Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Performance Testing “ Guide to Biometrics” - chapter 7 “ An Introduction to Evaluating Biometric Systems” by Phillips et al., IEEE Computer, February 2000,
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Multimodal Biometric Security 1.
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi

Contents: Biometric Attributes Properties of Applications Evaluating Biometric Options Cost and Affordability of Biometric Pros and Cons of Various Biometrics Myths and Misrepresentations

Factors Associated with choosing a Biometric

Comparison of the Various Attributes

Application Requisites What is the protected asset; Who are the authorized users and operators; Who are the adversaries of the application; What can be the costs of security violations; What is the actual cost of the security; and What is the added cost of inconvenience?

Categories of Applications Cooperative and Non-cooperative Overt and Covert Habituated and Non-habituated Attended and Non-attended Standard Environment Public and Private Open and Closed

Importance Weightings

Drawbacks of various Biometrics

Mismatch Calculation

Zephyr Charts

Characteristics Weighting Effortless Iris > Face > Finger > voice Non-intrusive Iris > Voice > Face > Finger Accurate Iris > Finger > Face ~ Voice Inexpensive Voice > Finger > Face > Iris

Affordability and Cost Total Cost of ownership Verification versus Identification Single and Multiple Authentication protocols Training -> System Training -> System Training -> Enrollment -> Enrollment Continued Enrollment Failure to Enroll User Education Supervisory Labor Maintenance Labor

Positives and Negatives of the Biometrics

Fingerprint - Pros Long Tradition of usage of fingerprint as immutable identification in law enforcement Existing of large databases of fingerprints comprising largely of criminals Forensic investigation uses fingerprint Sampling of the fingerprint is easy Conversion of fingerprints into digital images is getting easier, better and cheaper Various state departments of motor vehicles are working to establish a fingerprint biometric system for driver’s license and record data

Fingerprint-Cons Finger print suffer from poor public reputation Social stigma such that it is related to illiterate Variation occurs due to age, cut or due to working conditions Sampling variations due to improper usage of the apparatus Rare situations like people without fingers.

Face - Pros Photos are widely used and usage is public accepted Face recognition systems are least intrusive. In theory this biometric works with image sources In theory can be applied to identify criminals in crowd It is good biometric for small scale verification purpose

Face - Cons Face authentication requires images taken in a good controlled lighted environment Presently it is a poor biometric for usage in pure identification protocol Disguise - a major obstacle Usage may hamper due to social stigma

Voice - Pros Like face voice is natural biometric Voice sampling can also be obtained unobtrusively Great public acceptance of this biometric Voice uses inexpensive hardware and can be established on current communications systems Voice allows incremental protocols Voice may achieve high accuracy and flexibility when combined with knowledge verification Voice allows continuous identity checking

Voice - Cons Imitation by possible in voice Possibility of creating nonexistent identities with text-to- speech technology Depends on high quality capturing of audio signal Possibility in rare cases where voice is lost

Iris - pros Widely believed to be the most accurate biometric Sample acquisition is unobtrusive – no physical contact Received only little negative press Present claim is that iris does not involve high training costs

Iris - Cons There are no or few legacy iris databases Sampling the iris patterns requires much user cooperation or complex, expensive input devices Iris authentication is hampered by vision aid This biometric is not left as an evidence in the scene of crime, so not used for forensic applications Cases like missing eye Cases like missing eye

Hand - Pros Certain amount of public acceptance Termed as “do-it-yourself” operation Existing of at least one scenario evaluation of hand geometry Can be used in place in stronger biometric where stronger might induce public fear

Hand - Cons Physical contact induces public hygiene Not very distinctive Existence of only one scenario application rises doubts about Hand as Biometric Mutation

Signature - Pros Man-made biometric- extensive study in forgery Used to identify impersonation even at enrollment stage Training is fast Has fast response and low storage requirements Independent of the native language of speaker Combination of information and biometric Unaffected by high compression rates

Signature - Cons Excessive usage of signature rises perception that it is not secure enough for protection Scaling properties and identifier standards are hard to set A five-dimensional pen is needed to get desired accuracy which makes hardware costly Medical conditions prevent people from writing consistently

Myths and Misrepresentations Biometric “X” is best for all applications Biometric “X” is unique for each individual A single number quantifies system accuracy System is “ plug and play “ Real accuracy performance can be predicted The vendors reporting best FAR and FRR has the “most accurate system” Multiple biometrics outperform single biometrics “Our biometric system does not use a decision threshold”

“Our feature extractor can be used with any match engine” Large templates mean better accuracy Face recognition prevents terrorism Biometrics means 100 percent security Biometric systems invade our privacy Biometric sensors are unhygienic or otherwise harmful

Thank you