Biometrics: Overview, Challenges and Future Vision

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Biometrics.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Identity Verification in a Networked World
Marjie Rodrigues
Security-Authentication
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
BIOMETRICS.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
Language, Brain and Biometrics
Biometrics : From Yesterday to Tomorrow
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Biometrics: Overview, Challenges and Future Vision Presented to Professor Abdulmotaleb El Saddik by Faisal Arafsha Hikmat El Ajaltouni ELG 5121 Multimedia Communications School of Information Technology and Engineering University of Ottawa

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Introduction Biometry (Greek words) = ‘bios’ (life) and ‘metron’ (measure) In a broader sense, biometry = measurement of body characteristics In second half of the 20th century biometrics has given a second meaning: “ automated methods and techniques that analyze human characteristics in order to verify a person, or identify this person from another, based on a physiological or behavioral characteristic.”

Major Milestones in the History of Biometrics Year Description 1858 First systematic capture of hand images for identification purposes is recorded 1896 Henry develops a fingerprint classification system 1903 NY State Prisons begins using fingerprints 1960 First model of speech recognition is created 1991 Face Recognition Possible 1992 Biometric Consortium established within US government 1995 Iris recognition becomes available as a commercial product 1996 Biometric Standards 2003 European Biometrics Forum established 2005 Iris on the move

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Biometrics The security field uses 3 different types of identification: Something You Know — a password, PIN, or piece of personal information (such as your mother's maiden name) Something You Have — a card key, smart card, or token (like a SecureID card) Something You Are — a biometric Biometric = most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible.

Characteristics of a Biometric If a biological, physiological, or behavioral characteristic has the following properties: Uniqueness Universality Permanence Measurability ….then it can potentially serve as a biometric for a given application.

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Biometric System Implementation Biometric identification systems = pattern recognition systems Use acquisition devices (cameras and scanning devices to capture images, recordings, or measurements of an individual’s characteristics) and computer hardware and software to extract, encode, store, and compare these characteristics. Depending on the application, biometric systems can be used in one of two modes: Verification (authentication) Identification

Biometric Standards Specify: Common file formats that provide platform independence and separation of transfer syntax from content definition Technical Interfaces Data Interchange Formats Performance Testing and Reporting Others Who develops the Standards? National Institute of Standards and Technology International Committee for Information Technology Standards (INCITS) Joint Technical Committee 1 (JTC1)/Subcommittee 37 (SC 37) Organization for the advancement of Structured Information Standards (OASIS)

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Biometrics Task Force Movie

Primary Driving Forces In a broader sense Biometrics have a critical role in: National Security Homeland Security and Law enforcement Enterprise and e-government services Personnel info and business transactions All uses extend from 3 basic needs: Physical Security: Access to a physical location such as a building or room. Cyber Security: Access to a network through a biometrically authenticated login schema. Transactional Security: Any monetary transaction which biometrically authenticates, accesses, and atomically debits or credits the user’s account. National Science and Technology Council Office of the president of US Aug.2006

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Physiological Behavioral Challenges & Threats Promises and Future Work Conclusion

Types of Biometrics

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Physiological Behavioral Challenges & Threats Promises and Future Work Conclusion

Fingerprint Recognition Iris / Retinal Recognition Palm / Hand Geometry Recognition Facial Recognition

Venial Recognition (Unique Vein Pattern) E-Passport (biometric Passport) Voice Recognition DNA Matching Venial Recognition (Unique Vein Pattern)

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Physiological Behavioral Challenges & Threats Promises and Future Work Conclusion

Behavioral Biometrics Identification and verification based on user behavior Results are never 100% accurate: FAR: False Acceptance Rate FRR: False Rejection Rate Examples: Keystroke dynamics Mouse dynamics Handwriting dynamics Analysis of Cardiac Sounds EEG/ECG Gait recognition

Keystroke Dynamics I Mostly used when continuous verification is applied Can also be used as an extra security measure when entering username and password Dynamics monitored: Interval (or negative interval) Latency Dwell time Flight time and Up-to-up time Overall typing speed Frequency of errors

Keystroke Dynamics II Time B A Interval Latency Flight Time Up-to-up Time Dwell Time R. Moskovitch, C. Feher, A. Messerman, N. Kirschnick, T. Mustafic, A. Camtepe, B. Lohlein, U. Heister, S. Moller, L. Rokach, and Y. Elovici, “Identity Theft, Computers and Behavioral Biometrics,” IEEE Conference on Intelligence and Security Informatics. pp 156, June 2009

Keystroke Dynamics III Approaches: Extra security measure at login time Continuous Verification: If username and password entered correctly, system can allow user in and keep monitoring behaviour  probability of impostor is calculated. Innovation Contest | Safelock

Mouse Dynamics I The characteristics of a user’s interaction with a specific GUI Measurements: Distance travelled Duration Direction Dynamics monitored: Mouse movement Drag and drop Point and click Silence

Mouse Dynamics II A. A. E. Ahmed and I. Traore, “A New Biometric Technology Based on Mouse Dynamics,” IEEE Transactions on Dependable and Secure Computing, vol. 4, issue 3, pp 167, July-Sept. 2007.

Analysis of Cardiac Sounds Biometric identification based on cardiac sounds: PhonoCardioGram (PCG) signals: Measures sounds from the heart Analysis of heartbeats’ frequency, power and murmurs

EEG/ECG Electroencephalography: measurement and recording of electrical activity in different parts of the brain Electrocardiography: measurement and recording of electrical activity in different parts of the heart

Gait Recognition Biometrics “It’s The Way You Walk” [2:13]

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Biometric Sensors Privacy Promises and Future Work Conclusion

Challenges Improve collection devices (Biometric Sensors) Develop more efficient and effective large-scale operational capabilities (Biometric Systems) Establish Standards for plug-and-play performance – (Biometric Systems Interoperability) Enable informed debate on why, how and when biometrics should and can be used- (Biometrics Privacy and Security).

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Biometric Sensors Privacy Promises and Future Work Conclusion

Biometric Sensors Speech Recognition: stress, emotion, illnesses Simple Hygiene of users may create problems People age Around half the population wears glasses or contact lenses Biometric technology can injure the individual (iris recognition uses a camera and not a laser) Facial Recognition: Twin Case? “Much work is needed to match the reality of human behavior with the performance expected from the technology...”

Legal Issues and Public Concerns Biometric Systems Legal Issues and Public Concerns Does the biometric system store information enabling a person’s “identity” to be reconstructed or stolen? What happens to the biometric data after the intended use is over? Is the security of the biometric data assured during transmission and storage? Notice of Biometric Use. Is the public aware a biometric system is being employed? WVU: Biometric Systems & Information Assurance

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Biometric Sensors Privacy Promises and Future Work Conclusion

Privacy Embed privacy functionality into every layer of the architecture (Sensors to interoperable biometrics network) Clearly document and articulate: (Privacy Assessment) Operational purpose and scope of the proposed system Underlying Authority of the organization Demonstrate that all system functionality (including information sharing) is under legal authority Privacy Acts Personal information should only be collected if it specifically advances a legitimate purpose. Collect minimum amount of info needed

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Promises and Future Work Personalization as a Trend Advertisements based on who you are A door unlocks as someone approaches, activated by facial recognition Automobile Security: My car door unlocks as I touch the door handle. No more keys, just you

Biometric System Implementation Primary Driving Forces Outline Introduction Biometrics Defined Biometric System Implementation Primary Driving Forces Types of Biometrics Challenges & Threats Promises and Future Work Conclusion

Conclusion Biometric technologies are available today that can be used in security systems to help protect assets. Future work is done extensively on behavioral biometrics since they are more robust, reliable, and personalized. Issues for Future Research in Biometrics: Face (Skin texture and reflectance / 3D Face) Fingerprint @ distance Multi-biometrics Simulation, e.g., synthetic aging

Conclusion The Future of Personalization

Thank You For Your Attention !! Questions & Answers