Chapter 13 Biometrics What you are

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
Vitaly Shmatikov CS 361S Biometric Authentication.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002.
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
CS G357: Computer Security, Privacy and Usability Simson L. Garfinkel.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
User Verification System by William Baker, Arthur Evans, Lisa Jordan, Saurabh Pethe Client Dr.Cha.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Part 2  Access Control 1.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
BIOMETRICS.   technology/9742-1_ html.
Gerhard Steinke BUS 3620 Steinke1 According to Internetworldstats.com, there are 2,405,518,376Internetworldstats.com internet users worldwide.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Chapter 13 Biometrics What you are

Handwritten signatures Requires careful examination Rarely examined closely Electronic examination has high fault rates Have to use signature tablet Detects velocity etc of signature Links

Biometrics Trade-off False acceptance rate Fraud (type 1) False rejection rate Insult (type 2) Must balance Often times simply used as deterrent in retail Or as supplement

Links m m s_Technology.html s_Technology.html tml tml ver/442-1.html ver/442-1.html

Face recognition Oldest method of all Humans very unreliable in doing this with strangers Yet widely used in photo IDs Again often a simple deterrent Electronically Identity verification Face in crowd

Links Manual 405/is_3_130/ai_ /is_3_130/ai_ Electronic

Fingerprints Large player in biometric industry Accepted in our culture for identification Used widely in law enforcement for identification Matching against database time consuming Proper to use in “sweeps” DNA replacing to some degree

Links FingerPrinting History te= te= te= =showArticle%26ID=105 te= =showArticle%26ID=105 Automatic m m

FingerPrints When doing “sweeps” even very small false positive rates bite you Fingerprint impressions are “noisy” Assumption that a method is infallible generates complacency in use Belief that is infallible produces extreme consequences when it does

Iris Codes Advantages Best error rates Limited genetic influence Very random Disadvantages Intrusive to obtain Possible impersonation attacks using pictures Iris identification article

Voice Recognition Problems Background noise Digital reproduction from previously recorded Imitation Forensic Phonology Matching voice to phone call

Others Face thermo grams Scent Hand geometry Gait DNA (spit in the device )

What goes wrong DNA high false positives, sloppy lab work Environmental conditions Age (in law enforcement) Print must be “new” Grannies finger in pickle jar Collusions Intentionally downgrade sample (handwritting) Combining biometrics to get lower error rate May increase false negatives Anomalies in the population Damaged fingerprints Missing hands Religious issues

Articles Case of false positive with fingerprints echelon carnivore Religious issues and biometric identification

Past Articles Carnivore echelon ksecurityprivacy/l/aa071900b.htm ksecurityprivacy/l/aa071900b.htm fingerprinting / /1317