Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Slides:



Advertisements
Similar presentations
Exam and revision techniques. 1. To describe the main EU institutions. 2. To identify the differing sources of EU law and their impacts. 3. To explain.
Advertisements

System Planning (Preliminary Investigation Overview)
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
FIGURE 36 A BUDGET SUMMARY PAGE 78 NAME TEACHER DATE NAME, TEACHER AND DATE1.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
Biometrics & Security Tutorial (a) Why multi-biometrics? (P13: 3-6)
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Introduction to Biometric Systems
Overview of Total Quality Tools
Copyright © The Open Group 2011 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
6 th IFAC International Conference on Management and Control of Production and Logistics Fortaleza, Ceará, Brazil, September 11-13, 2013 TITLE Author(1)
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
11 Writing a Conference Research Paper Miguel A. Labrador Department of Computer Science & Engineering
Epidemiology Literature Critique Outline and guidelines.
A model for designing product-service systems using functional analysis and agent based model Author: Nicolas Laboratory, Grenoble universities – INPG,
Behavioral Modeling: Sequence and Communication Diagrams Copyright © 2009 John Wiley & Sons, Inc. Copyright © 2005 Pearson Education Copyright © 2009 Kannan.
Requirement Engineering for Trust Management : Model, Methodology Reasoning P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, “Requirements Engineering.
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
1 15 quality goals for requirements  Justified  Correct  Complete  Consistent  Unambiguous  Feasible  Abstract  Traceable  Delimited  Interfaced.
An Efficient Software Protection Scheme Antonio Maña, Ernesto Pimentel Antonio Maña, Ernesto Pimentel University of Málaga, SPAIN in Trusted Information:
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Decimalisation Table Attacks for PIN cracking “ It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
Research Paper Sections
CMGT 411 Week 2 Individual Information Security Article Evaluation Using various Internet sources, find an article or website on an information security.
Bibliography / References Conclusion / Discussions
Presentation template:
An Efficient Software Protection Scheme
The Title of the Paper, in Bold Letters
Bibliography / References Conclusion / Discussions
Systems Analysis and Design in a Changing World, 6th Edition
RFIC2018 Interactive Forum (IF)
Project Title Date Location of Kaizen Author.
Title Author name1, Author name2 and Author name3 Department of
Results, Discussion, and Conclusion
[Authors] [Affiliation]
RFIC Interactive Forum (IF) PowerPoint Presentation Template
The Title of the Paper, in Bold Letters
SWEN 5230 Your Project Title
How to Read a Paper (Practice: CCS’14)
ภาควิชาวิทยาการคอมพิวเตอร์ คณะวิทยาศาสตร์
Bibliography / References Conclusion / Discussions
International Conference on Recent Trends in Communication & Intelligent System (ICRTCIS-2019) P1.01 Paper Title First A. AUTHOR1, Second B. AUTHOR1, and.
Sequences – Geometric – Link
Quadratic Rational Equations – With Coefficients – Link
Similar Shapes – Length, Area & Volume – Higher – GCSE Questions
Venn Diagram – Notation – Foundation – GCSE Questions
Pythagoras – Finding AB – Foundation – GCSE Questions
Rates of Change – Higher – GCSE Questions
Identifying – Specific Non-Linear Graphs – Higher – GCSE Questions
Range – Foundation – GCSE Questions
Rounding Using Significant Figures – Foundation – GCSE Questions
Cuboid – Volume & Surface Area – Foundation – GCSE Questions
Venn Diagrams – Foundation – GCSE Questions – AQA
Circle – Vocabulary – Higher – GCSE Questions – AQA
Dividing into a Ratio – Link
Identifying Proportional Graphs – Higher – GCSE Questions
Changing the Subject of a Formula – With Factorisation – Link
Linear Equations – Mixed – Link
Calculating a Percentage Multiplier – Higher – GCSE Questions
Venn Diagrams – Probability – Foundation – GCSE Questions
Sequences – Special – Link
Calculating a Percentage Multiplier – Link
Prism – Volume – Higher – GCSE Questions – AQA
Finding Repeated Percentage Change – Link
Repeated Percentage Change – Increase – Link
Venn Diagrams – Card Complete & Match
CS 514 Class presentation template [Replace it with the title of your project] Xiaowei Yang.
Presentation transcript:

Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1, Issue 2, June 2006, pp Presented by Sumit Poddar

Summary Biometrics: Recognition technique based on “who you are” rather than “what you know” or “what you have”.Biometrics: Recognition technique based on “who you are” rather than “what you know” or “what you have”. This paper provides an overview of biometrics.This paper provides an overview of biometrics.

Critical Comment In the section corresponding to template security the author uses “Hill Climbing Attack” in multiple places without describing it in detail. In the section corresponding to template security the author uses “Hill Climbing Attack” in multiple places without describing it in detail.

Appreciative Comment Explains the important aspects of biometric systems which are listed below The characteristics used in biometric systemsThe characteristics used in biometric systems Biometric VarianceBiometric Variance Operation of a Biometric SystemOperation of a Biometric System Functionalities of a Biometric SystemFunctionalities of a Biometric System Attacks on a Biometric SystemAttacks on a Biometric System Multi-Biometric SystemsMulti-Biometric Systems

Appreciative Comment Highlights the aspects which are currently areas of research and can make biometrics an improved technology.Highlights the aspects which are currently areas of research and can make biometrics an improved technology.  Effective representation and matching  Characterizing signal quality and enhancement  Empirical Performance Measurement

Appreciative Comment Failures in biometric systems can be clearly explained with the help of a fish-bone diagram. Figure1: Fishbone (cause and effect) diagram of biometric failures

Discussion How can we use a fish-bone diagram to model security failures in the example scenario mentioned below?  Example scenario: biometric passport