Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Biometrics.
Biometrics Pearl Brewer, Ph.D. HOA 725. Definition of Biometrics Automated identification based on physiological or behavioral characteristics  Examples.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Modern Bio Metric Authentication BY : ADAM FLOOR 1.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Overview

Biometrics Identification or verification of an individual based on a physical characteristic or trait.

Biometric Modes Biological Characteristics  Fingerprint  Facial Recognition  Hand Geometry  Eye (Iris & Retina)  Vein Pattern Behavioral Traits  Signature  Voice  Keystroke Dynamics

Why use Biometrics? Biometrics has No Risk of:  Forgetting it  Losing it  Getting it stolen  Getting it copied  Loaning it out  Being used by anyone else

Biometric Uses  Financial Institutes ATM, Validation of credit and debit cards  Law Enforcement Automated Fingerprint Identification System Surveillance  Physical Access Control Buildings, Airports, Hospitals, Schools  IT Security Network-systems of organizations – Internet/Intranet  E-Commerce market : User Authentication  Consumer Market PC Applications(Mouse, Keyboard, Laptop, etc.) Time and Attendance Monitoring Home Appliances (Door locks, Safes, etc.)

Biometric Marketplace (Per International Biometric Group’s Biometric Market Report )

Market Drivers  Real need for increased security  Traditional methods obsolete  Increased identity theft and fraud  Advances in biometric technology  Reliability and functionality  Price factors  Weak capital markets  Competitive environment  Consolidation  Industry standardization  Current Events/Emotion

Fingerprint  Measures ridges and minutiae (end, fusion, bifurcation of fingerprint data)  Used for over 100 years  Highly accurate  Small devices  Latent prints  Environmental conditions

Facial Recognition  Measures the contours and distances of the Eyes, Nose and Chin.  May also use Thermograph matching  Easy to use/Non-cooperative  Influenced by lighting and facial angles  Susceptible to spoofing with glasses, wigs, beards

Hand Geometry  Measures finger length and knuckle thickness  Intuitive Operation  Uses few minutiae points  Large Devices limit the installation possibilities.

Eye Recognition  Iris:  Measures the shape & color of the Iris  Minutiae rich  Inconvenient  Expensive  Retina:  Blood Vessel Pattern  Highly Accurate  Low public acceptance (Intrusive)

Vein Recognition  Uses an infrared camera to measure the veins on the wrist and back of the hand.  Currently impossible to copy  Large Equipment  Expensive  Uses few minutiae points

Signature Recognition  Measures the pressure and speed of stroke dynamics  Inexpensive  Intuitive Operation  Signatures may change over time  Participation must be voluntary  Low Accuracy

Voice Recognition  Measures the vibration of phoneme, syllable, words  Easy to use  Remote applications  Easy to impersonate  Influenced by health conditions  Sensitive to noise

Mode Comparison

(Does Not Include AFIS Revenues) (Per International Biometric Group’s Biometric Market Report ) 2001 Market Shares

Biometric System  Enrollment  Identity Verification  Template Management  Distributed  Centralized  Live Scan Processing  Identity Authentication  Transaction Processing  Apply Policy

Biometric Verification Identity Claim Biometric Capture Feature Extraction 1-to-1 Comparison

Biometric Identification Biometric Capture Feature Extraction 1-to-n Comparison

Matching  Evaluation  Reject / Accept Threshold  Error Ratio  FRR (False Rejection Ratio)  FAR (False Acceptance Ratio)  ERR (Equal Error Ratio)

Implementation  Interoperability  BioAPI  ANSI Fast track  CBEFF  Common Biometric Exchange File Format  Used in BioAPI  Multimode integration

Template Management  Centralized  Template security  Administration  Communications Infrastructure  Distributed  Smartcards  2-D Barcodes  Memory buttons  Counterfeiting

Enterprise Management CBEFF DB Trusted Applications Authentication Servers Distributed

Modular Applications INTERNETINTRANETBizAppsOthers WBE Component Biometric API FPBSPFacialBSPIrisBSPVoiceBSPHandBSPOtherBSP AUTHServerOTTServerDBServerFPMatchingFacialMatchingIrisMatching VoiceMatchingHandMatchingLicenseServerTemplateMgmtPWDMatchingOthers BiometricMatchingServersBiometricMatchingServers Configuration Management ClientSide ServerSide

Fingerprint in Access Control  Lowest implementation cost  Widest availability  Matching technology  Correlation  Minutiae matching  Scanner technology  Optical  Solid-state/Capacitive  Ultrasonic

Access Control Applications System Controller DIU LSU Template Database

Integration Interfaces  Legacy Systems  Weigand  Only “industry standard”  Clock and Data  Proprietary  Vendor products  RS485  TCP/IP

Hydra Implementation

Graterford Prison  Barcode badge provides Guard PIN.  Hydra performs fingerprint verification.  Photo of verified guard displayed on touchscreen.  Operator must visually confirm by touching photo on screen.

BioACE Architecture Athena NCU WAN NCU Modems MicroNCU POT S ARGO IBASDesktop

DISCUSSION