Download presentation
Presentation is loading. Please wait.
1
Biometrics and Authentication Shivani Kirubanandan
2
Lets Define ! A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”
3
Biometrics as Authentication Authentication depends on What you haveWhat you have What you knowWhat you know What you ARE !What you ARE ! Authentication depends on What you haveWhat you have What you knowWhat you know What you ARE !What you ARE !
4
Why Biometrics? Identity thefts Something you know can be stolen Predicted or hacked Reliability on manual verification Identity thefts Something you know can be stolen Predicted or hacked Reliability on manual verification
5
Application Categories Biometric applications available today are categorized into 2 sectors Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionPsychological: Iris, Fingerprints, Hand, Retinal and Face recognition Behavioral: Voice, Typing pattern, SignatureBehavioral: Voice, Typing pattern, Signature Biometric applications available today are categorized into 2 sectors Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionPsychological: Iris, Fingerprints, Hand, Retinal and Face recognition Behavioral: Voice, Typing pattern, SignatureBehavioral: Voice, Typing pattern, Signature
6
Biometric Authentication Process Acquisition Creation of Master characteristics Storage of Master characteristics Acquisition(s) Comparison Decision Acquisition Creation of Master characteristics Storage of Master characteristics Acquisition(s) Comparison Decision
7
The metrics of Biometrics FTE – Failure To Enroll FTA – Failure To Accept FAR – False Acceptance Rates FRR – False Reject Rates FTE – Failure To Enroll FTA – Failure To Accept FAR – False Acceptance Rates FRR – False Reject Rates
8
Essential parameters Liveness testing Tamper resistance Secure communication Security Threshold level Fall back node Liveness testing Tamper resistance Secure communication Security Threshold level Fall back node
9
Fingerprint recognition Divides print into loops, whorls and arch Calculates minutiae points (ridge endings) Comparisons authentication Divides print into loops, whorls and arch Calculates minutiae points (ridge endings) Comparisons authentication
10
Fingerprint techniques Optical Capacitive Thermal Ultrasonic Optical Capacitive Thermal Ultrasonic
11
Disadvantages Racial issues Dirt, grime and wounds Placement of finger Too big a database to process Can be spoofed –liveness important! Racial issues Dirt, grime and wounds Placement of finger Too big a database to process Can be spoofed –liveness important!
12
Hand Geometry Geometry of users hands More reliable than fingerprinting Balance in performance and usability Geometry of users hands More reliable than fingerprinting Balance in performance and usability
13
Disadvantage Very large scanners
14
Retinal Scanning Scans retina into database User looks straight into retinal reader Scan using low intensity light Very efficient – cant be spoofed! Scans retina into database User looks straight into retinal reader Scan using low intensity light Very efficient – cant be spoofed!
15
Disadvantages User has to look “directly” FTE ratio high in this biometric Acceptability concerns –Light exposure –Hygiene User has to look “directly” FTE ratio high in this biometric Acceptability concerns –Light exposure –Hygiene
16
Iris Scanner Scans unique pattern of iris Iris is colored and visible from far No touch required Overcomes retinal scanner issues Contact lenses an issue? Scans unique pattern of iris Iris is colored and visible from far No touch required Overcomes retinal scanner issues Contact lenses an issue?
17
Face recognition User faces camera Neutral expression required Apt lighting and position Algorithms for processing Decision User faces camera Neutral expression required Apt lighting and position Algorithms for processing Decision
18
Issues with Face Recognition?
20
Issues Identification across expression FRR or FAR fluctuate Easily spoofed Tougher usability High Environmental impact Identification across expression FRR or FAR fluctuate Easily spoofed Tougher usability High Environmental impact
21
Behavioral Voice Signature Typing pattern Voice Signature Typing pattern
22
Voice Recognition Speech input –Frequency –Duration –Cadence Neutral tone User friendly Speech input –Frequency –Duration –Cadence Neutral tone User friendly
23
Disadvantages Local acoustics Background noise Device quality Illness, emotional behavior Time consuming enrollment Large processing template Local acoustics Background noise Device quality Illness, emotional behavior Time consuming enrollment Large processing template
24
Signature Recognition Signature measures (dynamic) –Speed –Velocity –Pressure Captures images (static) High user acceptance Signature measures (dynamic) –Speed –Velocity –Pressure Captures images (static) High user acceptance
25
Issues Signature variable with –Age, illness, emotions Requires high quality hardware High FRR as signatures are very dynamic Signature variable with –Age, illness, emotions Requires high quality hardware High FRR as signatures are very dynamic
26
Typing Patterns User typing pattern –Speed –Press and Release Rate Unique patterns are generated comparisons User typing pattern –Speed –Press and Release Rate Unique patterns are generated comparisons
27
Issues Not very scalable FRR is high Can be spoofed – by simple technology (recorders) Not very scalable FRR is high Can be spoofed – by simple technology (recorders)
28
Usability issues in Biometrics User acceptability Knowledge of technology Familiarity with biometric characteristic Experience with device User acceptability Knowledge of technology Familiarity with biometric characteristic Experience with device
29
Usability issues… Environment of use Transaction criticality Time consuming tasks Environment of use Transaction criticality Time consuming tasks
30
Biometric solutions Educate Train Explain Interfaces Use Trainers Supervised Playtime Educate Train Explain Interfaces Use Trainers Supervised Playtime
31
General issues FTE posses problem Biometric characteristics are not encrypted Trust on input device Cannot authenticate computers! Privacy attack?! FTE posses problem Biometric characteristics are not encrypted Trust on input device Cannot authenticate computers! Privacy attack?!
32
Current applications Banks Immigration facilities across USA IDwidget – interesting research Eyegaze at Stanford Banks Immigration facilities across USA IDwidget – interesting research Eyegaze at Stanford
33
Class task Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them? Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?
34
Class task… Case 2: Suggest certain areas in which biometrics would prove disastrous Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy Case 2: Suggest certain areas in which biometrics would prove disastrous Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy
35
Thank You!!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.