Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Biometrics 101 You are the Key. A Need for Better Security One person can have a greater negative impact on society than ever before. More individuals.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
R ETINAL S CANNING by the Man, the Myth, the Legend Justin Thompson.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Physical Security Secure the room Secure the machine – 6 ways.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Biometrics Security in Banking Systems Image processing in ATM
Black Ice Security Services
BIOMETRICS Presented By Sapin.M.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Presentation transcript:

Geoff Lacy

Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA

Definition  “Biometrics is the science and technology of measuring and analyzing biological data.”

How does Biometric tech work?  Biometrics do not create a picture to compare to.  Makes use of a template. ○ Creates a template using an distinctive features Login template Challenge template Sensitivity is based on how close to the login template the challenge template is.

Sensitivity  False Accept Rate or False Positive Rate the probability that the system incorrectly matches the input pattern to a non-matching template in the database.  False Reject Rate or False Negative Rate the probability that the system fails to detect a match between the input pattern and a matching template in the database.

Fingerprint  Most common Biometric  Optical scanning and Capacitance scanning  Uses minutiae, or distinctive features.

Pros and cons of fingerprint  Pros Cheap Easy Widely used Most people are comfortable with providing fingerprints Can’t write down fingerprint or forget it  Cons Can be faked Mythbusters Fingerprints can be damaged

Iris  The iris is the colored ring around the pupil of every eye and no two are alike  Measures the pattern of the colors in the iris  Some ATM’s use this technology  United Arab Emirates IrisGuard's Homeland Security Border Control has been operating in the United Arab Emirates (UAE) since 2001, all customs agencies are equipped with iris scanners.

Pros and cons of Iris  Pros Iris recognition is rarely impeded by glasses or contact lenses It can be scanned from 10cm to a few meters away. The iris remains stable over time as long as there are no injuries and a single enrolment scan can last The iris is an internal organ that is largely protected by damage and wear by the cornea.  Cons Can be faked Been faked with a high definition photos of a face The accuracy of scanners can be affected by changes in lighting Iris scanners are significantly more expensive than some other forms of biometrics.

Retina  Retina is the back of the eye.  Measures the pattern of the veins.  The idea for retinal identification was first conceived by Dr. Carleton Simon and Dr. Isadore Goldstein and was published in the New York State Journal of Medicine in The idea was a little before its time, but once technology caught up, the concept for a retinal scanning device emerged in 1975.

Pros and cons of Retina  Pros Low occurrence of false positives Extremely low (almost 0%) false negative rates Highly reliable because no two people have the same retinal pattern Speedy results: Identity of the subject is verified very quickly Very difficult to fake ○ Requires live tissue  Cons Measurement accuracy can be affected by cataracts or severe astigmatism Not very user friendly o Scanning procedure is perceived by some as invasive o Subject being scanned must be close to the camera optics High equipment costs

Face  Template created from Eigen Faces. 2-D image  A newly emerging trend, claimed to achieve improved accuracies, is three- dimensional face recognition. This technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin

Problems with Privacy  People don’t seem to like being identified from cameras. In January 2001, the city of Tampa, Florida used the technology to scan the faces of people in crowds at the Super Bowl, comparing them with images in a database of digital mug shots. Tampa then installed cameras equipped with face recognition technology in their Ybor City nightlife district, where they have encountered opposition from people wearing masks and making obscene gestures at the cameras. In late August 2001, a member of the Jacksonville, Florida City Council proposed legislation to keep the technology out of Jacksonville.

Voice, Handwriting, DNA  Voice Never became popular due to background sound issues  Handwriting People often change there signature. However popular in some places.  DNA Currently takes a long time for DNA results. Maybe in a few years it might be more popular?

As a System Admin  If you need level three authentication. Who you are Biometrics is supposed to increase confidentiality and availability. ○ Confidentiality is increased by securing the data with better authentication techniques. Biometrics is realistically impossible to brute force. ○ Availability is increased because it is easier to log in with a biometric as opposed to a token card or password.  What Security level do you need?  Is it within budget?