Download presentation
Presentation is loading. Please wait.
1
BIOMETRICS
2
What is Biometrics? Something that you know- password, PIN, or personal information such as your mother's maiden name) Something that you have- a card key, smart card, Something that you are- a biometric. Bio= “life”, metro=“measure” (ancient Greek)
3
Why Biometrics? Biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten. Control for businesses Passwords are not user-friendly Inexpensive implementation Less administration (paperwork, cards, etc.) Saves money (no need for producing keys, etc.)
4
Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological characteristic or behavioral characteristic.
5
Uses of Biometrics Simple: Advanced:
Verification – Is this who he claims to be? Identification – who is this? Advanced: Detecting multiple identities Patrolling public spaces
6
Identification Methods
Enrollment Biometric data is collected for a known identity Reference template is created and stored Authentication Identification: comparison of biometric data to all available data files in a database Verification: comparison of biometric data to previously stored version
7
Biometrics
8
Fingerprint Recognition
Identification by using patterns of an individual's fingertips that are unique to that individual. By far the most widely accepted biometric.
9
Fingerprint Recognition
Strengths: Fingerprints don’t change over time Widely believed fingerprints are unique Weaknesses: Scars Attacks: Surgery to alter or remove prints “Gummy fingers” Corruption of the database
10
Fingerprint Recognition
11
Face Recognition The identification of a person by their facial image characteristics
12
Face Recognition Strengths: Weaknesses: Attacks:
Database can be built from driver’s license records, visas, etc. Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera
13
Facial Recognition Process
1) Digitally scan an existing photograph 2) Acquire a live picture of a subject 3) software is used to locate the faces in the image that has been obtained 4) software measures face according to is peaks and valleys (nodal points) 5) the face print created by the software is compared to all face prints the system has stored in its database.
14
6) software decides whether or not any comparisons from step 4 are close enough to declare a possible match
15
Voice Recognition: Identification using the features of speech that have been found to differ between individuals
16
Voice Recognition Strengths: Weaknesses: Attacks:
Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise (airplanes) No large database of voice samples Attacks: Tape recordings Identical twins / sound alike
17
Iris Recognition This identification method uses the unique characteristics of the eye.
18
Iris Recognition Strengths: Weaknesses: Attacks: 300+ characteristics;
200 required for match Weaknesses: Fear Discomfort Proprietary acquisition device Algorithms may not work on all individuals No large databases Attacks: Surgery
19
Hand Scan Typical systems measure 90 different features:
Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification
20
Behavior Biometrics: Handwriting (static & dynamic) Keystroke dynamics
21
Keystroke Recognition
Uses rhythm and manner in which characters are typed into a keyboard Typing characteristics are unique to individuals Indicators Speed in words per minute Delays Specific sequences of characters Typing errors Seek time and hold time
22
Biometrics are used by:
Government Military Schools Commerce Law Enforcement
23
Examples of Biometrics Usage
Governments worldwide use biometrics for passports and airport security. Police agencies use fingerprints and DNA for identification and forensics. Financial institutions use palm/finger vein authentication to secure ATMs. Companies use biometrics to keep time records, secure locations and improve user convenience.
24
Business Applications
Biometric Door entry Secured Safes Computer/Network Logon Employee Time cards U.S. Visit Program Schools
25
Sample of Applications
Voter Registration / Management Driver Licensing Border Control Passport / VISA Welfare / Government Insurance (WIC) Criminal ID / Wanted Persons Lookup Jail Management Airports / Frequent Traveler / Passenger Tracking Check Cashing e-Commerce & Financial Services Identity Theft
26
Things That Make Biometrics Work
Uniqueness - The same trait will not appear in two people Universality - The trait has to occur in many people as possible Permanence - The trait does not change over time Measurability - The trait can be measured with simple technical instruments User friendliness - The trait is easily measured with minimal discomfort
27
Problems With Biometrics
Simple Hygiene of users may create problems with authentication If the person has arthritis, long fingernails, is wearing hand cream or has circulation problems then this will not produce a good reading Around half the population wears glasses or contact lenses
28
Future of Biometrics Active Advertisement
DNA matching the "ultimate" biometric technology which would produce proof-positive identification of an individual. Active Advertisement Advertisements based on who you are National Biometric Database National Database of citizens used for multiple purposes Automobile Security = No more keys, just you
29
Future of Biometrics
30
Future…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.