Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

Fuzzy Vaults: Toward Secure Client-Side Matching Ari Juels RSA Laboratories 10th CACR Information Security Workshop 8 May 2002 LABORATORIES.
Fuzzy Stuff Lecture 24, Outline Motivation: Biometric Architectures Motivation: Biometric Architectures New Tool (for us): Error Correcting.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
SAP checks if USER ID & Password combination is valid. No identification. User requests Log-on, enters USER ID & Password, (not necessarily their own)!
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Introduction to Fingerprint Biometrics By Tamar Bar.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
Introduction to Biometric Systems
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
G53SEC 1 Authentication and Identification Who? What? Where?
Biometrics Authentication Technology
G53SEC 1 Authentication and Identification Who? What? Where?
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 17 Managing Information © 2015 Cengage Learning. MGMT7.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
Presentation transcript:

Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2, JUNE 2006 Presenter: Eugene Phan

Biometrics: A Tool for Information Security2 Summary The need for reliable user authentication and identification has risen from concerns in content ownership, information security, border control. The need for reliable user authentication and identification has risen from concerns in content ownership, information security, border control. Instead of authenticating the possession of an identity item (license key, password), verify the person himself (biometrics): claimed identity (duplication), known identity (in database), a wanted person? Instead of authenticating the possession of an identity item (license key, password), verify the person himself (biometrics): claimed identity (duplication), known identity (in database), a wanted person?

Biometrics: A Tool for Information Security3 Comments (Positive) I Goes to some lengths in explaining Biometrics: Goes to some lengths in explaining Biometrics: o Types & properties of biometric feature (face, voice, iris, fingerprint, etc) o Limitations of acquisition (presentation is inconsistent and irreproducible, quality is not always guaranteed) o Imperfect matching (unlike password) resulting in false positive and false negative

Biometrics: A Tool for Information Security4 Comments (Positive) II Goes to some lengths in explaining Biometrics (cont): Goes to some lengths in explaining Biometrics (cont): o Describes the function of biometric system (authentication, ‘wanted list’) and how it works o Vulnerability to attacks (Zero-Effort where 2 individuals have very similar biometric features, Adversary where spoofing, circumvention, etc are attempted) Suggests watermarking and steganography coupled with encryption to protect biometric templates.

Biometrics: A Tool for Information Security5 Comments (Negative) Presents the idea of Biometric Crypto- System - use of biometric as part of the key generation & storage. Presents the idea of Biometric Crypto- System - use of biometric as part of the key generation & storage. Current implementation is to unlock the key. Current implementation is to unlock the key. Introduces “fuzzy vault” technique but not clearly explained. Introduces “fuzzy vault” technique but not clearly explained. Novel concept but explanation of implementation is not clear. Novel concept but explanation of implementation is not clear.

Biometrics: A Tool for Information Security6 Question With the current performance in enrollment and verification, would you be comfortable (trust) having biometric system protect your bank account - miss identification as a bad person or overnight billionaire? With the current performance in enrollment and verification, would you be comfortable (trust) having biometric system protect your bank account - miss identification as a bad person or overnight billionaire?

Biometrics: A Tool for Information Security7 Thank You Very Much! Questions? Questions?