Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
(Biometrics Consortium)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Biometrics.
Biometrics Pearl Brewer, Ph.D. HOA 725. Definition of Biometrics Automated identification based on physiological or behavioral characteristics  Examples.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler

BIOMETRICS Can someone please explain

Basically BIOMETRICS is… verification of a person’s identity by human qualities they possess which grants or denies them the access to a secure zone.

BIOMETRICS Standard – Individual traits that set us all apart Behavioral – Each person’s unique mannerisms Cognitive – Enroll in a process using memorable info

Standard BIOMETRICS Facial recognition Iris Retina Hand Geometry Fingerprints – Static – Dynamic Palm print DNA

Facial Recognition Predominant – 1D & 2D – Geometric (feature) – Photometric (view) Elastic Bunch Graph Matching – 3D – Light, pose, and expression do not interfere with nodes

Eyeball Scanning Iris Colored part of the eye Muscle that controls pupil size IrisCode ® bytes Retina Unique pattern of blood vessels on the retina in the back of the eye

Hand Geometry Pros – Ease of use, can be integrated with other technology, and small amount of data Cons – Size, cost, and will not work for those with hand injury

Fingerprint Used for over 100yr Automated systems now available Software and hardware now measure with HD Population is widely aware of their use

Fingerprint Static User thumb or finger on window scanner Fooled more easily Dynamic User swipes digit across an opening Fooled less easily

Palm Print Similar methods to fingerprints 30% of lifted prints are not fingers – Knives – Guns – Steering wheels

DNA Odds of 2 with same DNA are 1 in billion Obtainable by blood, saliva, hair, semen, or tissue

Standard BIOMETRICS Drawbacks – Overall cost – Social Acceptability – Accuracy – All are not foolproof

Behavioral BIOMETRICS Gait (how one walks) Dynamic signature Voice, or speech, recognition Keystroke recognition Computer footprint

Keystroke Dynamics Combined with a password Analyzes flight time and dwell time Based on the rhythm of the typist

Voice Recognition Advantages Inexpensive, quick result and non-intrusive Text dependent – Rely on previous recordings of specifics – Asks to repeat back – Monitor an individuals sonic qualities Text independent – Low level spectral analysis Disadvantages Can record and playback a voice Individual can be sick Low accuracy

Computer Footprint Are you accessing when you usually access? Is it from where you usually are? Similar to how banks monitor transactions

Cognitive BIOMETRICS Based upon how we make decisions Information from the user’s past that only the individual could pick out An enrollment process that the user remembers upon returning to the site: –

BIOMETRICS Security at Home and Abroad

Dept. of Justice & CJIS Criminal Justice Information Services – Run by FBI and located in West Virginia – Criminal background checks Supports counterterrorism and law enforcement efforts Largest database of fingerprints – Also palm, face, voice, iris, DNA, etc.

Dept. Homeland Sec. & US-VISIT Applies to international visitors holding a non-U.S. passport or visa (age14-79) Digitally scan up to 10 fingerprints Photograph Individuals are asked: – Why are you visiting? – How long will you stay? Entry procedure repeats upon exit

Dept. of Defense & BIMA Biometrics Identity Mgmt. Agency – Formerly Biometrics Task Force (BTF) U.S. Armed Forces Counterterrorism – Biometrics Automated Toolset (BAT) – Handheld Interagency Identity Detection Equipment (HIIDE)

BAT System in OIF & OEF Digital camera, fingerprint reader, iris scanner, and tough book (laptop) Populates database Over 2,000 deploy Over half a million biometrics enroll

HIIDE System in OIF & OEF Lightweight (2 lbs.) Collects – Fingerprints – Iris images – Facial photos – Biographical contextual data Searches against internal database Over 5,000 in field

Thoughts on BIOMETRICS AdvantagesDisadvantages

Thoughts on BIOMETRICS Advantages No longer need ID Could prevent ID theft Catch more criminals Exonerate some innocent prisoners Disadvantages Requires massive, readily accessible database Cost of equipment Invasion of privacy

Feel free to ask questions. What did you not understand? Thank You!