Biometrics and Authentication Shivani Kirubanandan.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Modern Bio Metric Authentication BY : ADAM FLOOR 1.
Challenge/Response Authentication
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics and Authentication Shivani Kirubanandan

Lets Define ! A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”

Biometrics as Authentication Authentication depends on What you haveWhat you have What you knowWhat you know What you ARE !What you ARE ! Authentication depends on What you haveWhat you have What you knowWhat you know What you ARE !What you ARE !

Why Biometrics? Identity thefts Something you know can be stolen Predicted or hacked Reliability on manual verification Identity thefts Something you know can be stolen Predicted or hacked Reliability on manual verification

Application Categories Biometric applications available today are categorized into 2 sectors Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionPsychological: Iris, Fingerprints, Hand, Retinal and Face recognition Behavioral: Voice, Typing pattern, SignatureBehavioral: Voice, Typing pattern, Signature Biometric applications available today are categorized into 2 sectors Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionPsychological: Iris, Fingerprints, Hand, Retinal and Face recognition Behavioral: Voice, Typing pattern, SignatureBehavioral: Voice, Typing pattern, Signature

Biometric Authentication Process Acquisition Creation of Master characteristics Storage of Master characteristics Acquisition(s) Comparison Decision Acquisition Creation of Master characteristics Storage of Master characteristics Acquisition(s) Comparison Decision

The metrics of Biometrics FTE – Failure To Enroll FTA – Failure To Accept FAR – False Acceptance Rates FRR – False Reject Rates FTE – Failure To Enroll FTA – Failure To Accept FAR – False Acceptance Rates FRR – False Reject Rates

Essential parameters Liveness testing Tamper resistance Secure communication Security Threshold level Fall back node Liveness testing Tamper resistance Secure communication Security Threshold level Fall back node

Fingerprint recognition Divides print into loops, whorls and arch Calculates minutiae points (ridge endings) Comparisons authentication Divides print into loops, whorls and arch Calculates minutiae points (ridge endings) Comparisons authentication

Fingerprint techniques Optical Capacitive Thermal Ultrasonic Optical Capacitive Thermal Ultrasonic

Disadvantages Racial issues Dirt, grime and wounds Placement of finger Too big a database to process Can be spoofed –liveness important! Racial issues Dirt, grime and wounds Placement of finger Too big a database to process Can be spoofed –liveness important!

Hand Geometry Geometry of users hands More reliable than fingerprinting Balance in performance and usability Geometry of users hands More reliable than fingerprinting Balance in performance and usability

Disadvantage Very large scanners

Retinal Scanning Scans retina into database User looks straight into retinal reader Scan using low intensity light Very efficient – cant be spoofed! Scans retina into database User looks straight into retinal reader Scan using low intensity light Very efficient – cant be spoofed!

Disadvantages User has to look “directly” FTE ratio high in this biometric Acceptability concerns –Light exposure –Hygiene User has to look “directly” FTE ratio high in this biometric Acceptability concerns –Light exposure –Hygiene

Iris Scanner Scans unique pattern of iris Iris is colored and visible from far No touch required Overcomes retinal scanner issues Contact lenses an issue? Scans unique pattern of iris Iris is colored and visible from far No touch required Overcomes retinal scanner issues Contact lenses an issue?

Face recognition User faces camera Neutral expression required Apt lighting and position Algorithms for processing Decision User faces camera Neutral expression required Apt lighting and position Algorithms for processing Decision

Issues with Face Recognition?

Issues Identification across expression FRR or FAR fluctuate Easily spoofed Tougher usability High Environmental impact Identification across expression FRR or FAR fluctuate Easily spoofed Tougher usability High Environmental impact

Behavioral Voice Signature Typing pattern Voice Signature Typing pattern

Voice Recognition Speech input –Frequency –Duration –Cadence Neutral tone User friendly Speech input –Frequency –Duration –Cadence Neutral tone User friendly

Disadvantages Local acoustics Background noise Device quality Illness, emotional behavior Time consuming enrollment Large processing template Local acoustics Background noise Device quality Illness, emotional behavior Time consuming enrollment Large processing template

Signature Recognition Signature measures (dynamic) –Speed –Velocity –Pressure Captures images (static) High user acceptance Signature measures (dynamic) –Speed –Velocity –Pressure Captures images (static) High user acceptance

Issues Signature variable with –Age, illness, emotions Requires high quality hardware High FRR as signatures are very dynamic Signature variable with –Age, illness, emotions Requires high quality hardware High FRR as signatures are very dynamic

Typing Patterns User typing pattern –Speed –Press and Release Rate Unique patterns are generated comparisons User typing pattern –Speed –Press and Release Rate Unique patterns are generated comparisons

Issues Not very scalable FRR is high Can be spoofed – by simple technology (recorders) Not very scalable FRR is high Can be spoofed – by simple technology (recorders)

Usability issues in Biometrics User acceptability Knowledge of technology Familiarity with biometric characteristic Experience with device User acceptability Knowledge of technology Familiarity with biometric characteristic Experience with device

Usability issues… Environment of use Transaction criticality Time consuming tasks Environment of use Transaction criticality Time consuming tasks

Biometric solutions Educate Train Explain Interfaces Use Trainers Supervised Playtime Educate Train Explain Interfaces Use Trainers Supervised Playtime

General issues FTE posses problem Biometric characteristics are not encrypted Trust on input device Cannot authenticate computers! Privacy attack?! FTE posses problem Biometric characteristics are not encrypted Trust on input device Cannot authenticate computers! Privacy attack?!

Current applications Banks Immigration facilities across USA IDwidget – interesting research Eyegaze at Stanford Banks Immigration facilities across USA IDwidget – interesting research Eyegaze at Stanford

Class task Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them? Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?

Class task… Case 2: Suggest certain areas in which biometrics would prove disastrous Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy Case 2: Suggest certain areas in which biometrics would prove disastrous Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy

Thank You!!