By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
BIOMETRICS.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Physical Security Secure the room Secure the machine – 6 ways.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
Authentication.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

By Kyle Bickel

Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion

Biometric Authentication Is referred to as the realistic authentication Characteristics used are distinct, and measurable to identify one individual Multimodal biometrics is the use of more than one type of biometric scanner to enhance the system Functionality of a system is based on factors used such as universality, uniqueness, permanence, measurability, performance, acceptability, circumvention No biometric scanner will meet all the requirements or functions of application

Biometric Functionalities Universality states that everyone should possess the trait being measured Uniqueness means that the trait should be different for each individual in the referenced population Permanence is used to describe the manner that the trait varies over time so good traits will reasonably stay the same over time Measurability means how easily the data of the traits can be collected Performance is the accuracy, speed, and overall performance of the technology that is being used Acceptability is how willing the population being used is willing to accept the technology and will allow their traits to be captured Circumvention is the ease at which a trait might be limited using an artifact or substitute

Knowledge Factor Is the first type or class of authentication factors Is something that the user knows Examples of this would be a password or phrase, or pin number Is the most common form of user authentication In most multi-factor authentication techniques a password is almost always one of those factors

Possession Factor Is the second factor or class of user authentication It is usually something the user owns Examples of this would be an ID card, security token, hardware tokens, software tokens, lock and key One of the oldest forms of authentication Biggest problem is that your possession can be stolen giving someone else access

Inherence Factor Third class of user authentication Usually refers to something the user has or does Examples of this would be fingerprint, retinal pattern, DNA sequence, signature, face, and voice recognition This is where Biometrics falls under Expensive alternative to user authentication Vulnerability to replay attacks

Signature Dynamics Is a form of authentication based on an individual’s signature The final image or signature isn't what is recorded but the process leading up to it Instead things like pressure differences, pen up and down, spatial coordinate x and y, azimuth, inclination, and writing speed are measured at various points in the signature Normally forgers have a challenge recreating all of these factors which helps strengthen this type of authentication more secure

Keystroke Dynamics This is very similar to the signature dynamic but extends to the keyboard instead It doesn’t just recognize the password typed in but also measures intervals between characters and the overall speeds and patterns This type of authentication is known more as behavioral biometrics because it measures patterns which are more statistical information rather than features Tends not to be as reliable

Eye Scanners The eye can be scanned in two different ways Retina scans or iris scans can be used in either one of the scans The retinal scanner patterns a persons blood vessels No two people share the same blood vessel pattern Iris scanners use video cameras to digitally scan your iris An individual’s eye is complex and has a random patterns that are unique, stable, and can be seen from a distance Very expensive form of authentication Can make users very uneasy A slow form of authentication for large populations

Fingerprint Recognition Scans a person's finger print because everyone’s print is unique Also finger prints are accessible and the devices used take up very little space Finger print scanners measure the arches, loops and whorls The arches are the ridges that enter from one side of the finger and rise to the center forming an arc Loops are ridges that enter from one side of the finger and forms a curve and then exits on the same side Whorl are ridges that form circularly around a central point on the finger

Hand or Palm Geometry Measures the length and angles of individual fingers Also scans the palm which consists of primary lines, secondary lines, and epidermal ridges, texture, indents, and marks Also scanners look for palm vein patterns which is the preferred technology for high security applications However hand geometry isn't very reliable but when combined with other systems it can become very reliable

Speaker Recognition Speaker recognition is the characterization of the speaker based on their voice Verification or authentication occurs when you use your voice to identify yourself and this occurs when ones voice is matched with a template Systems normally employ two phrases for verification When the speaker is recorded normally a number of things are extracted from the voice print The systems fall into two categories text dependent and text independent Text dependent is when the text must be the same for enrollment and verification where the prompt is common across all speakers Text independent is when the speaker uses completely different text during enrollment and verification

Facial Recognition Uses distinct facial features to create authorization These features include upper outlines of the eye socket, areas around the cheek bones, the sides of the mouth and the location of the nose and eyes Most systems don’t include hairlines because hair styles change Takes an image and stores it in the database then compares your face to the already stored image Traditional systems use algorithms to identify facial features by landmarks and compare relative size or shape of eyes, nose, cheekbones, and jaw However three-dimensional recognition improves accuracy by using three-dimensional sensors to recognize distinct facial features that wouldn’t have been picked up on by traditional systems

Conclusion Biometric User Authentication Biometric Factors User Authentication Factors Biometric Techniques

References