Information about Biometrics and its security By Ridham Bhatt.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Biometrics.
IRIS RECOGNITION. CONTENTS  1. INTRODUCTION  2. IRIS RECOGNITION  3. HISTORY AND DEVELOPMENT  4. SCIENCE BEHIND THE TECHNOLOGY  5. IMAGE ACQUISITION.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Information about Biometrics and its security By Ridham Bhatt

Science Fiction? What was your imagination about Science Fiction movies when you were a kid? For example we watched Minority report and thought what an unnatural technology they have there in a movie. ( Anything is possible the way technology is growing.

Continue Biometric is just one of the area where technology is developing itself at its fastest growth.

Objectives Introduction. Types of biometric. Advantages. Disadvantages. Comparison. Vulnerabilities of Biometric.

Introduction The word biometric can be defined as “life-measure.” It is used in security and access control applications to measurable physical characteristics of a person that can be checked on an automated basis. This may sound incredible but the way technology is growing this will shortly be possible everywhere. Biometric technology is replacing pin codes and passwords which can forgotten, lost or stolen.

Types of Biometric & its characteristics Irish Recognition - Uses a video camera to pinpoint the independent coordinates of the eye Face Recognition - Defines a dozen or so points on the face and measures the distance between them Hand - Measures the size and angles of persons hand features Voice - Analyzes the sound waves and speech patterns of recorded voice. Fingerprint - Looks for pattern ends and their changes in direction.

Continue Palm vein Authentication - This system uses an infrared beam to penetrate the users hand as it is waved over the system; the veins within the palm of the user are returned as black lines Retina Scan - A retina scan provides an analysis of the capillary blood vessels located in the back of the eye

Advantages Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) Automated biometric identification can be done very rapidly and uniformly, with minimum amount of training. Your identity can be verified without resort to documents that may be stolen, lost or altered. The techniques like DNA profiling are highly reliable and efficient that’s why it is going to be adopted widely.

Disadvantages Some biometric system can establish an identity only to a certain level of accuracy. FAR or FRR is probability by which system can accept or reject a genuine individual. Cost of the implementation tools is too high (such as finger print sensors are extremely expensive). The cost of the storing biometric templates and of the computing power required to process and match biometric measurement is quite high. There are some techniques like DNA profiling which is complicated and time taking process. Change of hair style in facial recognition, wearing glasses, and light intensity in retina scanning may effect the authentication process.

Performance Comparison of biometric

Security issues concerning Fingerprint recognition Using Grease Stains Left on the Pad : Typically, a human finger contains so much grease that it leaves a non-visible mark where it touches and thus usually leaves a clear mark also on the scanner. This stain can be brought visible in many ways and even a mere breath can show the print very clearly. The scheme is to use this stain by breathing on the scanner and making the scanner think that there is a live finger pressed against its pad. A variation of this idea is to use a finger-like substance that has a flat surface and press it against the pad leaving the grease stain under it. Grease is also known as a method of lubrication and corrosion guard. This is based on the fact that grease rejects water and that it is not a very good conductor. When there is a grease stain left on the surface of the pad, it can be used to prevent water or moist breath attaching that point. Water on the other half has a decent conductance and approximately the same capacitance of the skin. When we breathe, the moist gathers up in the valleys of the fingerprint and makes an inverted duplicate of the finger. Despite this inversion, the relations of the characteristic points are the same as in the enrolled fingerprint and so it could be detected as legitimate user’s print.

Security issues concerning Voice recognition A way has been configured for unauthorized users to hack the system by simply obtaining a recording of the authorized person's password voices tend to change both over time and when users are sick increasing false rejection rates. Finally many people just do not like talking to a computer.

Vulnerabilities of iris verification  Iris scanning is a relatively new technology and is incompatible with the very substantial investment that the law enforcement and immigration authorities of some countries have already made into fingerprint recognition.  Iris recognition is very difficult to perform at a distance larger than a few meters and if the person to be identified is not cooperating by holding the head still and looking into the camera.  As with other photographic biometric technologies, iris recognition is susceptible to poor image quality, with associated failure to enroll rates.  As with other identification infrastructure (national residents databases, ID cards, etc.), civil rights activists have voiced concerns that iris-recognition technology might help governments to track individuals beyond their will.  One of the first e ff orts in the vulnerabilities study of iris verification systems had an iris image of a legitimate user was printed with a high resolution inkjet printer to fraudulently access the system. The trick was only successful if the pupil in the image was cut o ff and the eye of the impostor placed behind the paper to give the impression to the system of a real eye

Credits

THE END