Instructor: Prof. Harry Wechsler http://cs.gmu.edu/~wechsler/
Course Description - Basic principles and methods for automatic authentication of individuals. Technologies include face recognition, fingerprints verification, iris recognition, gait analysis, and speaker verification. Additional topics cover multimodal biometrics, system design, performance evaluation, and security and privacy concerns. Term project required.
Prerequisite: CS 580 or permission of the instructor
Time, Day, and Venue: R – Thursday, 7:20 pm - 10:00 pm, Innovation Hall 135
[first day of classes, Thursday, September 3]
[no class on Thursday, November 26,Thanksgiving]
[last day of classes, Thursday, December 10]
Office Hours: Thursday, 6:15 pm – 7:15 pm (ENGR - 4448)
A.K. Jain, P. Flynn, and A. A. Ross (Eds.), Handbook of Biometrics, Springer 2008.
H. Wechsler, Reliable Face Recognition Methods, Springer 2007.
R.M. Bolle, J. H. Connell, S. Pankanti, N.K. Ratha, and A. W. Senior, Guide to Biometrics, Springer 2004.
Motivation: Biometrics, the science of recovering or verifying a person's identity, measures the physical or behavioral characteristics that make people unique—including fingerprints, an eye's retina or iris, face, hand geometry, gait, signature and voice—and uses those measurements for personal authentication. Biometrics is related to forensics, which uses and interprets physical evidence for legal purposes. The importance of biometrics lies in the fact that traditional means of identification and verification are often unreliable or cumbersome: Passwords are difficult to remember and easy to steal. Keys, driver's licenses, and passports can be lost or forged. The human body and its behavior, on the other hand, can't be forgotten, stolen, or misplaced (but can still be spoofed). Practical uses for biometrics are wide spread and include maintaining the security for both physical and cyber space. In particular, biometrics aids in controlling access to an office, computer network or an ATM, smart cards, wireless communication; confirming the identity of buyers and sellers to make electronic commerce safe and reliable; confirming student identity for distant learning; and safeguarding electronic records related to health care services.
á biometric tasks, protocols, and standards
á face recognition (2D and 3D)
á fingerprint recognition
á iris recognition
á gait recognition
á speaker verification
á biometric database management, performance evaluation, and error analysis
á identity management, security, privacy and ethics
á Mid Term – R, October 15 – 30 %
á Term Project – 40 %
á Final http://registrar.gmu.edu/calendars/200970_exam.pdf – Thursday, December 17 – 30 %
Graduate Certificate in Biometrics http://catalog.gmu.edu/preview_program.php?catoid=5&poid=1074&bc=1
You are expected to abide by the GMU honor code. Homework assignments and exams are individual efforts. Information on the university honor code can be found at http://academicintegrity.gmu.edu/honorcode/.
Additional departmental CS information: http://cs.gmu.edu/wiki/pmwiki.php/HonorCode/CSHonorCodePolicies