Biometrics Dr. Nermin Hamza

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Modern Bio Metric Authentication BY : ADAM FLOOR 1.
Author: Austin Kamrath Wednesday April 12th, 2017
Biometrics : From Yesterday to Tomorrow
A Seminar Report On Face Recognition Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Dr. Nermin Hamza Thank you for having me here today. Today I am going to talk to you about biometrics Dr. Nermin Hamza Teamwork Biometric Fatma shaban – Hamdi Ahmed Mohamed-Mohamed Karm Farg – Rami Abdel Hadi – Amr Abdel Hadi

Outline What is Biometrics? History Of Biometric Why Use of Biometric? Types of Biometrics Other System Biometrics Application I will start my talk by describing what biometrics is. I will give some history of biometric I will spend show type of biometric I will speak about other systems Biometric application

What is Biometrics Bio (Biology) Metric (Measurement) Biometric is the measurement and analysis of unique physical or behavioral characteristics (as fingerprint or voice patterns) especially as a means of verifying personal identity. Biometrics identify people by measuring some aspect of individual anatomy or physiology (your hand geometry or fingerprint), some deeply ingrained skill, or other behavioural characteristic , or something that is a combination of the two .

HISTORY OF BIOMETRICS Biometrics was used during prehistoric times. Chinese used fingerprinting in the 14th Century for identification. In the 17th century fingerprinting was used to seal official documents.

Why Use of Biometric? To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties To prevent fraudulent acts like faking ID badges or licenses. To ensure safety and security, thus decrease crime rates

Types of Biometrics . Handwritten Signatures Face Recognition Fingerprint Iris Scan Voice Scan Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA . Gait مشية \ سرعة Odour رائحة عطر Ear شيء مميز للإذن

Biometrics 2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics

Many Types of Measurements

Handwritten Signatures Handwritten signatures had been used in classical China, but carved personal seals were considered to be higher status, and are still used for serious transactions in China, Japan, and Korea to this day. How secure are handwritten signatures? The probability that a forged signature will be accepted as genuine mainly depends on the amount of care taken when examining it. Many bank card transactions in stores are accepted without even a glance at the specimen signature on the card—so much so that many Americans do not even bother to sign their credit cards.

Verifying checks for small amounts is not economic unless it can be automated, so a number of researchers have worked on systems to compare handwritten signatures automatically. This is very difficult image-processing task because of the variability between one genuine signature and another. Aneasier option is to use a signature tablet. This is a sensor surface on which the user does a signature; it records not just the shape of the curve but also its dynamics (the velocity of the hand, where the pen was lifted off the paper, and so on).

FACE RECOGNITION Face recognition is the capturing of a facial image, which is then transformed into a unique face print The image is transformed using a technique called “elastic graph matching”. Algebraic algorithms are used to make a perfect match. Images are sent to a back-end database for comparison and possible matches

Advantages Disadvantages Face is the most common biometric used by humans Identification at a distance Easy to capture from low-cost cameras Non-contact data acquisition (free from contagious disease) Covert data acquisition (ubiquitous surveillance cameras) Legacy database (passport, visa and driver license) Disadvantages Faces change easily Faces have the same salient features

Fingerprint Acquisition Swipe Sensor Computer Login using USB Building Access PDAs and Cellphones

Image from - http://encarta.msu.com/ Fingerprint Features Fingerprint Style Whorl Loop Arch Most detect “minutia” Core Bifurcation Delta Ending 30% 65% 5% Image from - http://encarta.msu.com/ Bifurcation التشعبات Loop عقدة Arch تقوس Core Bifurcation Delta Ending QUERY TEMPLATE

Advantages Disadvantages Fingerprints are unique (even between twins) Fingerprint sensors are cheap Latent fingerprints are easy to detect and are commonly used in criminal cases Disadvantages Almost 10% of the population do not have fingerprints that can be detected by typical scanners Most fingerprint readers do not work well when wet or dirty Many people do not like to use fingerprint technology

Iris scan Measures unique characteristics of the iris unique. Ridges (rings) Furrows Striations (freckles) Adv:- unique. It is fairly easy to detect in a video picture does not wear out In the case of iris scan, It measures unique characteristics of the colored part of the eye also known as the Iris. These characteristics are: Ridges or rings , Furrows and Striations or freckles. This technique just like finger scan is being used in both logical and physical security.

Voice Recognition Measures the sound waves of human speech. user talks to a microphone a passphrase. Voice print is compared to a previous one In the case of Voice scan, It measures the sound waves of human speech. Voice scan could be based on either text-dependent or text-independent speech input. If it is text-dependent, user talks to a microphone a passphrase and will repeat the same pass phrase when needed to be authenticated. The most common use of voice scan biometric systems is where a telephone is already being used. For instance home arrest verification is a very common use. Any time of the day or night a computer calls the home of a person under home arrest, and that person has to answer the phone and speak a passphrase to be authenticated. Voice scan Biometrics is currently restricted to low security applications because of high variability in an individual’s voice (depends on the user mood) and poor accuracy performance of a typical speech-based authentication system (affected by background noise).

Other Systems Signature Retina Scan Infrared Face and Body Parts Keystroke Dynamics Gait Odour Ear DNA

Signature Signature scan: Measures speed, pressure, stroke order an image of signature. Non-repudiation

Retina scan Measures unique characteristics of the retina. Blood vessel patterns Vein patterns Vessel الوعاء الدموي Vein وريد

Facial scan Facial scan: Uses off-the-shelf camera to measure the following facial features: Distance between the eyes. Distance between the eyes and nose ridge. Angle of a cheek. Slope of the nose. Facial Temperatures.

Keystroke scan Keystroke scan: Measures the time between strokes and duration of key pressed. Most commonly used in systems where keyboard is already being used.

Biometric Applications Verification – Compare a measurement to a single claimed identity Identification – Compare a measurement to an entire database and find the best match

Any Question ?