B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Marjie Rodrigues
Security-Authentication
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

B IOMETRICS Akash Mudubagilu Arindam Gupta

O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses and Applications of Biometrics Challenges to Biometrics

W HAT IS BIOMETRICS ? Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.

W HAT IS BIOMETRICS ? Physiological and Behavioral characteristics: Physiological: - Fingerprint - Face - Iris - Hand Geometry o Behavioral: - Voice - Keyboard strokes - Signature

W HY B IOMETRICS ? With numerous devices, traditional paradigm of user name and password based scenarios are not practical Only authorized users should have access to data and services Biometrics provide an unobtrusive and convenient authentication mechanism Advantages of biometrics Uniqueness No need to remember passwords or carry tokens Biometrics cannot be lost, stolen or forgotten More secure than a long password Solves repudiation problem Not susceptible to traditional dictionary attacks

G ENERAL BIOMETRIC SYSTEM Determine or authenticate identity Identification Systems: Who am I? Determine Identity Verification Systems: Am I who I claim to be? Authenticate Identity

G ENERAL BIOMETRIC S YSTEM Database Biometric Sensor Feature Extraction Biometric Sensor Feature Extraction Matching ID : 8809 Authentication Enrollment Result

D IFFERENT TYPES OF BIOMETRICS Fingerprint recognition Face recognition Iris recognition Hand geometry Voice Scan Keystroke Scan Signature Scan

F INGERPRINT RECOGNITION Measures unique characteristics in a fingerprint (minutiae) Crossover Core Bifurcations Ridge ending Island Delta Pore Advantages: multiple fingers, large database, proven technology Disadvantages: skin worn out due to age

F ACE RECOGNITION Uses off-the-shelf camera to measure the following facial features: Distance between the eyes Distance between the eyes and nose Angle of a cheek Slope of the nose Facial Temperatures Advantages: No contact required, cameras are common Disadvantages: Face can be obstructed, sensitive to changes in age, depends upon lighting and camera angle

I RIS RECOGNITION Measures unique characteristics of the Iris like ridges, furrows, striations Advantages: Iris is stable over lifetime, no contact is needed Disadvantages: Difficult for people having eye disorders, some people may find this technique somewhat obtrusive.

H AND GEOMETRY Measures the top and sides of the hand, not the palm, contrary to the popular belief Measures the finger lengths, widths, curves Advantages: Easy to capture, widely used for physical access, stable over lifetime Disadvantages: Not sufficiently distinctive over a large population, so not very accurate

V OICE SCAN Measures the sound wave Factors: pitch, intensity, quality and durations of human speech. user talks to a microphone a passphrase. voice print is compared to a previous one Advantages: Easy to implement wherever there is a telephone in use Disadvantages: High variability in an individual’s voice, background noise

K EYSTROKE SCAN Keystroke scan: Measures the time between strokes and duration of key pressed. Most commonly used in systems where keyboard is already being used.

S IGNATURE SCAN Signature scan: Measures speed, pressure, stroke order an image of signature. Non-repudiation Mainly used for verification However forgers could forge it with some training

U SES AND APPLICATIONS OF BIOMETRICS Government and law enforcement Forensic applications Commercial applications

G OVERNMENT APPLICATIONS Passport control Border Control Access control to government systems

F ORENSIC APPLICATIONS Criminal investigations Corpse identification Missing person identification

C OMMERCIAL APPLICATIONS Computer login to different systems Secure banking Employee verification Electronic payment ATM Record protection

C HALLENGES TO BIOMETRICS Informational privacy concerns: Misuse Addressed by: System Design Careful Audit Personal privacy concerns cultural or religious beliefs

REFERENCES Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): IEEE Xplore. Web. 5 Dec