1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
BIOMETRICS THE MAN MACHINE INTERFACE
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Jenna Lutton February 26th, 2007
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication Process The Biometrics Authentication Process Biometric System Components Biometric System Components The Future of Biometrics The Future of Biometrics

2J. M. Kizza - Ethical And Social Issues Introduction A biometric is a physical or psychological trait that can be measured, recorded, and quantified. A biometric is a physical or psychological trait that can be measured, recorded, and quantified. Such traits are abundant in the human body and in access control are used to do a biometric enrollment and stored in a database. Such traits are abundant in the human body and in access control are used to do a biometric enrollment and stored in a database. Biometric technology, based on human attributes, is perhaps one of the safest and most reliable and most secure form of access control so far in use. Biometric technology, based on human attributes, is perhaps one of the safest and most reliable and most secure form of access control so far in use. Access control technologies are based on three axioms: Access control technologies are based on three axioms: Something you know – which includes all passwords and pass phrases Something you know – which includes all passwords and pass phrases Something you have – which include all physical security passes like pass cards, access cards, and all sorts of access cards. Something you have – which include all physical security passes like pass cards, access cards, and all sorts of access cards. Something you are – which includes all human attributes. This group is where biometrics fall. Something you are – which includes all human attributes. This group is where biometrics fall.

3J. M. Kizza - Ethical And Social Issues The Biometrics Authentication Process Key steps for a biometric authentication process are: Key steps for a biometric authentication process are: Image capture – using a biometric reader or scanner Image capture – using a biometric reader or scanner Image recognition – based on a standard biometric algorithm Image recognition – based on a standard biometric algorithm Template creation - again using a standard biometric algorithm and extracted features Template creation - again using a standard biometric algorithm and extracted features Matching of the templates – both the live and stored templates of the individual are compared for a match using a standard biometric algorithm. Matching of the templates – both the live and stored templates of the individual are compared for a match using a standard biometric algorithm.

4J. M. Kizza - Ethical And Social Issues A standard biometric authentication comprises the following functional units: A standard biometric authentication comprises the following functional units: Sensor device a reader or scanner to acquire the biometric raw data from the individual. The reader or scanner can capture images from a fingerprint, a face, an iris, or a sound from a microphone. Readers or scanners at this stage may do some limited preprocessing without introducing foreign information or creating redundancy Sensor device a reader or scanner to acquire the biometric raw data from the individual. The reader or scanner can capture images from a fingerprint, a face, an iris, or a sound from a microphone. Readers or scanners at this stage may do some limited preprocessing without introducing foreign information or creating redundancy Feature extraction to extract traits used in the creation of the template Feature extraction to extract traits used in the creation of the template Matcher to compare the live template with the stored reference template Matcher to compare the live template with the stored reference template Reference archive for storing the biometric reference templates Reference archive for storing the biometric reference templates

5J. M. Kizza - Ethical And Social Issues Biometric System Components The components of a biometric system are: The components of a biometric system are: Data Acquisition Data Acquisition Enrolments Enrolments Signal Processing Signal Processing Decision Policy Decision Policy

6J. M. Kizza - Ethical And Social Issues Types of Biometric Technologies Biometric technologies confirm a person's identity by scanning physical characteristics. Biometric technologies confirm a person's identity by scanning physical characteristics. These traits include: These traits include: Finger Biometrics - involves taking an individual’s fingerprints Finger Biometrics - involves taking an individual’s fingerprints Hand Geometry -Hand features are extracted and taken as the defining feature vector of the user's hand Hand Geometry -Hand features are extracted and taken as the defining feature vector of the user's hand Face Biometrics – are distinctive features of the subject’s face Face Biometrics – are distinctive features of the subject’s face Voice Biometrics - individual voice components called phonemes. Voice Biometrics - individual voice components called phonemes. Handwriting Analysis - a person's specific features from his/her handwriting Handwriting Analysis - a person's specific features from his/her handwriting

7J. M. Kizza - Ethical And Social Issues Iris Biometrics - the features that exist in the colored tissue surrounding the pupil of the subject’s eye. Iris Biometrics - the features that exist in the colored tissue surrounding the pupil of the subject’s eye. Retina - unique pattern of blood vessels with distinctive traits in a human eye Retina - unique pattern of blood vessels with distinctive traits in a human eye

8J. M. Kizza - Ethical And Social Issues Biometric Performance The measure of performance of a biometric is based on three concepts: The measure of performance of a biometric is based on three concepts: false accept rate (FAR) false accept rate (FAR) false non match or reject rate (FRR), false non match or reject rate (FRR), failure to enroll rate (FTE or FER). failure to enroll rate (FTE or FER). Biometric performance is commonly the rate at which both accept and reject errors are equal. Biometric performance is commonly the rate at which both accept and reject errors are equal. This rate is referred to as the equal error rate (EER). This rate is referred to as the equal error rate (EER). We want EER to be as low as possible for a good biometric algorithm We want EER to be as low as possible for a good biometric algorithm

9J. M. Kizza - Ethical And Social Issues The Future of Biometrics With increasing miniaturalization, price reduction, easy of use, less intrusive, and more invasiveness, the future of biometric technology seem bright than ever before. With increasing miniaturalization, price reduction, easy of use, less intrusive, and more invasiveness, the future of biometric technology seem bright than ever before.