Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Presented by Stanley Chand & Damien Prescod.  Introduction  Biometric systems  Generic Biometric systems  Application in types of Biometrics  Biometrics.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Biometrics Tasanawan Soonklang

2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different? Issues – how to choose?, accuracy, concerns IT related to biometrics Movies – some funMovies References – some more readings & linksreadings & links

3 Biometrics

4 What is ? A term derived from ancient Greek bio = life metric = to measure “Measurement of physiological and behavioral characteristics to automatically identify people.”

5 Definition “The automated approach to authenticate the identity of a person using the individual’s unique physiological or behavioral characteristics.” – Yau Wei Yun (2003) “Biometrics deals with identification of individuals based on their biological or behavioral characteristics” – Jain et al (1999)

6 Characteristics Physical/biological characteristics –Face –Fingerprint –DNA –Hand and finger geometry –Eye structure –Iris –Retina –Ear –Vascular patterns –Odor –Voiceprint

7 Characteristics Behavioral characteristics –Signature –Gait –Handwriting –Keystroke –Voice pattern

8 Identification Identification – associating an identity with an individual Verification (authentication) –The problem of confirming or denying a person’s claimed identity (1: 1) –Am I who I claim I am? Recognition (identification) –The problem of establishing a subject’s identity (1: Many) –Who am I?

9 Identification Methods Traditional –Something you know: PIN, password... –Something you have: key, token, card... But does not insure that you are here and the real owner. Biometrics –Something you are: a biometric.

10 Applications

11 Why use ? Accurate identification of a person could deter –crime and fraud –streamline business processes –save critical resources

12 Who uses ? Government Military Schools Commerce Law Enforcement Others ?

13 Where are it used ? Many products such as PC are already using fingerprints. fingerprints Another big class, historically the first, is the identification for police application. police Now, some countries are using biometrics for immigration control in airport/border patrol. immigration Banks are now proposing some ATMs.ATM Payment using biometrics is more and more used in stores. stores Identification of the student in schools. schools Identification of the mother/newborn in hospitals.

14 Operation

15 Enrollment CaptureProcess Store How does it work ? Verification Process No Match Match Capture Compare ?

16 Example Original source : Anil Jain and Arun Ross (1999)

17 Types

18 Examples Fingerprinting Palm print Iris scan Retinal scan Facial recognition Voice recognition Handwriting recognition DNA

19 Fingerprint Strength –Proven Technology Capable of High Level of Accuracy –Range of Deployment Environments –Ergonomic, Easy-to-Use Device –Ability to Enroll Multiple Fingers Weakness –Inability to Enroll Some Users –Performance Deterioration over Time –Association with Forensic Application –Need to Deploy Specialized Devices

20 Palm print Strength –Ability to Operate in Challenging Environment –Established, Reliable Core Technology –General Perception as Non-intrusive –Relatively Stable Physiological Characteristic as Basis –Combination of Convenience and Deterrence Weakness –Inherently Limited Accuracy –Form Factor That Limits Scope of Potential Applications –Price

21 Iris Strength –Resistance to False Matching –Stability of Characteristic over Lifetime –Suitability for Logical and Physical Access Weakness –Difficulty of Usage –False Non-matching and Failure-to-Enroll –User Discomfort with Eye-Based Technology –Need for a Proprietary Acquisition Device

22 Retina Strength –it is not easy to change or replicate the retinal vasculature. –Supposed to be the most secure biometric Weakness –The image acquisition involves cooperation of the subject –entails contact with the eyepiece –requires a conscious effort on the part of the user.

23 Face Strength –Ability to Leverage Existing Equipment and Image Processing –Ability to Operate without Physical Contact or User Complicity –Ability to Enroll Static Images Weakness –Acquisition Environment Effect on Matching Accuracy –Changes in Physiological Characteristics That Reduce Matching Accuracy –Potential for Privacy Abuse Due to Non- cooperative Enrollment and Identification

24 Voice Strength –Ability to Leverage Existing Telephony Infrastructure –Synergy with Speech Recognition and Verbal Account Authentication –Resistance to Imposters –Lack of Negative Perceptions Associated with Other Biometrics Weakness –Effect of Acquisition Devices and Ambient Noise on Accuracy –Perception of Low Accuracy –Lack of Suitability for Today’s PC Usage

25 Signature Strength –Resistant to Imposters –Leverages Existing Processes –Perceived as Non-invasive –Users Can Change Signatures Weakness –Inconsistent Signatures Lead to Increased Error Rates –Users Unaccustomed to Singing on Tablets –Limited Applications

26 DNA DNA (DeoxyriboNucleic Acid) is the 1D ultimate unique code for one’s individuality. Identification for forensic applications only. Three factors limit the utility of this biometric for other applications –Contamination and sensitivity –Automatic real-time identification issues –Privacy issues

27 Issues

28 Comparison Universality – each person should have the characteristic. Uniqueness – is how well the biometric separates individuals from another. Permanence – measures how well a biometric resists aging. Collectability – ease of acquisition for measurement. Performance – accuracy, speed, and robustness of technology used. Acceptability – degree of approval of a technology. Circumvention – ease of use of a substitute.

29 Comparison Original source : Yau Wei Yun (2003)

30 How to choose ? How to choose –Size of user group –Place of use and the nature of use –Ease of use and user training required –Error incidence such as due to age, environment and health condition –Security and accuracy requirement needed –User acceptance level, privacy and anonymity –Long term stability including technology maturity, standard, interoperability and technical support –Cost

31 Accuracy Failure to Enroll Rate (FTE) –% of data input is considered invalid and fails to input into the system. False Acceptance Rate (FAR) –% of invalid users who are incorrectly accepted as genuine users. False Rejection Rate (FRR) –% of valid users who are rejected as imposters. Equal Error Rate (EER) –The rate at which both accept and reject error are equal

32 FTE

33 Scores & Threshold scores – to express the similarity between a pattern and a biometric template.

34 FAR & FRR

35 Relation The more lower EER, the more accuracy Original source :

36 Concerns Identify theft and privacy –Using two-factor solution –Biometrics are purely based on matching –Using encryption for matching template –Scanned live biometric data maybe stolen Sociological concerns –Physical harm to an individual –Personal information through biometric methods can be misused or sold

37 Related to

38 Example Database –Storing matching templates –Querying templates –Database management –Security issues

39 Example Image processing –Assessing the quality –Enhancing the image

40 Example Image processing a) The original b) A close-up of the original c) After 1 st stage of thinning d) After 2 nd stage of thinning e) After applying algorithm, showing bifurcations (black) and endpoints (grey) Original source :

41 Example Intelligent system –Pattern classification & recognition –Decision rules

42 Example Pattern classification & recognition –Training and testing data –Machine learning Original source : Anil Jain and Arun Ross (1999)

43 Example Information retrieval –Retrieval templates for recognition –Scoring –Evaluation Recognition

44 Movies

45 Some fun Hollywood is using biometrics for years. some truth inside, but sometimes, it is wrong… Must see – Gattaca (1997) Gattaca It was wrong – The Island (2005) The Island

46 Some fun Others –James bond –The Bourne –Minority report –etc. (see the first website in reference) Use of some and public concerns Physical biometric for identification or authentication person is the most widely seen. Behavioral biometric much less

47 References

48 More readings & links Publications Yun, Yau Wei. (2003) The ‘123’ of Biometric Technology. - Retrieved from ‘123’ of Biometric Technology Jain, Anil, Bolle, Ruud, and Pankanti, Sharath. (1999) Introduction to biometrics. In: Biometrics, Personal Identification in Networked Society, pp. 1-41, Springer. Introduction to biometrics Jain, Anil, and Ross, Arun. (1999) Introduction to biometrics. In: Handbook of Biometrics, ppIntroduction to biometrics Lecture notes Ioannis Pavlidis. (2003) Introduction to biometrics. In course cosc6397. Department of Computer Science, University of Houston.Introduction to biometrics Rawitat Pulum. (2006) Introduction to Biometrics. In course Faculty of Science, Silpakorn University.Introduction to Biometrics Website orange.fr/fingerchip/biometrics/biometrics.htmhttp://pagesperso- orange.fr/fingerchip/biometrics/biometrics.htm

49 Relation

50 Relation The more lower EER, the more accuracy