Download presentation
Presentation is loading. Please wait.
Published byLinda Lambert Modified over 9 years ago
1
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2, JUNE 2006 Presenter: Eugene Phan
2
Biometrics: A Tool for Information Security2 Summary The need for reliable user authentication and identification has risen from concerns in content ownership, information security, border control. The need for reliable user authentication and identification has risen from concerns in content ownership, information security, border control. Instead of authenticating the possession of an identity item (license key, password), verify the person himself (biometrics): claimed identity (duplication), known identity (in database), a wanted person? Instead of authenticating the possession of an identity item (license key, password), verify the person himself (biometrics): claimed identity (duplication), known identity (in database), a wanted person?
3
Biometrics: A Tool for Information Security3 Comments (Positive) I Goes to some lengths in explaining Biometrics: Goes to some lengths in explaining Biometrics: o Types & properties of biometric feature (face, voice, iris, fingerprint, etc) o Limitations of acquisition (presentation is inconsistent and irreproducible, quality is not always guaranteed) o Imperfect matching (unlike password) resulting in false positive and false negative
4
Biometrics: A Tool for Information Security4 Comments (Positive) II Goes to some lengths in explaining Biometrics (cont): Goes to some lengths in explaining Biometrics (cont): o Describes the function of biometric system (authentication, ‘wanted list’) and how it works o Vulnerability to attacks (Zero-Effort where 2 individuals have very similar biometric features, Adversary where spoofing, circumvention, etc are attempted) Suggests watermarking and steganography coupled with encryption to protect biometric templates.
5
Biometrics: A Tool for Information Security5 Comments (Negative) Presents the idea of Biometric Crypto- System - use of biometric as part of the key generation & storage. Presents the idea of Biometric Crypto- System - use of biometric as part of the key generation & storage. Current implementation is to unlock the key. Current implementation is to unlock the key. Introduces “fuzzy vault” technique but not clearly explained. Introduces “fuzzy vault” technique but not clearly explained. Novel concept but explanation of implementation is not clear. Novel concept but explanation of implementation is not clear.
6
Biometrics: A Tool for Information Security6 Question With the current performance in enrollment and verification, would you be comfortable (trust) having biometric system protect your bank account - miss identification as a bad person or overnight billionaire? With the current performance in enrollment and verification, would you be comfortable (trust) having biometric system protect your bank account - miss identification as a bad person or overnight billionaire?
7
Biometrics: A Tool for Information Security7 Thank You Very Much! Questions? Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.