What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Biometrics.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Biometrics 101 You are the Key. A Need for Better Security One person can have a greater negative impact on society than ever before. More individuals.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
PALM VEIN TECHNOLOGY.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Biometrics Security in Banking Systems Image processing in ATM
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

What does it mean to us?

 History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics

1858 First use of hand images for identification 1903 NY State Prisons begin using fingerprints 1936 Concept of using the iris for identification is proposed 1960 Face recognition becomes semi automated 1969 FBI pushes to make fingerprint recognition an automated process 1970 Automated biometrics, in general, starts to become more than just a concept (because of computers)

 1988 First semi-automated facial recognition system is deployed  1994 First iris recognition algorithm is patented  1996 Hand geometry is implemented at the Olympic games  1998 FBI launces CODIS (DNA forensic database)

 “Bio” = life  “Metrics” = to measure

 What someone has?  What someone knows?  What someone is?  Two Main Categories  Physiological  Behavioral

 Sensor: Collect data  Signal Processing Algorithms: Develop the Biometric Template  Data Storage Component: Holds information that the new template will be compared to  Matching Algorithm: Compares new template to the ones in the Data Storage Component  Decision Process: Makes system-level decision

 Advantages: ◦ Easy to Use ◦ Large amount of data to check against ◦ Proven effective in large scale systems  Disadvantages: ◦ Privacy perceptions by the public ◦ Requires physical contact

 Advantages: ◦ Most accurate ◦ No physical contact required  Disadvantages: ◦ Most costly

 Advantages: ◦ Most accurate ◦ No physical contact required  Disadvantages: ◦ Most costly ◦ Can be difficult to capture ◦ Lack of existing data to check against

 Advantages: ◦ No physical contact required ◦ Commonly available sensors (cameras) ◦ Large amount of data to check against  Disadvantages: ◦ Face can be easily obstructed ◦ Faces change over time ◦ Frontal pose is usually necessary

 Advantages: ◦ Easy to capture ◦ Believed to be highly stable pattern  Disadvantages: ◦ Not sufficiently distinctive for identification over large databases ◦ System requires a large amount of physical space

 Advantages: ◦ Most publically accepted ◦ No physical contact required ◦ Commonly available sensors (telephones/microphones)  Disadvantages: ◦ Not sufficiently distinctive for identification over large databases

 Controlling Access to a physical location ◦ Labs / Buildings / etc.  Controlling Access to logical information ◦ Computer Accounts / Secure Electronic Docs / etc.  Determining if a person is already in a database

 “US VISIT” program: ◦ Automated entry / exit control system ◦ Currently, inkless fingerprints and digital photos are required

 Fingerprints are the most commonly spoofed ◦ Fake gummy fingers ◦ Breathing onto sensor ◦ Cutting off someone’s finger How to deal with spoofing?

 Based on recognition of physiological activities as signs of life  Often done by adding additional hardware to a biometrics system

 Fingerprints: ◦ Hardware addition:  Detects temperature  Detects pulse ◦ Software Addition:  Detects perspiration

 Face: Head movements  Iris: Pupil movement / eye movement  Voice: Matching lip movement (video) to the audio

 Randomizing Verification Data  Multiple Biometrics  Multi-Factor Authentication

 Liveness Detection ◦ Palm Scanning  Distinctive as fingerprints  No physical contact required  Hand must be attached in order for live veins to be present

 Body Odor Detection: ◦ Still in early stages of research  Tongue Scanning: ◦ Uses a laser to create a 3D image of a tongue

 Passive Authentication  Convenience ◦ Virtual money ◦ Instant personalization ◦ Touch sensors  Apple Patent

 Thank You