Download presentation
Presentation is loading. Please wait.
Published byJoseph Willis Modified over 8 years ago
1
By Kyle Bickel
2
Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion
3
Biometric Authentication Is referred to as the realistic authentication Characteristics used are distinct, and measurable to identify one individual Multimodal biometrics is the use of more than one type of biometric scanner to enhance the system Functionality of a system is based on factors used such as universality, uniqueness, permanence, measurability, performance, acceptability, circumvention No biometric scanner will meet all the requirements or functions of application
4
Biometric Functionalities Universality states that everyone should possess the trait being measured Uniqueness means that the trait should be different for each individual in the referenced population Permanence is used to describe the manner that the trait varies over time so good traits will reasonably stay the same over time Measurability means how easily the data of the traits can be collected Performance is the accuracy, speed, and overall performance of the technology that is being used Acceptability is how willing the population being used is willing to accept the technology and will allow their traits to be captured Circumvention is the ease at which a trait might be limited using an artifact or substitute
5
Knowledge Factor Is the first type or class of authentication factors Is something that the user knows Examples of this would be a password or phrase, or pin number Is the most common form of user authentication In most multi-factor authentication techniques a password is almost always one of those factors
6
Possession Factor Is the second factor or class of user authentication It is usually something the user owns Examples of this would be an ID card, security token, hardware tokens, software tokens, lock and key One of the oldest forms of authentication Biggest problem is that your possession can be stolen giving someone else access
7
Inherence Factor Third class of user authentication Usually refers to something the user has or does Examples of this would be fingerprint, retinal pattern, DNA sequence, signature, face, and voice recognition This is where Biometrics falls under Expensive alternative to user authentication Vulnerability to replay attacks
8
Signature Dynamics Is a form of authentication based on an individual’s signature The final image or signature isn't what is recorded but the process leading up to it Instead things like pressure differences, pen up and down, spatial coordinate x and y, azimuth, inclination, and writing speed are measured at various points in the signature Normally forgers have a challenge recreating all of these factors which helps strengthen this type of authentication more secure
9
Keystroke Dynamics This is very similar to the signature dynamic but extends to the keyboard instead It doesn’t just recognize the password typed in but also measures intervals between characters and the overall speeds and patterns This type of authentication is known more as behavioral biometrics because it measures patterns which are more statistical information rather than features Tends not to be as reliable
10
Eye Scanners The eye can be scanned in two different ways Retina scans or iris scans can be used in either one of the scans The retinal scanner patterns a persons blood vessels No two people share the same blood vessel pattern Iris scanners use video cameras to digitally scan your iris An individual’s eye is complex and has a random patterns that are unique, stable, and can be seen from a distance Very expensive form of authentication Can make users very uneasy A slow form of authentication for large populations
11
Fingerprint Recognition Scans a person's finger print because everyone’s print is unique Also finger prints are accessible and the devices used take up very little space Finger print scanners measure the arches, loops and whorls The arches are the ridges that enter from one side of the finger and rise to the center forming an arc Loops are ridges that enter from one side of the finger and forms a curve and then exits on the same side Whorl are ridges that form circularly around a central point on the finger
12
Hand or Palm Geometry Measures the length and angles of individual fingers Also scans the palm which consists of primary lines, secondary lines, and epidermal ridges, texture, indents, and marks Also scanners look for palm vein patterns which is the preferred technology for high security applications However hand geometry isn't very reliable but when combined with other systems it can become very reliable
13
Speaker Recognition Speaker recognition is the characterization of the speaker based on their voice Verification or authentication occurs when you use your voice to identify yourself and this occurs when ones voice is matched with a template Systems normally employ two phrases for verification When the speaker is recorded normally a number of things are extracted from the voice print The systems fall into two categories text dependent and text independent Text dependent is when the text must be the same for enrollment and verification where the prompt is common across all speakers Text independent is when the speaker uses completely different text during enrollment and verification
14
Facial Recognition Uses distinct facial features to create authorization These features include upper outlines of the eye socket, areas around the cheek bones, the sides of the mouth and the location of the nose and eyes Most systems don’t include hairlines because hair styles change Takes an image and stores it in the database then compares your face to the already stored image Traditional systems use algorithms to identify facial features by landmarks and compare relative size or shape of eyes, nose, cheekbones, and jaw However three-dimensional recognition improves accuracy by using three-dimensional sensors to recognize distinct facial features that wouldn’t have been picked up on by traditional systems
15
Conclusion Biometric User Authentication Biometric Factors User Authentication Factors Biometric Techniques
16
References
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.