Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
BIOMETRIC VOTING SYSTEM
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Challenges and Potential Research Areas In Biometrics.
IQA(Image Quality Assessment) for Fake Biometric Detection
Biometrics.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
By: Monika Achury and Shuchita Singh
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Voice Recognition
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Hossein Sameti Department of Computer Engineering Sharif University of Technology.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Authentication Approaches over Internet Jia Li
Introduction to Biometric Systems
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
BIOMETRICS.   technology/9742-1_ html.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Networking Network Classification, by there: 3 Security And Communications software.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently speak.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Multimodal Biometric Security 1.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Multimodal Biometric Security
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics , Computer & Network Security 1
Biometrics and Standards ITU-T Technology Watch Report December 2009.
Biometric transaction confirmation with ComBiom.
Presentation transcript:

Liveness Testing Shivankush Aras

Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints, artificial fingers, high quality voice recordings, etc. Attacking via input port. Attacking the biometric database. Spoofing: “ The process of defeating a biometric system through the introduction of fake biometric samples.”

Biometrics and Liveness Liveness enhances the security of the biometric system by only considering the “real” features. Liveness is a major attribute in individuals’ feature space but has very low specificity by itself: it is dichotomy of the feature space into live and non-living. Liveness detection reads claimant’s physiological signs of life.

Liveness detection  It requires some software enhancement of the biometric system eg. Fingerprint : perspiration. Face : head movements.  Hardware enhancements eg. Fingerprint : temperature sensing, detection of pulse on fingertip Voice: matching the lip movement (video) to the audio.

Conclusion Liveness detection in multi-modal biometric devices has the potential to enhance security, reliability and effectiveness. Although biometric authentication devices can be susceptible to spoof attacks, different anti-spoofing techniques can be developed and implemented.