An Introduction to Biometrics

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Networking Network Classification, by there: 3 Security And Communications software.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical Security Secure the room Secure the machine – 6 ways.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
FACE RECOGNITION TECHNOLOGY
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Authentication Chapter 2.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

An Introduction to Biometrics Glenn Gordon COSC 356 12/02/04

Overview What Are Biometrics? Physical Biometric Devices Behavioral Biometric Devices Biometrics and Network Security Advantages and Disadvantages of Biometrics Questions?

What Are Biometrics? Biometrics is a system of using particular devices to authenticate individuals based on certain unique physical or behavioral characteristics When an individual attempts to gain access through a biometric device, they display a certain characteristic to the device, which is compared to a previously made template of that characteristic. Acceptance or denial of access is based on similarities between the presented characteristic and the template. Templates are most often stored on a computer server or smart card.

Physical Biometrics Physical biometrics evaluate certain unique physical characteristics of a person’s body. Types of physical biometric devices: Fingerprint Scanners Hand Geometry Scanners Iris Scanners Retinal Scanners Facial Scanners

Fingerprint Scanners Fingerprint scanners are devices that scan an individual’s fingerprint and compare it to a preexisting fingerprint template. Most commonly used biometric devices. Advantages: Inexpensive, ability to enroll multiple fingerprints. Disadvantages: vulnerable to dirt, associated with criminality.

Hand Geometry Scanners Hand Geometry scanners are devices which measure an individual’s hand based on their hand’s size and shape. Advantages: simple to use, work quickly and easily. Disadvantages: Limited accuracy, often large and bulky.

Iris Scanners Iris scanners analyze the pattern of color surrounding one’s pupils. Advantages: simple cameras, doesn’t require close contact, accurate results. Disadvantages: expensive, not easy to use.

Retinal Scanners Retinal scanners analyze patterns of blood vessels in the back of one’s eye. Advantages: very accurate, patterns don’t change often. Disadvantages: difficult to use, require close contact, often large and expensive.

Facial Scanners Facial Scanners analyze one’s facial characteristics. Advantages: Use normal cameras, does not require cooperation of users. Diadvantages: need adequate lighting, faces change over time.

Behavioral Biometrics Behavioral biometrics are devices that analyze particular behavioral characteristics of an individual. Types of behavioral biometric devices: Signature Verification Scanners Voice authentication Scanners Keystroke Scanners

Signature Verification Devices Signature Verification Devices analyze a person’s signature based on shape of signature, speed and pressure. Advantages: familiarity, simple to use. Disadvantages: high error rates.

Voice Authentication Devices Voice Authentication Devices analyze an individual’s voice and transform their words into text, which is often referred to as voice to print technology. Advantages: easy to use Disadvantages: background noise, voice changes.

Keystroke Scanners Keystroke Scanners are software programs that evaluate a person’s typing patterns based on “flight time” and “dwell time.” Advantages: easy to use, software versus physical device. Disadvantages: limited accuracy.

Biometrics and Network Security Biometric devices as peripherals. Keystroke programs Digital Signatures Biometric tokens Layers of security and multi-factor authentication Often more secure than passwords

Advantages and Disadvantages of Biometrics Difficult to spoof Add to layers of security & multi-factor authentication Not highly susceptible to user mistakes and social engineering Disadvantages: Often expensive Often viewed as inconvenient Users may feel violated Vulnerabilities of templates False negatives & false positives

Any Questions?