Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Biometrics.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Multimodal Biometric Security 1.
A Seminar Report On Face Recognition Technology
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
Presentation transcript:

Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta

Outline Today’s security related concerns Commonly used Biometrics Variance in Biometrics Operation of Biometrics Systems Attacks on Biometric System Multi Biometric Systems Level of fusion in Biometric Systems

Today’s Security related Questions Is she really who she claims to be? Is this person authorized to use this facility? Is he in the watch list posted by the government? Biometrics, Science of recognizing an individual based on his or her physical or behavioral traits

Paper is all about Examining applications where biometrics can solve issues pertaining to information security Enumerating the fundamental challenges encountered by biometric systems in real-world applications Discussing solutions to address the problems of scalability and security in large-scale authentication systems

Commonly Used Biometrics In this paper Others, widely used

Research Going on… Heart Beat Galvanic Skin Conductivity Pulse Rate Brain tissues Respiration DNA

Face Location and shape of facial attributes Eyes, eyebrows, nose, lips and chin Global Analysis of face as weighted combination of no. of canonical faces. Disadvantages: Face could be an image (photograph) Difficult to locate the face if there is one Difficult to match from any pose Template Update Problem

Fingerprint Pattern of ridges and valleys on fingertip Fingerprint scanner, cheap approx. $30 Fingerprint of Identical twins are different Disadvantage: Large computation resource when in identification mode

Hand Geometry Human Hand Shape and size of palm Length and widths of fingers Relatively easy to use Inexpensive Environmental conditions do not affect Disadvantage Not very distinctive Individual jewelry Limitation in dexterity (e.g. Arthritis)

Iris Iris, is bounded by pupil and the white portion of eye High accuracy and speed Each Iris is believed to be distinctive Ability to detect artificial Irises (contact lenses). Low FAR but could be high FRR Disadvantages: Considerable user participation expensive

Keystroke Hypothesis Behavioral biometric each person types on keyboard in a characteristic way. Not unique, but sufficiently different that permits identity verification Disadvantage: typing patterns change substantially between consecutive instances of typing the password different style of keyboard

Signature The way a person sign Excepted all throughout the world Behavioral Biometric Possibility of changing in emotional and physical conditions. Disadvantage: Professional forgers may be able to reproduce signatures that fool the system.

Voice Physical + Behavioral Biometric Depends on: Shape and size of vocal tracts, mouth, nasal cavities and lips Disadvantages: Physical part are invariant from each other But, behavioral part changes from age, emotional state and medical conditions (cold). Background noise

Major Problem

Inconsistent Presentation

Irreproducible Presentation

Imperfect Representation Acquisition

Operation of Biometric System Validation Compare these features against template Extract Feature Processed this signal Raw Biometric Signal

E.g. Fingerprint Feature set PreprocessExtract Features Raw BiometricProcessed Compare and Validate

Functionalities of a Biometric system Verification “Is this person truly John Doe?” Identification “Is this person in the database?” Screening “Is this a wanted person?”

Matcher Accuracy FMR (False Match Rate) Incorrectly declares a successful match FNMR (False non Match Rate) Incorrectly declares failure of match FTE (Failure to Enroll) % of times users are not able to enroll to the system FTC (Failure to Capture) % of times, device fails to capture the sample

Zero effort attacks Intruder: sufficiently similar biometric traits to a legitimate user Problem under examination Determine the probability that any two (or more) individuals may have sufficiently similar fingerprints in a given target population Given a sample fingerprint, determine the probability of finding a sufficiently similar fingerprint in a target population Given two fingerprints from two different fingers, determine the probability that they are sufficiently similar.

Adversary Attacks Physical traits can be obtained from face, fingerprints.

Other Attacks… Circumvention Fraudulent access to the system, tamper the sensitive data Repudiation Bank clerk Modify the customer record, and claim that intruder spoof his biometric trait Collusion Administrator may deliberately modify biometric Coercion at gunpoint, grant him access to the system. Denial of Service (DoS) A server can be bombarded with a large number of bogus requests

Vulnerabilities in Biometric System Sensor Application Device Matcher Feature Extractor Stored Templates Fake Biometric Override Feature Extractor Override final Decision Override Matcher Synthesized Feature Vector Replay Old Data Intercept the channel Modify Template Y/N

MultiBiometric systems One can have the fusion of multiple biometrics, to get a high amount of accuracy.

Feature Level Score Level Decision Level

Feature Level FM Feature Extraction Module Templates Matching Module Decision Module Accept/Reject

Score Level fusion FM Score Normalization Accept/Reject Feature Extraction Module Decision Module Matching Module Templates Feature Extraction Module Feature Set

Decision Level fusion FM Decision Module Accept/Reject Feature Extraction Module Matching Module Templates Feature Extraction Module Feature Set

Summary and Conclusion More reliable than current passwords Cannot be easily shared Misplace and forged A well implemented biometric system with sufficient privacy safeguards may be a further basis of resistance. Multibiometric systems have received much attention in recent researches. Speech + face Face +finger Multiple fingers of users

Cont… The complexity of biometric system depends on Accuracy Scale Size of the database Usability

Thank you Questions / Comments?