Biometrics , Computer & Network Security 1

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Biometrics.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Part 2  Access Control 1.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
A Seminar on Fingerprint Recognition in Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics 6.857 6.857, Computer & Network Security 1 Basics Warnings Fingerprint Example 1 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. 2 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. voice facial patterns irises typing patterns gait photo 3 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 4 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 5 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 6 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 7 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 8 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 9 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 10 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 11 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 12 6.857

Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 13 6.857

Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 14 6.857

Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 15 6.857

lossy image compression Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 16 6.857

lossy image compression Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 100101010110010001010101… 17 6.857

Biometrics But databases make it interesting… Connecticut DMV 6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 18 6.857

Biometrics But databases make it interesting… Connecticut DMV 6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 19 6.857

Biometrics But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice facial patterns irises typing patterns gait photo 20 6.857

Biometrics ? = But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 21 6.857

Biometrics ? = But databases make it interesting… hand measurements 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 22 6.857

Biometrics 6.857 6.857, Computer & Network Security 23 Basics Warnings Fingerprint Example 23 6.857

Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! 24 6.857

Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! You brazenly trot your face, eyes, hands, fingerprints, gait, and signature out in public on a daily basis. (unless you are a hermit) 25 6.857

Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password 26 6.857

Biometrics Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access 27 6.857

Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone 28 6.857

Biometrics are not secret keys! 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone Problem with Connecticut DMV 29 6.857

Biometrics Biometrics are UIDs 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs 30 6.857

Very useful with trusted path from subject to verifier… Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… 31 6.857

Biometrics Biometrics are UIDs 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… 32 6.857

Biometrics Biometrics are UIDs 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… no longer very automated. Oh well. 33 6.857

Case Study: Fingerprint Authentication Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Case Study: Fingerprint Authentication 34 6.857

Biometrics 6.857 6.857, Computer & Network Security 35 Basics Warnings Fingerprint Example 35 6.857

Biometrics capture 6.857 6.857, Computer & Network Security 36 Basics Warnings Fingerprint Example capture 36 6.857

Biometrics capture optical 6.857 6.857, Computer & Network Security 37 Basics Warnings Fingerprint Example capture optical 37 6.857

Biometrics capture capacitive 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture capacitive 38 6.857

Biometrics capture ultrasonic 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture ultrasonic 39 6.857

Biometrics capture “Live and Well” Sanity Check 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture “Live and Well” Sanity Check 40 6.857

Biometrics capture feature extraction 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction 41 6.857

Biometrics capture feature extraction Pattern matching 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction Pattern matching * Keep (oriented) image 42 6.857

Biometrics capture feature extraction or Minutia vectors 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors 43 6.857

Biometrics capture feature extraction or Minutia vectors bifurcation 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) … or Minutia vectors bifurcation ridge ending short ridge 44 6.857

Biometrics capture feature extraction compare or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or 45 6.857

Biometrics capture feature extraction compare or Pattern matching 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … or Pattern matching 46 6.857

Biometrics capture feature extraction compare or Vector comparison 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … (type, x, y, θ, W) … or Vector comparison * e.g., 7-20 out of 10-100 are close. 47 6.857

Biometrics capture feature extraction compare result or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) … result or 48 6.857

Biometrics Enrollment capture feature extraction or 6.857 6.857, Computer & Network Security Basics Warnings Fingerprint Example Enrollment capture feature extraction (type, x, y, θ, W) … or 49 6.857

Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 50 6.857

Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 51 6.857

Risk Analysis (from Matsumoto Paper) Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. 52 6.857

Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Slides from Matsumoto talk showing the construction of a ‘gummy finger’… 53 6.857

Biometrics Conclusion 6.857 6.857, Computer & Network Security 54 Basics Warnings Fingerprint Example Conclusion 54 6.857

Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. 55 6.857

Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. 56 6.857

Biometrics Conclusion 6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. Easy to stick your finger on a scanner and have it extract 20 digits worth of information…but hard to analyze its security. 57 6.857