Presentation is loading. Please wait.

Presentation is loading. Please wait.

BIOMETRICS.

Similar presentations


Presentation on theme: "BIOMETRICS."— Presentation transcript:

1 BIOMETRICS

2 What is Biometrics? Something that you know- password, PIN, or personal information such as your mother's maiden name) Something that you have- a card key, smart card, Something that you are- a biometric. Bio= “life”, metro=“measure” (ancient Greek)

3 Why Biometrics? Biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten. Control for businesses Passwords are not user-friendly Inexpensive implementation Less administration (paperwork, cards, etc.) Saves money (no need for producing keys, etc.)

4 Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological characteristic or behavioral characteristic.

5 Uses of Biometrics Simple: Advanced:
Verification – Is this who he claims to be? Identification – who is this? Advanced: Detecting multiple identities Patrolling public spaces

6 Identification Methods
Enrollment Biometric data is collected for a known identity Reference template is created and stored Authentication Identification: comparison of biometric data to all available data files in a database Verification: comparison of biometric data to previously stored version

7 Biometrics

8 Fingerprint Recognition
Identification by using patterns of an individual's fingertips that are unique to that individual. By far the most widely accepted biometric.

9 Fingerprint Recognition
Strengths: Fingerprints don’t change over time Widely believed fingerprints are unique Weaknesses: Scars Attacks: Surgery to alter or remove prints “Gummy fingers” Corruption of the database

10 Fingerprint Recognition

11 Face Recognition The identification of a person by their facial image characteristics

12 Face Recognition Strengths: Weaknesses: Attacks:
Database can be built from driver’s license records, visas, etc. Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera

13 Facial Recognition Process
1) Digitally scan an existing photograph 2) Acquire a live picture of a subject 3) software is used to locate the faces in the image that has been obtained 4) software measures face according to is peaks and valleys (nodal points) 5) the face print created by the software is compared to all face prints the system has stored in its database.

14 6) software decides whether or not any comparisons from step 4 are close enough to declare a possible match

15 Voice Recognition: Identification using the features of speech that have been found to differ between individuals

16 Voice Recognition Strengths: Weaknesses: Attacks:
Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise (airplanes) No large database of voice samples Attacks: Tape recordings Identical twins / sound alike

17 Iris Recognition This identification method uses the unique characteristics of the eye.

18 Iris Recognition Strengths: Weaknesses: Attacks: 300+ characteristics;
200 required for match Weaknesses: Fear Discomfort Proprietary acquisition device Algorithms may not work on all individuals No large databases Attacks: Surgery

19 Hand Scan Typical systems measure 90 different features:
Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification

20 Behavior Biometrics: Handwriting (static & dynamic) Keystroke dynamics

21 Keystroke Recognition
Uses rhythm and manner in which characters are typed into a keyboard Typing characteristics are unique to individuals Indicators Speed in words per minute Delays Specific sequences of characters Typing errors Seek time and hold time

22 Biometrics are used by:
Government Military Schools Commerce Law Enforcement

23 Examples of Biometrics Usage
Governments worldwide use biometrics for passports and airport security. Police agencies use fingerprints and DNA for identification and forensics. Financial institutions use palm/finger vein authentication to secure ATMs. Companies use biometrics to keep time records, secure locations and improve user convenience.

24 Business Applications
Biometric Door entry Secured Safes Computer/Network Logon Employee Time cards U.S. Visit Program Schools

25 Sample of Applications
Voter Registration / Management Driver Licensing Border Control Passport / VISA Welfare / Government Insurance (WIC) Criminal ID / Wanted Persons Lookup Jail Management Airports / Frequent Traveler / Passenger Tracking Check Cashing e-Commerce & Financial Services Identity Theft

26 Things That Make Biometrics Work
Uniqueness - The same trait will not appear in two people Universality - The trait has to occur in many people as possible Permanence - The trait does not change over time Measurability - The trait can be measured with simple technical instruments User friendliness - The trait is easily measured with minimal discomfort

27 Problems With Biometrics
Simple Hygiene of users may create problems with authentication If the person has arthritis, long fingernails, is wearing hand cream or has circulation problems then this will not produce a good reading Around half the population wears glasses or contact lenses

28 Future of Biometrics Active Advertisement
DNA matching the "ultimate" biometric technology which would produce proof-positive identification of an individual. Active Advertisement Advertisements based on who you are National Biometric Database National Database of citizens used for multiple purposes Automobile Security = No more keys, just you

29 Future of Biometrics

30 Future…

31


Download ppt "BIOMETRICS."

Similar presentations


Ads by Google