Download presentation
Presentation is loading. Please wait.
1
Biometrics 6.857 6.857, Computer & Network Security 1
Basics Warnings Fingerprint Example 1 6.857
2
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. 2 6.857
3
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. voice facial patterns irises typing patterns gait photo 3 6.857
4
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 4 6.857
5
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 5 6.857
6
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 6 6.857
7
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 7 6.857
8
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 8 6.857
9
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 9 6.857
10
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 10 6.857
11
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 11 6.857
12
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 12 6.857
13
Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 13 6.857
14
Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 14 6.857
15
Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 15 6.857
16
lossy image compression
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 16 6.857
17
lossy image compression
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo … 17 6.857
18
Biometrics But databases make it interesting… Connecticut DMV
6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 18 6.857
19
Biometrics But databases make it interesting… Connecticut DMV
6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 19 6.857
20
Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice facial patterns irises typing patterns gait photo 20 6.857
21
Biometrics ? = But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 21 6.857
22
Biometrics ? = But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 22 6.857
23
Biometrics 6.857 6.857, Computer & Network Security 23
Basics Warnings Fingerprint Example 23 6.857
24
Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! 24 6.857
25
Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! You brazenly trot your face, eyes, hands, fingerprints, gait, and signature out in public on a daily basis. (unless you are a hermit) 25 6.857
26
Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password 26 6.857
27
Biometrics Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access 27 6.857
28
Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone 28 6.857
29
Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone Problem with Connecticut DMV 29 6.857
30
Biometrics Biometrics are UIDs 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs 30 6.857
31
Very useful with trusted path from subject to verifier…
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… 31 6.857
32
Biometrics Biometrics are UIDs
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… 32 6.857
33
Biometrics Biometrics are UIDs
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… no longer very automated. Oh well. 33 6.857
34
Case Study: Fingerprint Authentication
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Case Study: Fingerprint Authentication 34 6.857
35
Biometrics 6.857 6.857, Computer & Network Security 35
Basics Warnings Fingerprint Example 35 6.857
36
Biometrics capture 6.857 6.857, Computer & Network Security 36
Basics Warnings Fingerprint Example capture 36 6.857
37
Biometrics capture optical 6.857 6.857, Computer & Network Security 37
Basics Warnings Fingerprint Example capture optical 37 6.857
38
Biometrics capture capacitive 6.857 6.857, Computer & Network Security
Basics Warnings Fingerprint Example capture capacitive 38 6.857
39
Biometrics capture ultrasonic 6.857 6.857, Computer & Network Security
Basics Warnings Fingerprint Example capture ultrasonic 39 6.857
40
Biometrics capture “Live and Well” Sanity Check 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture “Live and Well” Sanity Check 40 6.857
41
Biometrics capture feature extraction 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction 41 6.857
42
Biometrics capture feature extraction Pattern matching
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction Pattern matching * Keep (oriented) image 42 6.857
43
Biometrics capture feature extraction or Minutia vectors 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors 43 6.857
44
Biometrics capture feature extraction or Minutia vectors bifurcation
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors bifurcation ridge ending short ridge 44 6.857
45
Biometrics capture feature extraction compare or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or 45 6.857
46
Biometrics capture feature extraction compare or Pattern matching
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or Pattern matching 46 6.857
47
Biometrics capture feature extraction compare or Vector comparison
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … (type, x, y, θ, W) … or Vector comparison * e.g., 7-20 out of are close. 47 6.857
48
Biometrics capture feature extraction compare result or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … result or 48 6.857
49
Biometrics Enrollment capture feature extraction or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example Enrollment capture feature extraction (type, x, y, θ, W) … or 49 6.857
50
Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 50 6.857
51
Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 51 6.857
52
Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. 52 6.857
53
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Slides from Matsumoto talk showing the construction of a ‘gummy finger’… 53 6.857
54
Biometrics Conclusion 6.857 6.857, Computer & Network Security 54
Basics Warnings Fingerprint Example Conclusion 54 6.857
55
Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. 55 6.857
56
Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. 56 6.857
57
Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. Easy to stick your finger on a scanner and have it extract 20 digits worth of information…but hard to analyze its security. 57 6.857
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.