectiveness quality of the
                                                                           Biometric Authentication at Entry Point. 2003 IEEE International
low quality dry image (left) and the high quality normal                   Carnahan Conference on Security Technology (ICCST), Taipei,
image (right). A green area has good image quality, and all                Taiwan, ROC.
other colors indicate poor image quality.                            [5]   Sickler, N. C., & Elliott, S. J. (2003, May). An Evaluation of
                                                                           Fingerprint Quality Across an Elderly Population vis-à-vis 18-25 year
   The collection of this data, whether it be for template                 olds. Poster session presented at Energizing the Enterprise:
aging, system performance, or image quality is extremely                   Technology Connecting Science, Business, Manufacturing, and
                                                                           Service: An Overview of Purdue University Wide Research on the
important for the biometric research community, and society                Use of Computing and Communications to Impact the Enterprise,
at large, because we do not know the answer to this                        West Lafayette, IN.
fundamental question – how distinctive are individuals?              [6]   Wheeler, G., Courtney, P., Cootes, T., & Taylor, C., "Performance
   If a biometric is not as distinctive as first thought, then one         Assessment of a Face-Verification Based Access Control System,"
                                                                           presented at Fourth IEEE International Conference on Automatic Face
person may be mistaken for another, and the premise that                   and Gesture Recognition, 2000.
biometrics are unique is then flawed. This is a fundamental          [6]   Morton, J. M., Portell, C. M., Elliott, S. J., & Kukula, E. P. (2003)
research question posed by the biometric research                          Facial Recognition at Purdue University’s Airport 2003-2008. 2003
community, and can only be answered by significant data                    IEEE International Carnahan Conference on Security Technology
                                                                           (ICCST), Taipei, Taiwan, ROC.
collection efforts across a number of years, as well as across       [7]   Paul, R. "3-D Face Modeling and Display," Director of Central
varying demographics. Comprehensive data collection in                     Intelligence Agency February 27, 2002.
this area will contribute significantly to the field.                [8]   Fingerprint Verification Competition (2003). Retrieved June 16, 2003
Understanding how distinctive individuals behave, under a                  from http://bias.csr.unibo.it/fvc2002/
number of different environmental conditions relates to
system performance. If an individual enrolls under one
condition, such as a well-lit environment, can the system
acquire a good image in another environment, such as a low
light condition [4]? If the individual cannot be verified, and
is falsely rejected, then this may affect their opinion of the
specific biometric, and the way they interact with it (if at
all), at subsequent visits. Proper presentation will produce a
better quality image, which therefore increases the
performance of the device, and provides better results. Also,
with increased performance, user psychology about the
device may also improve.


© 2004 WCETE                                                             March 14 - 17, 2004, São Paulo, BRAZIL
                                World Congress on Engineering and Technology Education
                                                          188

Weitere ähnliche Inhalte

Was ist angesagt?

The influence of students’ ict skill and their adoption of mobile learning
The influence of students’ ict skill and their adoption of mobile learningThe influence of students’ ict skill and their adoption of mobile learning
The influence of students’ ict skill and their adoption of mobile learningktmyst
 
Jafari moghadam et al 2012 new
Jafari moghadam et al 2012 newJafari moghadam et al 2012 new
Jafari moghadam et al 2012 newcrebusproject
 
Alabama Technology Education Course of Study 2009
Alabama Technology Education Course of Study 2009Alabama Technology Education Course of Study 2009
Alabama Technology Education Course of Study 2009Shawndra Bowers
 
Technology action plan tamara klir
 Technology action plan tamara klir  Technology action plan tamara klir
Technology action plan tamara klir tklir
 
Opportunities in nano technology as a career
Opportunities in nano technology as a careerOpportunities in nano technology as a career
Opportunities in nano technology as a careerSurabhi Rt
 
Whos Talking, Listening, and Learning Now
Whos Talking, Listening, and Learning NowWhos Talking, Listening, and Learning Now
Whos Talking, Listening, and Learning NowVideoguy
 
Technology Flow Chart, Professional Development, And Action Plan
Technology Flow Chart, Professional Development, And Action PlanTechnology Flow Chart, Professional Development, And Action Plan
Technology Flow Chart, Professional Development, And Action PlanBianca Darley
 
Vi Ca Di S And Mobile Learning
Vi Ca Di S And Mobile LearningVi Ca Di S And Mobile Learning
Vi Ca Di S And Mobile Learningn.groen
 
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...Gonçalo Cruz Matos
 
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...eMadrid network
 
What is good ICT practice?
What is good ICT practice?What is good ICT practice?
What is good ICT practice?Miles Berry
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...eLearning Papers
 
BTC FdSc Programme Specification
BTC FdSc Programme SpecificationBTC FdSc Programme Specification
BTC FdSc Programme SpecificationJames Uren
 
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...eLearning Papers
 
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...Decision Making under Uncertainty: R implementation for Energy Efficient Buil...
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...Emilio L. Cano
 

Was ist angesagt? (20)

The influence of students’ ict skill and their adoption of mobile learning
The influence of students’ ict skill and their adoption of mobile learningThe influence of students’ ict skill and their adoption of mobile learning
The influence of students’ ict skill and their adoption of mobile learning
 
Fayston techplanjune2009
Fayston techplanjune2009Fayston techplanjune2009
Fayston techplanjune2009
 
Jafari moghadam et al 2012 new
Jafari moghadam et al 2012 newJafari moghadam et al 2012 new
Jafari moghadam et al 2012 new
 
Ref
RefRef
Ref
 
Alabama Technology Education Course of Study 2009
Alabama Technology Education Course of Study 2009Alabama Technology Education Course of Study 2009
Alabama Technology Education Course of Study 2009
 
Technology action plan tamara klir
 Technology action plan tamara klir  Technology action plan tamara klir
Technology action plan tamara klir
 
(2009) Providing Students with Feedback for Continuous Improvement
(2009) Providing Students with Feedback for Continuous Improvement(2009) Providing Students with Feedback for Continuous Improvement
(2009) Providing Students with Feedback for Continuous Improvement
 
Opportunities in nano technology as a career
Opportunities in nano technology as a careerOpportunities in nano technology as a career
Opportunities in nano technology as a career
 
Whos Talking, Listening, and Learning Now
Whos Talking, Listening, and Learning NowWhos Talking, Listening, and Learning Now
Whos Talking, Listening, and Learning Now
 
Technology Flow Chart, Professional Development, And Action Plan
Technology Flow Chart, Professional Development, And Action PlanTechnology Flow Chart, Professional Development, And Action Plan
Technology Flow Chart, Professional Development, And Action Plan
 
Students’ Performance and Satisfaction with the Cisco Academy Networking Pr...
Students’ Performance and Satisfaction  with the Cisco Academy Networking  Pr...Students’ Performance and Satisfaction  with the Cisco Academy Networking  Pr...
Students’ Performance and Satisfaction with the Cisco Academy Networking Pr...
 
Computer Education
Computer EducationComputer Education
Computer Education
 
Vi Ca Di S And Mobile Learning
Vi Ca Di S And Mobile LearningVi Ca Di S And Mobile Learning
Vi Ca Di S And Mobile Learning
 
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...
Social networks, microblogging, virtual worlds, and Web 2.0 in the teaching o...
 
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...
2012 04-19 (educon2012) emadrid uc3m m-learning will disrupt educational prac...
 
What is good ICT practice?
What is good ICT practice?What is good ICT practice?
What is good ICT practice?
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
 
BTC FdSc Programme Specification
BTC FdSc Programme SpecificationBTC FdSc Programme Specification
BTC FdSc Programme Specification
 
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
 
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...Decision Making under Uncertainty: R implementation for Energy Efficient Buil...
Decision Making under Uncertainty: R implementation for Energy Efficient Buil...
 

Ähnlich wie (2004) Adaptation and Implementation to a Graduate Course Development in Biometrics

Information Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaInformation Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaIJMER
 
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Simon Fraser University
 
Developing a Computer-Assisted Instruction Model for Vocational High Schools
Developing a Computer-Assisted Instruction Model for Vocational High SchoolsDeveloping a Computer-Assisted Instruction Model for Vocational High Schools
Developing a Computer-Assisted Instruction Model for Vocational High Schoolsinventy
 
Project Management Courses in IS Graduate Programs What is Being .docx
Project Management Courses in IS Graduate Programs What is Being .docxProject Management Courses in IS Graduate Programs What is Being .docx
Project Management Courses in IS Graduate Programs What is Being .docxwkyra78
 
CS0: A Project Based, Active Learning Course
CS0: A Project Based, Active Learning CourseCS0: A Project Based, Active Learning Course
CS0: A Project Based, Active Learning Coursedrboon
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
A Single Case Study Approach To Teaching Effects On Learning And Understanding
A Single Case Study Approach To Teaching  Effects On Learning And UnderstandingA Single Case Study Approach To Teaching  Effects On Learning And Understanding
A Single Case Study Approach To Teaching Effects On Learning And UnderstandingKaren Benoit
 
A Study on Impact of Multimedia Approach Teaching –Learning Process
A Study on Impact of Multimedia Approach Teaching –Learning ProcessA Study on Impact of Multimedia Approach Teaching –Learning Process
A Study on Impact of Multimedia Approach Teaching –Learning ProcessIRJET Journal
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
Competence frameworks v1
Competence frameworks v1Competence frameworks v1
Competence frameworks v1Helen Beetham
 
Remote learning via video conferencing technologies
Remote learning via video conferencing technologiesRemote learning via video conferencing technologies
Remote learning via video conferencing technologiesMark Anthony Camilleri
 
Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
 
Applying User Experience and Usercentered Design Software Processes in Underg...
Applying User Experience and Usercentered Design Software Processes in Underg...Applying User Experience and Usercentered Design Software Processes in Underg...
Applying User Experience and Usercentered Design Software Processes in Underg...IJCI JOURNAL
 
Assessment Of Online Professional Development On Faculty Teaching Virtually
Assessment Of Online Professional Development On Faculty Teaching VirtuallyAssessment Of Online Professional Development On Faculty Teaching Virtually
Assessment Of Online Professional Development On Faculty Teaching VirtuallyAllison Thompson
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
Investigating the roles of demographic profiles on usability assessment: case...
Investigating the roles of demographic profiles on usability assessment: case...Investigating the roles of demographic profiles on usability assessment: case...
Investigating the roles of demographic profiles on usability assessment: case...IAESIJAI
 
9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docxJospehStull43
 
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...IRJET Journal
 
Artículo Electricidad-y-electronica-industrial.pdf
Artículo Electricidad-y-electronica-industrial.pdfArtículo Electricidad-y-electronica-industrial.pdf
Artículo Electricidad-y-electronica-industrial.pdfmiguelangelquirozgar
 
A Systematic Literature Review Of Requirements Engineering Education
A Systematic Literature Review Of Requirements Engineering EducationA Systematic Literature Review Of Requirements Engineering Education
A Systematic Literature Review Of Requirements Engineering EducationEmma Burke
 

Ähnlich wie (2004) Adaptation and Implementation to a Graduate Course Development in Biometrics (20)

Information Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaInformation Communication Technology: Practices for Academia
Information Communication Technology: Practices for Academia
 
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
 
Developing a Computer-Assisted Instruction Model for Vocational High Schools
Developing a Computer-Assisted Instruction Model for Vocational High SchoolsDeveloping a Computer-Assisted Instruction Model for Vocational High Schools
Developing a Computer-Assisted Instruction Model for Vocational High Schools
 
Project Management Courses in IS Graduate Programs What is Being .docx
Project Management Courses in IS Graduate Programs What is Being .docxProject Management Courses in IS Graduate Programs What is Being .docx
Project Management Courses in IS Graduate Programs What is Being .docx
 
CS0: A Project Based, Active Learning Course
CS0: A Project Based, Active Learning CourseCS0: A Project Based, Active Learning Course
CS0: A Project Based, Active Learning Course
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
A Single Case Study Approach To Teaching Effects On Learning And Understanding
A Single Case Study Approach To Teaching  Effects On Learning And UnderstandingA Single Case Study Approach To Teaching  Effects On Learning And Understanding
A Single Case Study Approach To Teaching Effects On Learning And Understanding
 
A Study on Impact of Multimedia Approach Teaching –Learning Process
A Study on Impact of Multimedia Approach Teaching –Learning ProcessA Study on Impact of Multimedia Approach Teaching –Learning Process
A Study on Impact of Multimedia Approach Teaching –Learning Process
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Competence frameworks v1
Competence frameworks v1Competence frameworks v1
Competence frameworks v1
 
Remote learning via video conferencing technologies
Remote learning via video conferencing technologiesRemote learning via video conferencing technologies
Remote learning via video conferencing technologies
 
Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...Security in Learning Management Systems: Designing Collaborative Learning Act...
Security in Learning Management Systems: Designing Collaborative Learning Act...
 
Applying User Experience and Usercentered Design Software Processes in Underg...
Applying User Experience and Usercentered Design Software Processes in Underg...Applying User Experience and Usercentered Design Software Processes in Underg...
Applying User Experience and Usercentered Design Software Processes in Underg...
 
Assessment Of Online Professional Development On Faculty Teaching Virtually
Assessment Of Online Professional Development On Faculty Teaching VirtuallyAssessment Of Online Professional Development On Faculty Teaching Virtually
Assessment Of Online Professional Development On Faculty Teaching Virtually
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
Investigating the roles of demographic profiles on usability assessment: case...
Investigating the roles of demographic profiles on usability assessment: case...Investigating the roles of demographic profiles on usability assessment: case...
Investigating the roles of demographic profiles on usability assessment: case...
 
9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx9172020 Originality Reporthttpsucumberlands.blackboar.docx
9172020 Originality Reporthttpsucumberlands.blackboar.docx
 
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...
Use of Traditional Teaching Methods and Multimedia Techniques in Classroom Te...
 
Artículo Electricidad-y-electronica-industrial.pdf
Artículo Electricidad-y-electronica-industrial.pdfArtículo Electricidad-y-electronica-industrial.pdf
Artículo Electricidad-y-electronica-industrial.pdf
 
A Systematic Literature Review Of Requirements Engineering Education
A Systematic Literature Review Of Requirements Engineering EducationA Systematic Literature Review Of Requirements Engineering Education
A Systematic Literature Review Of Requirements Engineering Education
 

Mehr von International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Mehr von International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

(2004) Adaptation and Implementation to a Graduate Course Development in Biometrics

  • 1. ADAPTATION AND IMPLEMENTATION TO A GRADUATE COURSE DEVELOPMENT IN BIOMETRICS Eric P. Kukula1, Nathan C. Sickler 2, and Stephen J. Elliott Ph.D. 3 Abstract  Biometric research centers on five Engineering, Computer Science, Political Science, fundamental areas: data collection, signal processing, Ergonomics, Statistics, and Technology. In the fall semester decision-making, transmission, and storage. Traditionally, of 2002, a class was developed in Biometric Technology and research occurred in subsets of the discipline in separate Applications designed to encourage cross-disciplinary departments within universities such as algorithm education, where all five functions of the biometric model development in computer science, and speech and computer come together in a multi-disciplinary approach. vision in electrical engineering. In the fall semester of 2002, Encompassing these various disciplines into one educational a class in Biometric Technology and Applications was environment will encourage discussion on issues such as developed to encourage cross-disciplinary education, where rigorous methodologies for measuring statistical all areas of the biometric model would come together and effectiveness and the implementation of biometrics in address issues such as research methodologies and the society at large. implementation of biometrics in society at large. The course During the fall of 2002, TECH 581S was offered for the has been modified to accommodate a wider audience, first time, with 20 students participating. The course incorporate graduate student research, which is the development and syllabus was outlined in a paper by [2], foundation for modular mini-courses tailored to specific and described the course overview, outline, as well as majors and issues. Having an interdisciplinary group of objectives. Over the past two semesters, the course has been student’s better mirrors the makeup of jobs involved in modified to account for a wider audience, as well as to biometrics, such as management, marketing, or research. incorporate graduate student research, and to use the course The challenge lies in providing a course that accounts for as a foundation to develop modular short courses that can be these diverse needs. tailored to specific educational programs and real world issues, such as aviation security. Index Terms  Biometrics, Curriculum Development, Another motivating factor in adapting the course was to Technology, Graduate Education cater to a wider audience. In the first semester of the course, the majority of students enrolled were junior or senior MOTIVATION AND BACKGROUND undergraduate students in Computer Information Systems Technology or Industrial Technology, both housed in the Biometric identification technology is defined as the School of Technology. The second semester saw an increase “automatic identification or identity verification of (living) in the number of non-undergraduate technology majors. Out individuals based on behavioral and physiological of 27 students that were enrolled, seven were outside of characteristics” [1]. The nucleus of biometric research is these majors, including students in Aviation Technology, divided into five fundamental areas: data collection, signal Computer Science, and Information Security. Furthermore processing, decision-making, transmission, and storage. the course was added as a School of Management elective Traditional research in biometrics has been undertaken and an Information Security elective. Widening the base of separately in different subsets of the discipline, such as voice students creates new opportunities for the class, as this wider or speech processing, or algorithm development. These interdisciplinary group of students better mirrors the makeup subsets have been developed in separate departments or of jobs that are involved in biometrics, whether they are in disciplines within academia; for example, algorithm management, sales, marketing, or algorithm development, development has occurred traditionally within computer testing, and integration. science, while speech and computer vision development has The challenge was therefore to provide a course that been developed in electrical engineering. accounted for the needs of such a group of students. Furthermore, dissemination of results is traditionally divided along technology lines. As such, biometric research is a convergence of numerous disciplines like Electrical 1 Eric P. Kukula, Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA, sjelliott@tech.purdue.edu 2 Nathan C. Sickler, Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA, sjelliott@tech.purdue.edu 3 Stephen J. Elliott, Ph.D., Biometric Standards, Performance, and Assurance Laboratory, Room 242, 401 N. Grant St, West Lafayette, IN 47906, USA, sjelliott@tech.purdue.edu © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 183
  • 2. COURSE ADAPTATION AND IMPLEMENTATION and multi biometrics – voice, lip and facial recognition. The first step focused on the weaknesses of the current g) Understand the limitations of course. During the first session of the graduate course in biometric technologies. Biometrics, students were placed in groups and did a New objectives were developed, as a literature review on possible major attacks to biometric result of the change in curriculum, as devices. At that time, Matsumoto had just released work on well as experience with the course. The sensor vulnerabilities, specifically relating to fingerprinting. first objective was to examine the His premise was fingerprints could be recreated using fundamentals of testing and evaluation of gelatin and the sensor would acquire the image [3]. One biometric technologies. This is a broader student group replicated his work and found several objective from which to provide a stronger foundation for the students. weaknesses in his methodology. This group then presented This also ties into the new group project the results to the other research groups in the class, who then that is described later. adapted the methodology to see whether they could spoof The second objective was to understand the sensors. From this work, the students managed to find the process of biometric standards, weaknesses in sensors when fingerprints were taken performance, and assurance, all of which cooperatively. This research is continued today by play a key role in biometric development examining whether non-cooperatively lifted fingerprints can and will contribute to the growth of the sector. Students with a detailed be created to spoof fingerprint devices. Not only does this understanding of the standards process have specific cultural and security repercussions, but also the will be invaluable to potential creation of low cost fake fingers provides another insight to employers, as the role of standards the security of fingerprints. within the biometric industry continue to In the second offering of the course, groups were smaller grow in importance. Industry is now and the projects were more diverse, resulting in a course- working on standards that include load that was harder to manage. Smaller groups of two, or interchange formats, technical interfaces, application profiles for even individual projects may have enhanced individual interoperability and data interchange for learning, but it was not as effective as the first semester transportation workers and border control group work. Therefore, it was decided that for the next applications. Understanding performance offering, one semester long project would be assigned to the is also important in the biometrics group, split up into different projects, centering on specific field. Reference [4] outlined weaknesses individuals strengths, directly relating to their respective in facial recognition when measuring algorithm performance vis-à-vis fields. illumination levels. Reference [5] The authors also examined the weaknesses of the course observed that there were challenges with and specifically technology students’ knowledge in the key the quality of fingerprints across biometric areas. This revealed weaknesses in the areas of different populations, specifically biometric equations and the underlying mathematics, between the elderly and eighteen to specifically a lack of knowledge on image processing; and twenty-five year olds. As students start the how to develop algorithms. These issues will be to work in the field of biometrics or the security industry, they will need to particularly addressed in the adapted course through the understand how tests are developed, inclusion of graduate research in these specific fields. formulated and results presented. The objectives of the initial course are shown below: Biometric performance can vary a) Classify biometric drastically depending on the conditions applications. with which the test was done, and as such b) Identify techniques for can impact an implementation [6]. The testing biometric devices. third aspect of this objective is c) Apply “best practice” assurance of the biometric, specifically techniques for biometric project with regard to its vulnerability of the management and implementation. biometric sensor relationship. d) Understand which biometrics The third objective was to examine the technology is best for a given advantages and disadvantages of each application. biometric technology. Given the e) Understand the ethics of foundation established in the first two biometric technologies. objectives, students will gain a broader f) Understand the fundamentals understanding of the technology. For of fingerprinting, iris scanning, example, if objectives one and two were speaker verification, hand not covered before the specific geometry, dynamic signature technology, students may just examine the recognition, facial recognition, technology as opposed to the applications © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 184
  • 3. and environments that the technology is documentation. They prepared the human subjects used in. paperwork required as part of the project. The fourth objective was to adapt and The third group is the Network group. These individuals implement the concepts already developed in the first three objectives and relate design and built as well as simulated the test conditions. This them to specific biometric applications. required the network group to provide network architecture The fifth objective was to generate, diagrams, write a manual for the test, and to ensure that the evaluate, and critically report on real biometric devices communicate with the database. world biometric implementations. The Furthermore, the network group had to work with the School of Technology strategic plan is to administrative team to answer any questions on the use of provide students with an applied focus. the devices, enrollment issues, and threshold settings. The By having students critically evaluate biometric systems, they are be better network group also provided a report summarizing the placed to evaluate their own results of the scenario test, and any particular issues that they implementation schemes, developed as part found in the lab test that affected the deployment of the of semester project. biometric system. The Implementation team designed, built and operated the GROUP PROJECT final installation, trained staff; oversaw user training, and other everyday operations of the biometric system that arose Following the experiences with two previous course during implementation. strategies, it was decided that the class should do one project The concept behind the group project was to simulate a which would be split into specific areas, focusing on an real world implementation project, but within an academic individual’s core strengths. The group project will also setting. The groups all interacted with each together, with encompass all of the course objectives, and provide students weekly reports submitted to each group, and collated by the with a real-world application from which to draw project management team. experiences on. Successful biometric implementations are highly dependent on a number of factors, such as environment, SESSION OVERVIEW population, user attitudes, etc. Each deployment of a biometric technology will be different, and as such have The course was divided up into ten sessions focusing on a different results and performance. In order to provide the particular concept, ranging from biometric standards, client with a successful biometric implementation, a detailed specific technologies, and implementation / project site survey has to be completed. Students at Purdue management. Each session was been restructured to give University are fortunate to have a number of facilities at students the ability to make presentations on particular their disposal to do site surveys. This semester, students did research topics relating to biometric implementations. Each a site survey of the university recreation facility. The survey session is three hours long, and was divided up into specific included interviews of the recreational facility sections – the first, relating to contemporary issues of the administrators, a detailed building and grounds assessment, specific session, for example, testing and evaluation, or an assessment of the population, the development of a homeland security. The second part of the session was for detailed test plan, and recommendation of the biometric student to present on their specific findings from their own technology and implementation strategy to use. Once all the research. The third part of the session looked at specific case students had completed the site survey, they presented their studies and developed a correlation with the first two parts findings in class, and a comprehensive document was of the session. produced. Students were then positioned into four subgroups that concentrated on a number of areas. SESSION ONE The first subgroup was Project Management. This group created a timeline for the course project, determined system The first session overviewed and refreshed students of expectations from the management and staff, analyzed biometric technology. As the majority of students are throughput data from the selected entry points, and undergraduates from the School of Technology, specifically summarized the site survey. They acted as managers for the within the Computer Information Systems Technology and other subgroups. The project management team will also Industrial Technology majors, they would have taken IT 345 report their progress to the class each week. Introduction to Automatic Identification and Data Capture. The second subgroup is the Administrative team. They This course would have exposed them to the fundamentals investigated current procedures and best practices being of biometric technologies, and given them ‘hands-on’ operated at other similar facilities. They established experience in the laboratory. The lecture component of procedures and generated instructions for the enrollment and Session One was an introduction of Biometrics, as well as verification of users, a procedures manual, and technical the administrative information on the course and laboratory. Students had to prepare a memorandum, outlining as many biometric implementations as they can find, and create a five © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 185
  • 4. minute oral presentation outlining their findings. The group SESSION FOUR will use one of these presentations to complete the next session’s activities. Session four is a transitional session, as the class makes the move from group project presentations to specific SESSION TWO technologies. The session started with a discussion on the findings of the site survey, and also featured a presentation The second session elaborated on biometric testing and from a representative of the recreational facility. The second evaluation, as well as an overview of the mathematical part of the session included a discussion on dynamic foundation of biometrics. Students read the U.K. Biometric signature verification. Students made a brief presentation on Best Practice document. This prepared them for group applications within dynamic signature verification. The project work. The Best Practice document is a lecture component outlined the fundamentals of dynamic comprehensive guide to testing and evaluation. Students will signature verification, the differences between digitized, have to use this document extensively in their preparation dynamic, and digital signatures, and how to forensically for the group project, and note any deviations from the best assess a signature. There was a discussion on the levels of practice in any research that they may undertake. For an information required to forge a signature. There was also a evaluation to be accepted by the biometric community, the discussion on the signature standard currently going through details of the evaluation procedure must be published along the standardization process at the US level (M1). with the evaluation methodology and results. Each person made a brief presentation from their homework assignment (the memorandum). Following the presentation, several of SESSION FIVE these case studies were then used to demonstrate deviations from the UK Best Practice document, and to examine the Session five outlined a number of different technologies, reasons behind the deviations. The next memorandum, or including gait, lip, voice, keystroke, and odor. One of the assignment, due in Session 3 was designed for students to weaknesses of technology students is the fact that they do conduct some preliminary research on hand geometry. not have any experiences with biometric algorithms. This lecture outlined how a keystroke dynamic algorithm works, SESSION THREE and how to create one. This session included laboratory activities, where they scheduled a two hour block of time in The third session discussed issues relating to large-scale the Biometric Standards, Performance, and Assurance biometrics, such as national ID systems, issues relating to Laboratory giving them experiences in dynamic signature homeland security, drivers’ licenses, and border security. verification, participate in keystroke dynamic data There was a discussion on hand geometry implementations collection, and use a web-based voice recognition in universities, such as the University of Georgia, San Diego demonstration. The memorandum topic for the next week State University, and Purdue University. There were other was to research fingerprint technologies. case studies relating to hand geometry, notably the San Francisco International Airport. Hand geometry was SESSION SIX discussed at length as it is most likely to be the biometric chosen in the semester project. The class was briefed on the Session six examined the topic of fingerprint group project, and developed a list of questions to ask the authentication. The session began with oral presentations of administrators, examined past surveys and developed a plan the memorandums assigned in session 5, with students of action for the site survey. Each student independently describing implementations using fingerprint technologies. visited the recreational facility and drew up their site survey A graduate student presented his research on fingerprint assignment. They then presented this information at the quality [5] and a guest speaker described the implementation beginning of Session 4. Students prepared a memorandum of fingerprinting in automatic teller machines. Finally, there on dynamic signature verification. Students were responsible was a technical presentation on pattern based fingerprint for completing a human subject test, in order to make them recognition, and minutiae based recognition. Students had to fully aware of the Institutional Review Board policy, which schedule a one hour block of time in the lab so that they can monitors research that involves the use of human subjects. demonstrate the use of different types of fingerprint scanners available in the laboratory. The lab has quality software, and SESSIONS FOUR - NINE students were able to use this software to assess quality. Students had to use Minitab to perform an Analysis of Sessions four through nine related to specific Variance on dynamic signature verification. This will expose technologies. These technologies include dynamic signature students to statistical software, specifically Minitab, and verification; gait, lip, voice, keystroke, and odor; fingerprint; provide them with experience in analyzing data. face; iris; and emerging technologies. This section briefly outlines each of these specific sessions. SESSION SEVEN © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 186
  • 5. Session seven described face recognition. Again, in a Reference [4] research focused on the influence of similar fashion to session six, graduate students presented variations in illumination levels on the performance of a face their work. The session began with oral presentations of the recognition algorithm, specifically testing the significance memorandums assigned in session six, based on facial between verification attempts and enrollment conditions recognition applications. A graduate student presented his with respect to factors of age, gender, ethnicity, facial research [4] and an undergraduate student presented his characteristics and facial obstructions. Reference [4] work on an implementation at Purdue University airport [9]. evaluated the performance of a commercially available facial There was a demonstration of face recognition and the recognition algorithm for the verification of an individual’s effects of light on performance. Again, this is another identity (1:1) across varying three illumination levels. example of graduate research being transformed into the This preliminary study showed that for low light classroom. enrollment the verification rate for low light attempts was Low Light - 8 Lux Medium Light – High Light - 800 SESSION EIGHT 423 Lux Lux Session eight outlined iris recognition, where students presented their research memorandums on iris recognition deployments during the first part of the session. Following the presentations, a lecture on iris recognition was given, outlining the fundamentals of the technology, the structure of the eye, followed by the iris recognition standard. FIGURE 1: SAMPLE VERIFICATION Students scheduled a session in the laboratory to learn about IMAGES client server software and how to enroll and deploy iris templates across a system. Other experiments will include 89.62%, 57.40% for medium light attempts, and 58.70% for habituation experiments on the Panasonic Authenticam iris high light attempts. For medium light enrollment the camera. These laboratory activities were scheduled out of verification rate for low light attempts was 73.88%, 91.48% class, and lasted approximately 50 minutes. for medium light and 95.37% for high light attempts. For both low and medium light enrollments there was a SESSION NINE statistically significant difference between verification attempts at α = 0.01. Lastly, for high light enrollment, the Session nine concluded the discussion on specific verification rate for low light attempts was 80.55%, 89.44% biometric technologies and how they relate to industrial case for medium light attempts, and 94.25% for high light studies. Students presented a memorandum on emerging attempts. For the high light enrollment, there was no technologies, and the formal lecture discussed these and the statistically significant difference between verification current state of the art technologies. The second part of the attempts made at low, medium, or high light at α = 0.01. The session discussed the semester project. broader impact of this work is that facial recognition technology from still or video sources is becoming a SESSION TEN practical tool for law enforcement, security, and counter- Session ten was the final session of the semester, and terrorist applications despite the limitations of current included feedback from the semester project, analysis of the technology. At this time, facial recognition holds promise laboratory tests, as well as the implementation of the hand and has been implemented in limited applications, but has geometry project at the recreational facility. The session also not been exhaustively researched in adverse conditions, included a guest speaker who will pose a problem to the which initiated this research aimed at improving algorithms class, and they will then break up into groups and present to compare images or representations of images to recognize back to the guest approximately 45 minutes later. This will a suspect in varying conditions [7]. be a capstone to all the knowledge gained in the course. Another image quality issue is the lack of substantial research with the elderly population. According to the Fingerprint Verification Competition website [8]; “interest GRADUATE RESEARCH INITIATED BY THE in fingerprint-based biometric systems has grown COURSE significantly,” and as such, a fingerprint verification competition using fingerprint images was undertaken. Even Over the past year, the TECH 581 class has encouraged this competition, one of the widest publicized competitions students to participate in applied research. Three students in fingerprinting, still has relatively small and homogenous that have taken the course are now pursuing Masters databases. Database 1 in the competition had fingerprints Degree’s in the School of Technology, specifically relating that were obtained from a low cost sensor, using up to four to biometrics. Some of these examples are highlighted fingerprints from each volunteer, aged mainly between 20 to below. 30 year olds and about 50% male. Database 2 was acquired © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 187
  • 6. by using a low cost capacitive sensor, again with a CONCLUSION population of half males, aged between 20 to 30 year olds. Database 3 had fingerprints from 19 volunteers aged 5 to 73, This paper was written to provide practitioners with an with 55% male distribution. One third of the volunteers in update to the graduate course in Biometrics as first outlined this database were over 55, and one third of the volunteers in [2]. As courses develop and evolve, they change to were under 18 years of age. Database 4 was made up of accommodate new technologies and information. This computer-generated fingerprints [8]. It is clear that the course, in its third semester has continued to advance the elderly are not well represented in this database as they are biometrics education offered by the Department of Industrial not an easy population to gain access to. Therefore, in many Technology, provide students with the knowledge required cases, biometric testing does not include them. By partnering to design, build, and implement biometric solutions with with the Gerontology department, the PI gained access to a commercially available off-the-shelf products. The support large testing pool, and therefore contributed significantly to of several biometrics vendors has also helped in the the biometric community. Furthermore, this is of significant development of this course, as well as a grant from the e- societal interest, as many countries are examining biometric Enterprise Center at Discovery Park, Purdue University. deployments on identity cards. REFERENCES [1] Wayman, J., & Alyea, L. (2000). Picking the Best Biometric for Your Applications. In SJSU Biometrics. San Jose, California: San Jose State University. Retrieved April 14, 2000 from the World Wide Web: http://www.engr.sjsu.edu/biometrics/publications_tech.html [2] Elliott, S. J., & Sutton, M. J. (2002a). Graduate Course Development in Biometrics. Proceedings of the 2002 ASEE/SEFI/TUB International Colloquium, Berlin, Germany. [3] Matsumoto, H. M. T., Yamada, K., Hoshino, S. (2002). Impact of Artificial Gummy Fingers on Fingerprint Systems. Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002. [4] Kukula, E. P., & Elliott, S. J. (2003). Securing a Restricted Site - Figure 4. Visual display of the effectiveness quality of the Biometric Authentication at Entry Point. 2003 IEEE International low quality dry image (left) and the high quality normal Carnahan Conference on Security Technology (ICCST), Taipei, image (right). A green area has good image quality, and all Taiwan, ROC. other colors indicate poor image quality. [5] Sickler, N. C., & Elliott, S. J. (2003, May). An Evaluation of Fingerprint Quality Across an Elderly Population vis-à-vis 18-25 year The collection of this data, whether it be for template olds. Poster session presented at Energizing the Enterprise: aging, system performance, or image quality is extremely Technology Connecting Science, Business, Manufacturing, and Service: An Overview of Purdue University Wide Research on the important for the biometric research community, and society Use of Computing and Communications to Impact the Enterprise, at large, because we do not know the answer to this West Lafayette, IN. fundamental question – how distinctive are individuals? [6] Wheeler, G., Courtney, P., Cootes, T., & Taylor, C., "Performance If a biometric is not as distinctive as first thought, then one Assessment of a Face-Verification Based Access Control System," presented at Fourth IEEE International Conference on Automatic Face person may be mistaken for another, and the premise that and Gesture Recognition, 2000. biometrics are unique is then flawed. This is a fundamental [6] Morton, J. M., Portell, C. M., Elliott, S. J., & Kukula, E. P. (2003) research question posed by the biometric research Facial Recognition at Purdue University’s Airport 2003-2008. 2003 community, and can only be answered by significant data IEEE International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan, ROC. collection efforts across a number of years, as well as across [7] Paul, R. "3-D Face Modeling and Display," Director of Central varying demographics. Comprehensive data collection in Intelligence Agency February 27, 2002. this area will contribute significantly to the field. [8] Fingerprint Verification Competition (2003). Retrieved June 16, 2003 Understanding how distinctive individuals behave, under a from http://bias.csr.unibo.it/fvc2002/ number of different environmental conditions relates to system performance. If an individual enrolls under one condition, such as a well-lit environment, can the system acquire a good image in another environment, such as a low light condition [4]? If the individual cannot be verified, and is falsely rejected, then this may affect their opinion of the specific biometric, and the way they interact with it (if at all), at subsequent visits. Proper presentation will produce a better quality image, which therefore increases the performance of the device, and provides better results. Also, with increased performance, user psychology about the device may also improve. © 2004 WCETE March 14 - 17, 2004, São Paulo, BRAZIL World Congress on Engineering and Technology Education 188