Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
BIOMETRIC VOTING SYSTEM
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
Department of Labor HSPD-12
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #13 Biometric Technologies: Some Physiological Biometrics.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1 Biometrics and the Department of Defense February 17, 2003.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Behavioral Biometrics October 10, 2005.
BIOMETRICS.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Summary Physical Access & Time and Attendance PC/Network Access
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
A SEMINAR REPORT ON BIOMETRICS
15-5 Automated Fingerprint Identification System
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005

Outline l Overview l Citizen Facing Applications l Employee Facing Applications

References l Course Text Book, Chapter 11, Chapter 12

Groups of Applications l Citizen Facing Applications - E.g., Criminal identification l Employee Facing Applications - PC/Network access, Physical access l Customer-facing applications - POS Transactions

Citizen Facing Applications l A Government body (state, federal agency) provides authentication an enforces compliances with the system’s match decisions l Examples, law enforcement, benefits disbursement, obtaining drivers’ license l Large scale systems enrolling thousand of people l Three aspects - Criminal identification - Citizen identification - Surveillance

Criminal Identification l Use of biometrics technologies to - identify or verify the identity of a suspect, detainee l Law enforcement applications

Current Trends and Directions l Current Trends - Automated fingerprint searches against local, state and national databases - Automated processing of mug shots l Directions - Internet-based fingerprint and image databases - DNA-based solutions

DNA Biometrics l Proving that a suspect's DNA matches a sample left at the scene of a crime requires two things: Creating a DNA profile using basic molecular biology protocols; Crunching numbers and applying the principles of population genetics to prove a match mathematically l Humans have 23 pairs of chromosomes containing the DNA blueprint that encodes all the materials needed to make up your body as well as the instructions for how to run it. One member of each chromosomal pair comes from your mother, and the other is contributed by your father. l Every cell in your body contains a copy of this DNA; While the majority of DNA doesn't differ from human to human, some 3 million base pairs of DNA (about 0.10 percent of your entire genome) vary from person to person. l The key to DNA evidence lies in comparing the DNA left at the scene of a crime with a suspect's DNA in these chromosomal regions that do differ.

Related Technologies l AFIS technology with live scan devices most commonly used l Facial scan - Confidence is not high

Biometrics Solution Matrix l How urgent is the authentication problem that biometrics are solving l What is the scope of the authentication problem that biometrics are solving l How well can biometrics solve the authentication problem? l Are biometrics the only possible authentication solution? l How receptive are users to biometrics as an authentication solution

Factors considered in the Matrix l Exclusivity - Biometrics is the only technology for large scale applications l Effectiveness - High level of accuracy l Receptiveness - Little resistance l Urgency - Rapid searches needed l Scope - Limited usually to law enforcement

Cost and Deployment Issues l Hardware l Convert ink-based cards to electronic fingerprint cards l Fingerprint matching l Facial scan l Deployment, integration, maintenance

Citizen Identification l Use of biometrics to identify/verify individuals when interacting with government agencies - Card issuance - Voting - Immigration - Social services

Current Trends and Directions l Current Trends - Voting and Voter Registration - Government benefits - Immigration - Driver’s license - Background checks l Directions - Multifunction cards with information including employment, medical, citizenship status

Related Technologies l AFIS, Face scan and Finger scan used most often l Mostly government section applications

Factors l Exclusivity - Biometrics is the only technology for many of the functions l Effectiveness - High level of accuracy l Receptiveness - Need consent l Urgency - Not as pressing as criminal identification l Scope - Wide range of applications

Cost and Deployment Issues l Logistics of enrollment - Difficult to enroll millions of people l Scalability l Need to work for numerous people l Response times - Delays will cause backlog l Error rates - Must be within acceptable range l Legacy systems - Need to integrate new systems with existing systems l Privacy - Need privacy enhanced systems

Surveillance l Identify or verify the identity of a person in a specified area l Complement/Replace authentication methods such as manual monitoring

Current Trends and Directions l Current Trends - Deployed in casinos, policy applications, Matching through surveillance cameras l Directions - Counterterrorism, More widespread use

Related Technologies l Facial scan is the main technology l Voice scan may be used for conversation monitoring

Factors l Exclusivity - Biometrics is the only technology for surveillance monitoring l Effectiveness - Deterrence is the main benefit l Receptiveness - After 9/11 more acceptance l Urgency - 9/11 has changed the urgency l Scope - Widespread use is possible

Cost and Deployment Issues l Companies can get income from licensing l Can use existing hardware, especially for facial scan l Need quality enrollment l May need manual intervention to make absolutely certain l Deference only if the person is aware being monitored

Employee Facing Applications l Institution (public or private) provides authentication an enforces compliances with the system’s match decisions l Usually a closed system within a department l Two aspects - PC/Network access - Physical access, time attendance

PC/Network Access l Use of biometrics to identify/verify access to a PC or network resources l Usually intended to complement/replace passwords/PINs

Current Trends and Directions l Current Trends - Access to sensitive files - Used in products such as Windows NT, Novell, Solaris - Middleware-based solutions l Directions - Smartcard, PKI together with Biometrics - More widespread use - Keystroke dynamics

Related Technologies l Finger scan and middleware technologies l Facial scan and vice scan are also being investigated

Factors l Exclusivity - Biometrics not the only solution. Passwords still being used l Effectiveness - Fairly low error rates l Receptiveness - General receptive due to increased security l Urgency - Urgent due to risks involved with passwords mechanism l Scope - Will affect nearly every individual due to PC access

Cost and Deployment Issues l Cost depends on number of users and machines used l Enrollment issues l Are users mobile? l Remote resource access l What happens if users are falsely rejected? l Educating the user about the system l Establishing security levels

Physical Access/Time and Attendance l Identify/verify individual entering the building l Complements/replaces current authentication schemes

Current Trends and Directions l Current Trends - Control access to secure areas - Time/attendance record keeping l Directions - Integrating biometric technologies with human resources applications

Related Technologies l Hand scan and finger scan are commonly used l Iris scan and retina scan have also been deployed

Factors l Exclusivity - Biometrics not the only solution. Badges, tokens also used l Effectiveness - Rapid response problem l Receptiveness - More receptive to physical access than time/attendance l Urgency - Air travel after 9/11 l Scope - Potential for widespread use

Cost Issues l Cost mostly for hardware and integration l Need to have a good understanding of the current access system, fallback procedures in case of false rejection - PIN, passwords etc.