By: Monika Achury and Shuchita Singh

Slides:



Advertisements
Similar presentations
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Advertisements

BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
 Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Challenge/Response Authentication
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

By: Monika Achury and Shuchita Singh Biometrics By: Monika Achury and Shuchita Singh

Sound like the movies? Retinal scan granting access to a security vault Unlocking a door by facial recognition Car door unlocking when the owner touches the handle Computer access by fingerprint recognition

Definition: Biometrics is the study of automated methods for uniquely recognizing people based on physical and/or behavioral traits.

Physical Characteristics : A physical attribute unique to a person Fingerprints Eye Retinas Facial patterns Voice *

Behavioral Characteristics: Traits that are learned or acquired from a person Hand signature Typing pattern Voice *

Identification Methods: Authentication biometric system identifies a person from the entire enrolled population by searching a database for a match based solely on the biometric “one to many search” Verification biometric system authenticates a person’s claimed identity from their previously enrolled pattern “one to one search”

Biometric Authentication:

What makes a biometric work? Characteristics of a biometric that must be present in order to use the system for authentication purposes Uniqueness: The same trait will not appear in two people Universality: The trait has to occur in many people as possible Permanence: The trait does not change over time Measurability: The trait can be measured with simple technical instruments User friendliness: The trait is easily measured with minimal discomfort

Uses for Biometrics: Biometric-based authentication applications include workstation and network access, single sign-on, application logon, data protection, remote access to resources, transaction security, and Web security and more.

Biometric Needs Model: Physical Security: Access to a physical location such as a building or room. Cyber Security: Access to an organization’s network through a biometrically authenticated login schema. Transactional Security: Any monetary transaction which biometrically authenticates, accesses, and atomically debits or credits the user’s account.

Active vs. Passive: Biometrics can also be defined as either Passive, or Active. Passive biometrics do not require a users active participation and can be successful without a person even knowing that they have been analyzed. Active biometrics however, do require a person cooperation and will not work if they deny their participation in the process.

Active vs. Passive: Active Passive fingerprint Hand geometry Retina scanning Signature recognition Passive Voice recognition Iris recognition Facial recognition

Multi-Modal: Multimodal biometric systems are those that utilize more than one physiological or behavioral characteristic for enrollment, verification, or authentication. Multi-modal biometric systems are looked to as means of reducing false non-match and false match rates providing a secondary means of enrollment, verification, and identification if sufficient data can’t be acquired from a given biometric sample combating attempts to spoof biometric systems through non-live data sources such as fake fingers

Why use biometrics? Control for businesses Inexpensive implementation Less administration Saves Money Convenience for users

Business Applications: Schools U.S. Visitation Secured Safes Door entry Time cards User logon

School Applications: Student tracking Library circulation Attendance Food service Student logon Staff tracking Bus loading

Issues and Concerns : Once a biometric source is stolen the victim can be posed with this problem for a while.

Sociological concerns : Physical : Some think the technology can cause physical harm because instruments are unsanitary i.e. retina scanners are not always clean

Sociological concerns : Personal info : Information taken by biometric methods can be abused, meaning that data taken can be used in unauthorized ways without the person’s consent.

Cracking the System: Mythbusters attempted to break into a security door and laptop equipped with biometric authentication. Easily defeated methods with a photocopy of a fingerprint

Uses and initiatives : Japan : Banks have palm vein authentication on their ATMs Developed by Fujitsu False rejection rate of 0.01% False acceptance rate of 0.00008%

Uses and initiatives : Iraq : Biometrics being used to provide Iraqis with verifiable ID card If one has lost their ID card, system can verify them using their biometric info. Helps American forces to determine if someone has been causing trouble

Uses and initiatives : Australia : Visitors must submit to biometric authentication linking them to their visas and passports.

Future of Biometrics : DNA matching National Biometric Database Nat’l database of citizens Auto Security No more keys! Active Advertisement Advertisements based on who you are