Computer Science 653 --- Lecture 3 Biometrics Professor Wayne Patterson Howard University Fall 2009.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Access Control 1 Access Control Access Control 2 Access Control  Two parts to access control  Authentication: Who goes there? o Determine whether access.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Part 2  Access Control 1.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Authentication Approaches over Internet Jia Li
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Information System Security Đại học Quốc Gia TPHCM – Đại học Bách Khoa Khoa Khoa học và Kỹ thuật Máy Tính.
Biometrics Authentication Technology
Biometrics.
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Access Control Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization:
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Access Control Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization:
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Computer and Information Security Chapter 7 Authentication 1.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Challenge/Response Authentication
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Biometrics , Computer & Network Security 1
Computer and Information Security
Hybrid Finger print recognition
Part II: Access Control
Presentation transcript:

Computer Science Lecture 3 Biometrics Professor Wayne Patterson Howard University Fall 2009

Biometrics

Something You Are  Biometric “You are your key”  Schneier Are Know Have  Examples Fingerprint Handwritten signature Facial recognition Speech recognition Gait (walking) recognition “Digital doggie” (odor recognition) Hand recognition Keystroke Iris patterns DNA Many more!

Why Biometrics?  Biometrics seen as desirable replacement for passwords  Cheap and reliable biometrics needed  Today, a very active area of research  Biometrics are used in security today Thumbprint mouse Palm print for secure entry Fingerprint to unlock car door, etc.  But biometrics not too popular Has not lived up to its promise (yet)

Ideal Biometric  Universal  applies to (almost) everyone In reality, no biometric applies to everyone  Distinguishing  distinguish with certainty In reality, cannot hope for 100% certainty  Permanent  physical characteristic being measured never changes In reality, want it to remain valid for a long time  Collectable  easy to collect required data Depends on whether subjects are cooperative  Reliable, robust, user-friendly  Safe

Effectiveness vs. Reliability  Surveys indicate that in order of effectiveness, biometric devices rank as follows:   1. Retina pattern devices  2. Fingerprint devices  3. Handprint devices  4. Voice pattern devices  5. Keystroke pattern devices  6. Signature devices  In order of personal acceptance, the order is just the opposite:   1. Keystroke pattern devices  2. Signature devices  3. Voice pattern devices  4. Handprint devices  5. Fingerprint devices  6. Retina pattern devices

Identification vs. Authentication  Identification: Identify the subject from a list of many possibles E.g. fingerprint from a crime scene to FBI  Authentication: One to one A subject claims to be Wayne  Only need to check against database for “Wayne”

Biometric Modes  Identification  Who goes there? Compare one to many Example: The FBI fingerprint database  Authentication  Is that really you? Compare one to one Example: Thumbprint mouse  Identification problem more difficult More “random” matches since more comparisons  We are interested in authentication A subject claims to be Wayne  Only need to check against database for “Wayne”

Enrollment vs Recognition  Enrollment phase Subject’s biometric info put into database Must carefully measure the required info OK if slow and repeated measurement needed Must be very precise for good recognition A weak point of many biometric schemes  Recognition phase Biometric detection when used in practice Must be quick and simple But must be reasonably accurate  THINK: Compile time vs. runtime

Cooperative Subjects  We are assuming cooperative subjects  In identification problem often have uncooperative subjects  For example, facial recognition Proposed for use in Las Vegas casinos to detect known cheaters Also as way to detect terrorists in airports, etc. Probably do not have ideal enrollment conditions Subject will try to confuse recognition phase  Cooperative subject makes it much easier! In authentication, subjects are cooperative

Biometric Errors  Fraud rate versus insult rate Fraud  user A mis-authenticated as user B Insult  user A not authenticate as user A  For any biometric, can decrease fraud or insult, but other will increase  For example 99% voiceprint match  low fraud, high insult 30% voiceprint match  high fraud, low insult  Equal error rate: rate where fraud == insult The best measure for comparing biometrics

Error rates: Face Recognition  Drivers’ licenses, passports, etc.  How good are we at identifying strangers on a photo  Westminster study: four types of credit cards with photos: Good-good (genuine and recent) Bad-good (genuine, older, different clothing Good-bad (from a pile, one that looked most like the subject) Bad-bad (random, same sex and race as subject)  Experienced cashiers None could tell the difference between bad-good and good-bad Some could not even distinguish good-good and bad- bad

Fingerprint History  1823  Professor Johannes Evangelist Purkinje discussed 9 fingerprint patterns  1856  Sir William Hershel used fingerprint (in India) on contracts  1880  Dr. Henry Faulds article in Nature about fingerprints for ID  1883  Mark Twain’s Life on the Mississippi a murderer ID’ed by fingerprint

Fingerprint History  1888  Sir Francis Galton (cousin of Darwin) developed classification system His system of “minutia” is still in use today Also verified that fingerprints do not change  Some countries require a number of points (i.e., minutia) to match in criminal cases In Britain, 15 points In US, no fixed number of points required

Fingerprint Comparison Loop (double)WhorlArch  Examples of loops, whorls and arches  Minutia extracted from these features  Ridge endings, bifurcations

Fingerprint Biometric  Capture image of fingerprint  Enhance image  Identify minutia

Fingerprint Biometric  Extracted minutia are compared with user’s minutia stored in a database  Is it a statistical match?

Matching

Hand Geometry  Popular form of biometric  Measures shape of hand Width of hand, fingers Length of fingers, etc.  Human hands not unique  Hand geometry sufficient for many situations  Suitable for authentication  Not useful for ID problem

Hand Geometry  Advantages Quick 1 minute for enrollment 5 seconds for recognition Hands symmetric (use other hand backwards)  Disadvantages Cannot use on very young or very old Relatively high equal error rate

Iris Patterns  Iris pattern development is “chaotic”  Little or no genetic influence  Different even for identical twins  Pattern is stable through lifetime

Iris Recognition: History  1936  suggested by Frank Burch  1980s  James Bond films  1986  first patent appeared  1994  John Daugman patented best current approach Patent owned by Iridian Technologies

Iris Scan  Scanner locates iris  Take b/w photo  Use polar coordinates…  Find 2-D wavelet trans  Get 256 byte iris code

Measuring Iris Similarity  Based on Hamming distance  Define d(x,y) to be # of non match bits/# of bits compared d(0010,0101) = 3/4 and d(101111,101001) = 1/3  Compute d(x,y) on bit iris code Perfect match is d(x,y) = 0 For same iris, expected distance is 0.08 At random, expect distance of 0.50 Accept as match if distance less than 0.32

Iris Codes are based on Hamming Distance  Definition of Hamming distance between strings  Let a, b be two bitstrings of common length n. Use a i, b i (i=1,…,n) to denote the individual bits.  The Hamming distance of a and b, denoted d H (a,b) =  (a i XOR b i ).  In other words, add one to the distance function for each position in which the bit values differ.

Iris Scan Error Rate distance in 1.3  in 1.5  in 1.8  in 2.6  in 4.0  in 6.9  in 1.3  10 5 distanceFraud rate : equal error rate

Attack on Iris Scan  Good photo of eye can be scanned Attacker could use photo of eye  Afghan woman was authenticated by iris scan of old photo Story is herehere  To prevent photo attack, scanner could use light to be sure it is a “live” iris

Equal Error Rate Comparison  Equal error rate (EER): fraud == insult rate  Fingerprint biometric has EER of about 5%  Hand geometry has EER of about  In theory, iris scan has EER of about But in practice, hard to achieve Enrollment phase must be extremely accurate  Most biometrics much worse than fingerprint!  Biometrics useful for authentication…  But ID biometrics are almost useless today

Biometrics: The Bottom Line  Biometrics are hard to forge  But attacker could Steal Alice’s thumb Photocopy Bob’s fingerprint, eye, etc. Subvert software, database, “trusted path”, …  Software attacks: manipulate the database  Also, how to revoke a “broken” biometric?  Broken password can be revoked How do you revoke a fingerprint?  Biometrics are not foolproof!  Biometric use is limited today  That should change in the future…

Hot Research  Intense area of research right now --- see, e.g., “On the Development of Digital Signatures for Author Identification,” R. Williams, S. Gunasekaran, W. Patterson, Proceedings of the First International IEEE Conference on Biometrics: Theory, Applications, Systems (BTAS ’07), September 27, 2007, Crystal City, VA

More on Measurement Techniques  Let us suppose that we have a new biometric measurement system.  We’ll call it the “eyeball” system.  That is, we are going to “eyeball” people and classify them as to whether or not they have:  1. hair5. no missing teeth  2. mustache6. two ears  3. ten fingers7. male / female gender  4. two eyes8. two legs

Classifying the “Eyeball” Values  Each of the eight characteristics has a binary value.  Thus we could record the complete biometric result for an individual as a bitstring with 8 bits:  With the appropriate convention of 0 or 1 for each reading.

The Database  We compile our database.  Obviously, since there are only 2 8 = 256 different values, our biometric system could not be used with a population of 257 or more.  Suppose we have 100 people in our universe.  Then, we have to further assume that their biometric measurements would produce 100 different bitstrings.  If that’s the case, we could use the system.  If not --- that’s another problem.

Storing the Records  We could use the bioetric measure as a key, and when we verify the reading, we can hash into a file (or use some other file management technique) to get the subject’s record.  Suppose for example that we wish to use this eyeball system for recognition.  We have a company with 100 employees, and we want to eyeball each as they come in in the morning.

Two Readings  Suppose also that among the employees with the same values for hair, mustache, fingers, eyes, teeth and ears, we have one male and one female, and one person with only one leg. So we have:  One fine morning, someone shows up and is recorded as

What Do We Do?  There are several possibilities: 1. The “eyeballer” may have made a mistake on 7 (gender); 2. The “eyeballer” may have made a mistake on 8 (legs); 3. The “eyeballer” may have made a mistake on some other reading; 4. The “eyeballer” may be correct and the person is an impostor (or a visitor); 5. The person being measured may have changed a value.  With only this information, we can’t proceed any further.

Hamming Weight  Recall the Hamming distance  The “Hamming weight” of a string x, H w (x) = d H (x,0) where 0 is the zero string.  Examples of Hamming distance: d H ( , ) = 2 d H ( , ) = 1.  In biometric pattern recognition, if d H (observed string, database entry x) = 0, then we accept the observed reading as representing x.

Maximum Likelihood Estimation  Suppose that the only two entries for items 1-4 in the eyeball system were: x = y =  Then, if we had a reading of z =  We could compute H(x,z) = 2 and H(y,z)=1.

Maximum Likelihood Estimation  Suppose that the only two entries for items 1-4 in the eyeball system were: x = y =  Then, if we had a reading of z =  We could compute H(x,z) = 2 and H(y,z)=1.

Maximum Likelihood Estimation  Using the hypothesis of “maximum likelihood,” that is the assumption that errors in individual readings are equally likely, there is a greater likelihood that ONE error had occurred rather than TWO.  Thus, we would want to accept z as a reading of y with one error; rather than a reading of x with two errors.

Something You Have

 Something in your possession  Examples include Car key Laptop computer  Or specific MAC address Password generator  We’ll look at this next ATM card, smartcard, etc.

Password Generator  Alice gets “challenge” R from Bob  Alice enters R into password generator  Alice sends “response” back to Bob  Alice has pwd generator and knows PINs Alice Bob 1. “I’m Alice” 2. R 5. F(R) 3. PIN, R 4. F(R) Password generator

2-factor Authentication  Requires 2 out of 3 of 1. Something you know 2. Something you have 3. Something you are  Examples ATM: Card and PIN Credit card: Card and signature Password generator: Device and PIN Smartcard with password/PIN

Single Sign-on  A hassle to enter password(s) repeatedly Users want to authenticate only once “Credentials” stay with user wherever he goes Subsequent authentication is transparent to user  Single sign-on for the Internet? Microsoft: Passport Everybody else: Liberty Alliance Security Assertion Markup Language (SAML)

Web Cookies  Cookie is provided by a Website and stored on user’s machine  Cookie indexes a database at Website  Cookies maintain state across sessions  Web uses a stateless protocol: HTTP  Cookies also maintain state within a session  Like a single sign-on for a website Though a very weak form of authentication  Cookies and privacy concerns