Fall   2009

Biometrics - 72144 - CS 667 - 001

Instructor:  Prof. Harry Wechsler http://cs.gmu.edu/~wechsler/

Course Description - Basic principles and methods for automatic authentication of individuals. Technologies include face recognition, fingerprints verification, iris recognition, gait analysis, and speaker verification. Additional topics cover multimodal biometrics, system design, performance evaluation, and security and privacy concerns. Term project required.

Prerequisite:  CS 580 or permission of the instructor

Time, Day, and Venue: R – Thursday, 7:20 pm - 10:00 pm, Innovation Hall 135


[first day of classes, Thursday, September 3]

[no class on Thursday, November 26,Thanksgiving]

[last  day of classes, Thursday, December 10]

Office Hours:  Thursday, 6:15 pm – 7:15 pm (ENGR - 4448)


A.K. Jain, P. Flynn, and A. A. Ross (Eds.), Handbook of Biometrics, Springer  2008.


H. Wechsler, Reliable Face Recognition Methods, Springer 2007.

R.M. Bolle, J. H. Connell, S. Pankanti, N.K. Ratha, and A. W. Senior, Guide to Biometrics, Springer 2004.

Motivation: Biometrics,  the science of recovering or verifying a person's identity, measures the physical or behavioral characteristics that make people unique—including fingerprints, an eye's retina or iris, face, hand geometry, gait, signature and voice—and uses those measurements for personal authentication. Biometrics is related to forensics, which uses and interprets physical evidence for legal purposes.  The importance of biometrics lies in the fact that traditional means of identification and verification are often unreliable or cumbersome: Passwords are difficult to remember and easy to steal. Keys, driver's licenses, and passports can be lost or forged. The human body and its behavior, on the other hand, can't be forgotten, stolen, or misplaced (but can still be spoofed). Practical uses for biometrics are wide spread and include maintaining the security for both physical and cyber space. In particular, biometrics aids in controlling access to an office, computer network or an ATM, smart cards, wireless communication; confirming the identity of buyers and sellers to make electronic commerce safe and reliable; confirming student identity for distant learning; and safeguarding electronic records related to health care services.  


      biometric tasks, protocols, and standards

      face recognition (2D and 3D)

      fingerprint recognition

      iris recognition

      gait recognition

      speaker  verification

      biometric database management, performance evaluation, and error analysis

      identity management, security, privacy and ethics


      Mid Term R, October 15 30 %

      Term Project 40 %

      Final  http://registrar.gmu.edu/calendars/200970_exam.pdf  ­Thursday, December 17  30 %

Graduate Certificate in Biometrics http://catalog.gmu.edu/preview_program.php?catoid=5&poid=1074&bc=1

Honor Code

You are expected to abide by the GMU honor code. Homework assignments and exams are individual efforts. Information on the university honor code can be found at http://academicintegrity.gmu.edu/honorcode/.

Additional departmental CS information: http://cs.gmu.edu/wiki/pmwiki.php/HonorCode/CSHonorCodePolicies