Graduate Course Development in Biometrics

نویسندگان

  • Stephen J. Elliott
  • Mathias J. Sutton
چکیده

This paper accounts the development of a graduate course in biometrics at Purdue University. The course has been developed in conjunction with the inauguration of an applied biometrics research laboratory. The laboratory represents a Purdue-industry partnership through sponsored projects, advisory relationships, and financial support, industry partners assure that the laboratory achieves its potential in preparing students to perform effectively in the quickly evolving biometrics environment. The laboratory also serves as an educational resource for industry. Introduction TECH 581S Biometric Technology and Applications, is a class intended for upper-level undergraduates in a number of disciplines, including aviation technology, industrial technology, computer information systems technology, and management, as well as graduate students in technology. The course is limited to 20 students per semester for two primary reasons: first to enable a small number of undergraduate students to interact with graduate students who perform a mentoring role in research. Secondly, the development of small research teams allows several projects to be completed and gives the students a tangible research experience to accompany the lectures that span the various biometric technologies. A number of factors have driven the demand for the course: an expansion of current classes, an increase in the awareness of biometric technologies in multiple applications, and the demand from students, especially post 9/11, to learn more about biometric technologies. The purpose of the course is to examine biometric technologies from the viewpoint of systems integrator, purchaser, and evaluator. Success of the biometrics system is important; therefore, this course examines the fundamentals of testing and evaluation, writing technical reports, presenting research, understanding the process of establishing biometrics standards, and understanding the individual technologies. The course is consistent with the mission of the School of Technology and the Department of Industrial Technology to “assess the existing curricula and programs; develop new curricula/programs to make them relevant to the life and careers of students, attractive in terms of content, and connected to the needs of business and industry.” Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education Prerequisite Courses TECH 581S has no prerequisites, as it is intended to attract students from a number of disciplines into the biometrics arena, as these technologies themselves enter different applied environments. However, a number of undergraduate students that are participating in the first run of the course have had prior experience in biometric technologies in IT 345 Automatic Identification and Data Capture. Course Description The course is a three-hour, three-credit course that meets once a week for 16 weeks with an independent lab research component. The research activities are a major component of the class. As such research activities make up 50% of the course grade. Upon successful completion of the course, each student will be able to: a) Classify biometric applications. b) Identify techniques for testing biometric devices. c) Apply “best practice” techniques for biometric project management and implementation. d) Understand which biometrics technology is best for a given application. e) Understand the ethics of biometric technologies. f) Understand the fundamentals of fingerprinting, iris scanning, speaker verification, hand geometry, dynamic signature recognition, facial recognition, and multi biometrics – voice, lip and facial recognition. e) Understand the limitations of biometric technologies. Semester activities are divided into nine different sessions (see Table 1), which follow the main lecture topics. A few of the sessions span more than one week. Table 1 Session Schedule for TECH 581S Session Lecture Topic 1 Course Introduction and Pre-Test 2 Biometrics An Introduction 3 Biometric Testing and Evaluation 4 Dynamic Signature Verification 5 Hand Geometry 6 Fingerprint 7 Facial, Iris and Retinal Identification 8 Voice Recognition 9 Biometric Applications and Implementation Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education Research Activities The purpose of the research activities is to provide students with an applied research experience that they can use in their specific disciplines. Overall, there are 13 different research projects, which include fake finger testing, testing and evaluating fingerprint sensors on mobile computers, impostor knowledge within dynamic signature verification, and replication of a voice telematics experiment. However, most of the research activities are focused in two main areas: digital fingerprint and dynamic signature technology. The digital fingerprint thrust evolved based on discussions in the biometric community listserv on the “gummy finger” debate . This debate provided course developers with a unique opportunity to create a cross-disciplinary project team comprised researchers from the Schools of Management, Computer Science, and Technology to examine the research and to expand the body of knowledge in this topic. Furthermore, attacks (such as fake fingers on biometric sensors) discussed in the literature, enable students to examine research protocols, replicate the tests, and report those findings within a constrained 16-week semester. The research will provide vendors and industry partners with feedback on the performance of their sensors, given the attacks described. Initially, research activities will center on two biometric technologies – fingerprint and dynamic signature verification. There has been little work published on fingerprint sensor attacks. According to Matsumoto, Matsumoto, Yamada, and Hoshino , "security evaluation against attacks using such artificial fingers has rarely been disclosed." The second research focus is a continuation of work already started in dynamic signature verification technology. Within the realm of dynamic signature verification, forgery is discussed at length , but with conflicting definitions of a forgery. Laboratory Equipment Equipment donations to the laboratory, software, and hardware upgrades have provided the opportunity to offer a course in biometric technologies. This equipment includes a number of fingerprint sensors that use both pattern and minutiae based algorithms; a desktop iris recognition camera; several dynamic signature verification digitizers, and a hand geometry reader. Session Outline As noted earlier, the course is divided into nine distinct sessions, designed to group a number of lectures together within a particular topic. Session One – Course Introduction The first session introduces and outlines the course. A 100-item pre-test assesses students’ current knowledge across biometric technologies and their perceptions of the technology. At the completion of each session, a post-test will evaluate their knowledge on each specific technology and provide both student and instructor with useful information on the success of the instruction, as well as gaps in student knowledge. The first session also includes an on-line evaluation Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education component, where each student completes the National Institute of Health human subject tutorial. Each student will participate as subjects in fellow students’ research and as such must understand the requirements of the Purdue University Human Subjects Review Board. Session Two – Introduction to Biometrics The second session outlines biometric technologies and introduces students to biometric technologies. Students will learn common research methodologies, the classification of biometric technologies [20] and the fundamentals of biometric technology . Also included in this session is a discussion of testing protocols for dynamic signature verification . Session Three – Biometric Testing and Evaluation Session 3 discusses biometrics from a historical perspective . This session also includes readings and discussion on testing and evaluation, based on the UK Best Practice Testing Document and biometric applications and taxonomy . A discussion on the testing methodologies relating to each group’s project will be started. Students will arrive with a draft of their testing protocol. This session will have approximately two hours of lecture and one hour of testing protocol evaluation. After session 3, all the groups should have finalized their testing protocol for the research experiments. As the UK Biometric Best Practice document is central to the research protocol development, students will be expected to have a comprehensive understanding of the manuscript; which will be evaluated using an online test. To help students understand the UK Biometric Best Practice Document, they will critique the testing methodology related to a case study . In preparation for the next session, the students will read the National Biometric Test Center Collected Works, specifically those sections related to testing and evaluation [21, . As with all testing, discussion on imposters (important to understand in the context of the research being conducted in the class) centers on allowing good imposters to test . Session Four – Dynamic Signature Verification The fourth session continues to discuss the role of the readings related to biometrics testing and evaluation . The course shifts in this session to focus on specific technologies and their role in industry. The first experiment involves dynamic signature verification as it relates to the feedback from the digitizer. The following research question is posed: is there a statistical difference in the individual variables across visible and non-visible feedback devices? Several devices will be studied, including those that have ink visible, against those devices that do not have ink visible (but both use a stylus), compared with a digitizer that uses pen and paper. A comparison of the underlying dynamic traits of the signature across all of these digitizers will be studied. Another dynamic signature verification study will examine the differences between gender and handedness across devices. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education Session Five – Hand Geometry The lecture component of session five describes hand geometry and common applications such as immigration and access control systems. The research component of this session continues with a discussion on dynamic signature verification. The research focus in this session is to understand how the variables of the dynamic signature change when an impostor knows progressively more information about the genuine signature. A genuine signature is defined as a good faith attempt by a user to match his/her own stored template. An “imposter” transaction is a “zero-effort” attempt by a person unknown to the system to match a stored template. An imposter attempt is classed as “zero-effort” if the individual submits his/her own biometric feature as if attempting successful verification against his/her own template. The best practice document [30] acknowledges that with dynamic signature verification, an imposter would sign his/her own signature in a zero-effort attempt. Dynamic signature verification testing also poses additional problems, notwithstanding “zero-effort” attempts. Some dynamic signature verification studies use several methods to determine imposter distributions by forging a signature. Different levels of forgery exist, done by different individuals, with varying knowledge about the signature and under differing conditions, incentives, etc. Mettyear suggests that there are levels of information that the signer might have in order to make an attempt at a forgery. Session Six Fingerprint Both the research and lecture components of this session deal with fingerprints and the concept of fingerprint identification. Several articles will be used to explain the concept of fingerprint identification. Aspects to be included in this session include fingerprint standards and methodologies and latent imaging . The research focus of this session is to enroll users using the fingerprint devices selected for the studies on fake or artificial fingers. The second part of the fingerprint technology session will be to complete the research on fingerprinting and spoofing. Each semester the research objectives will change, depending on previous research, available grants, and resources. For the first run of the class, the fingerprint studies will examine spoofing the biometric device. There are several attacks that can be presented to a device . These are using the registered finger under duress, using an impostor's finger (commonly called a zeroeffort forgery), using a severed finger (liveness), a genetic clone of the finger, and using an artificial clone of the registered finger. The study will concentrate on the artificial clone of the registered finger. Several methodologies will be used to create an artificial clone of the registered finger, as established in prior research, as well as various accounts in the trade press. Session Seven – Facial, Iris and Retinal Identification This session will describe the uses of facial recognition. Readings include discussions on facial recognition as they relate to applications . There will also be a discussion on the facial recognition and testing , and the Facial Recognition Technology Test (FERET). Iris and retinal identification are also discussed in this session. As many enrolled students are in aviation technology, several of the application readings are from online discussions posted as a result of Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education September 11, 2001 terrorist attacks . Research components in this session relate to the continued evaluation of the fingerprint sensors as discussed earlier. Session Eight – Voice Recognition Although the majority of the course has centered on the identification of an individual, this session builds on a previous Masters degree directed project describing a telematics user interface . A practical laboratory activity will be set up utilizing a limited command set for a touch sensitive entertainment system. The difference in time between voice and non-voice are measured. Session Nine Biometric Applications and Implementations The final session outlines biometric technologies and some of the pitfalls and criticisms of biometrics with regard to the media. A debate will be initiated in response to criticisms of how the technologies are used, within the context of . In this session, other readings will be discussed including biometrics and privacy . Finally, a discussion on what biometric is suitable for a specific application will be revisited . At the conclusion of this session, students will receive a post-test evaluating their performance over the semester. Conclusion This paper was written to provide information to the reader on the development of a biometrics course for upper-level undergraduate and graduate students. The paper outlined information on the readings that are used in the class as well as the research activities that are proposed for the students. Further papers will be written to provide educators with lessons learned in the developments of the course and its research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring the Conceptions of Academic Reading Comprehension by Iranian Graduate Students of Applied Linguistics

Although the importance of reading in higher education as an index of success has been highlighted, the metacognitive knowledge or beliefs of graduate students have remained under-researched. This qualitative study reports on a study that, first, examines how graduate students of applied linguistics conceive of academic reading and academic readers in their graduate programs; second, wh...

متن کامل

Graduate Course Development Focusing on Security Issuesfor Professionals Working in the Manufacturing Industry

1 Shimon K. Modi, Purdue University, Industrial Technology, 401 N Grant St, W Lafayette, IN, 47906, USA, [email protected] 2 Stephen J. Elliott, Ph.D., Purdue University, Industrial Technology, 401 N Grant St, W Lafayette, IN, 47906, USA, [email protected] Abstract  In the past decade, global business has experienced substantial growth; the manufacturing industry has played a large role in th...

متن کامل

Graduate Experience in Science Education: the development of a science education course for biomedical science graduate students.

The University of Rochester's Graduate Experience in Science Education (GESE) course familiarizes biomedical science graduate students interested in pursuing academic career tracks with a fundamental understanding of some of the theory, principles, and concepts of science education. This one-semester elective course provides graduate students with practical teaching and communication skills to ...

متن کامل

Sustainable Development-Based Education in Higher Education with Emphasis on Sustainability Competencies of the Graduates (Case Study: Bachelor course of Handicrafts)

This research aims to identify the basic changes and requirements in the structure of higher education of handicrafts to acquire the graduateschr('39') sustainability qualifications. Since higher educationchr('39')s philosophy and goal is to educate sustainable human beings, a successful graduate has acquired all the sustainability qualifications and can integrate them into his knowledge and ac...

متن کامل

Time-ly Investment: Faculty Assistance to Develop Online Teacher Education Courses

This paper examines the process of preparing and coordinating a group of graduate students to work with faculty in the development of online hybrid courses for the Post-Baccalaureate Certification in Secondary Education and the Master’s in Special Education programs at the College of Education, University of Hawaii at Manoa. The analysis revealed several themes about the online course developme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002