B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen 120070494 UNIVERSITY.

Slides:



Advertisements
Similar presentations
Biometric standards An overview of biometrics and identity management February 2010.
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
Biometrics Pearl Brewer, Ph.D. HOA 725. Definition of Biometrics Automated identification based on physiological or behavioral characteristics  Examples.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
Security-Authentication
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by : Mahmoud Alasi UNIVERSITY.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Author: Austin Kamrath Wednesday April 12th, 2017
Biometrics : From Yesterday to Tomorrow
Authentication.
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Security Architect & BS7799 Lead Auditor
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY OF PALESTINE 1

T HE NEED TO IDENTIFY Every day we are required to identify ourselves Using a bank card with a PIN at a cash machine A password to log on to a computer Using a key to open a door Punching a code into a keypad to enter the workplace Using passwords on the Internet Providing a passport and driving licence as proof of identity We need to be able to accurately IDENTIFY an individual to minimize current issues and threats UNIVERSITY OF PALESTINE 2

C URRENT ATTRIBUTES USED TO IDENTIFY UNIVERSITY OF PALESTINE Name Address Postcode Date of Birth Account no. Passwords PINs Phone no. Mother’s maiden name Passport Birth certificate Driving licence Credit cards Utility bills Membership cards Salary slip 3

I S BIOMETRICS THE ANSWER ? A biometric is part of the person and is not easily compromised through: Theft Collusion Loss Simplifies user management resulting in cost savings Users do not need to remember passwords Users do not need to remember PINs User accounts cannot be shared Easy to use UNIVERSITY OF PALESTINE 4

B IOMETRIC DEFINITION The automated recognition of individuals based on their behavioural and biological characteristics The general meaning of biometrics encompasses counting, measuring and statistical analysis of any kind of data in the biological sciences including the relevant medical sciences The term is derived from the Greek words “bios” meaning life and “metron” meaning measure UNIVERSITY OF PALESTINE 5

B IOLOGICAL AND BEHAVIOURAL Biological Fingerprint Face (2D & 3D) Iris Vein pattern Hand geometry DNA UNIVERSITY OF PALESTINE Behavioural  Signature  Gait  Voice  Keystroke dynamics

I RIS Captures the pattern of flecks on the iris Uses conventional cameras Average 2 seconds for identification No physical contact between user and reader UNIVERSITY OF PALESTINE 7

F ACE Based upon the geometric shape and position of features of the face Resistant to changes in skin tone, facial hair, hair style, and eyeglasses No active user involvement required in order to perform identification/verification Limited success in practical applications UNIVERSITY OF PALESTINE 8

V OICE Analyses voice patterns and characteristics of speech e.g. pitch, tone, etc. High user acceptance – perceived as least intrusive biometric technology Easy for end users to implement Ideal for telephone systems/mobile environments UNIVERSITY OF PALESTINE 9

H AND GEOMETRY Measures the physical characteristics of the user’s hand and fingers Low level infrared light and camera used to capture an image Suited to applications where there is a large user base or users access the system infrequently Systems are easy to use and robust UNIVERSITY OF PALESTINE 10

S IGNATURE Based on analysis of the dynamics of a handwritten signature e.g. shape, speed, stroke order, pen pressure Generally use pressure sensitive tablets or wired pens User friendly Non intrusive – minimal public acceptance issues Captured signature can be used for digitally signing documents UNIVERSITY OF PALESTINE 11

K EYSTROKE DYNAMICS Monitors rate of typing and intervals between letters Verification based on typing rhythm – intruders may guess password but fail to key in with correct rhythm Neither enrolment nor verification disturbs the regular flow of work Low cost – only hardware required is keyboard UNIVERSITY OF PALESTINE 12

F INGERPRINT Variety of fingerprint devices available (silicon and optical) Template constructed by analysing patterns that make the fingerprint (minutiae) UNIVERSITY OF PALESTINE 13

DNA Forensic genetics use deoxyribonucleic acid (DNA) profiling in a number of important human identity applications 0.01% of a person's entire genome is unique to each individual This represents 3 million base pairs of DNA 95% of the human genome are non-coding sequences (called junk DNA) Standard profiling systems only exploit the junk DNA to maintain the privacy and civil rights of the donor UNIVERSITY OF PALESTINE 14