Presentation is loading. Please wait.

Presentation is loading. Please wait.

Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.

Similar presentations


Presentation on theme: "Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct."— Presentation transcript:

1 Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct. 2002 Proceedings: LNCS 2437, pp. 1-18, Springer 2002 Available: http://link.springer.de/link/service/series/0558/papers/2437/24370001.pdf Presentation by: Anupam Dewan

2 Overview Discusses different Biometric Technologies which are practically possible, their usage and various types of attacks on them. Considers different cultural issues like religious objections, health concerns and legal aspects of biometrics.

3 Biometrics Defined “The automatic identification or identity verification of living, human individuals based on behavioral and physiological characteristics.” by Dr. Jim Wayman - Behavioral – measure habituated actions. e.g. voice, signature - Physiological – measure more static physical properties. e.g. fingerprints, patterns on iris and retina

4 Biometrics Technique: Iris Scan Uses unique patterns iris tissue (trabecular meshwork) Patterns are reduced to minutia points Each Iris contains 173 independent points. Iris Scan is probably the most accurate method for distinguishing between individuals. Genetic Independence - No basis in heredity (DNA) Two irises matching 75% - 1 in 10 16 100% - 1 in 10 52

5 Iris Scan: (cont.) Possible Attacks False Iris imprinted on a contact lens Extracting the iris of the enrolled person.

6 Appreciation The article gives the good overview of the various Biometric Authentication techniques. Author mentions the various ways by which data can be made more secured BioSwatch Prototype (developed by HP Labs) SmartCard

7 Criticism: Inappropriate title: “Biometric Authentication in Infrastructure Security” Biometric devices Biometric devices Biometric enrollment Biometric enrollment Template storage Template storage Biometric devices Biometric devices Biometric verification Biometric verification Business Application Business Application Enrollment Process Verification Process ??? Source: Podio, F.L.; Personal Authentication Through Biometric Networked Appliances, 2002. Proceedings. 2002 IEEE 4th International Workshop on, 2001 Page(s): 57 -66 Template storage Template storage Infrastructure Security:- it is a way of organizing physical infrastructure, applications, administration and procedures to support information security, where infrastructure stands for ‘the underlying system’.

8 Conclusion Some biometrics are hard to forge, but most of them are easy to steal. Although biometrics are unique identifiers, they are not secrets. e.g. We leave our fingerprint everywhere we touch

9 Question??? Biometrics are not secrets and are easy to steal. So, Is there a way such that we can make the Biometric process (Enrollment + Verification) more secure?


Download ppt "Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct."

Similar presentations


Ads by Google