FIT3105 Biometric based authentication and identity management

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Fingerprint Biometrics By Tamar Bar.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

FIT3105 Biometric based authentication and identity management Lecture 5

FIT3105 - Security and Identity Management Biometric method Biometrics terminologies Biometrics properties The importance of biometrics in authentication and identity management Biometrics technologies Authentication and identity systems with biometrics Biometrics and smart cards. Biometrics issues Biometrics architecture FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Reading list http://digital.ni.com/worldwide/singapore.nsf/web/all/9C3774162BBC5E7F862571B6000CFA1F http://biometrics.cse.msu.edu/info.html (overview and related papers) http://www.springerlink.com/content/cmxub1padvlua881/ FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Definition 'A Biometric' is a measurable physical or behavioural characteristic of a human being - hence 'biometrics' are measures of people. A physiological characteristic: fingerprint, iris pattern, form of hand, etc. A behavioural characteristic: the way you sign, the way you speak, etc. Biometric methods are proposed for use in recognising identity, or authenticating claims of identity FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Biometrics in IT Biometrics in IT is the measurement and statistical analysis of biological data using computer and related technologies Using IT and related technologies to map human characteristics to digitised data for identification and authentication purposes. FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Biometrics in IT Biometric of each person has to be unique. We need to find the distinguishing things that make each person unique and possible way to store, process and retrieve the information efficiently and securely. Should the measurements of these distinguishing things for different people be the same or different? How will these things be measured, digitised and processed? FIT3105 - Security and Identity Management

Biometric questions on identity Is this the person who she/he claims to be? Has this person’s biometrics been in the system? How do we compare the new one and the existing ones? Should this individual be given access to our computer system? Is this person on a watch list of attackers? Should this person be allowed to enter your office, building, etc? FIT3105 - Security and Identity Management

Verification of identification 1:1 match allows only the person who satisfies the biometric test, with high degree of certainty, to gain access to the parliament meeting room, or computer server room, or bank offices, etc. 1:Many match: Ten suspects of this bank robbery case, murder case, vandalism case, etc. The person has been issued several licences or authorised accesses. No match: There is no match to this person’s biometric in our system (he/she is not on the watch list or not in the database of suspects). FIT3105 - Security and Identity Management

Biometrics’ basic properties for identification and authentocation Universality: the data must be universal. Uniqueness: the data must be unique Stability: the data should stay in tact over the life time of the entity. Easy-to-collect: it must be easy to collect and digitize the data. Performance: computer processing time must not take too long. Acceptability: the method must be acceptable to the industries and government organisations. Forge resistance: it must be infeasible to forge the data. FIT3105 - Security and Identity Management

Biometrics: how it works Authentication with biometrics is a two-phase process. In the first phase, users have to enrol by having their individual features such as fingerprints or/and irises or/and faces or/and signatures, etc. to be scanned (collected by devices). Key features are extracted and then converted to unique templates which are stored in a database usually in encrypted form. In the second phase, when corresponding features presented by a would-be user are compared to the templates in the database. The system tries to find If there is any match and produces a rejection or acceptance based on criteria and some threshold. The system tries to minimise the rate of false rejections or false acceptances. FIT3105 - Security and Identity Management

Static vs. dynamic biometric methods Static biometric methods e.g: authentication based on a feature that is always present (what if the feature changes over the time) Dynamic biometric methods e.g: authentication based on a certain behaviour pattern (can this be mimicked by another person? And How can it be digitised, stored and processed correctly?) FIT3105 - Security and Identity Management

Biometric technologies (e.g) Simple biometric technologies Hand geometry biometrics including fingerprint Iris and retinal scanning Face recognition using visible or infrared light/ image processing. Signature recognition (identify a person based on his/her signature) Voice recognition (identify a person based on his/her voice) FIT3105 - Security and Identity Management

Biometric technologies (e.g) Other possible biometric technologies: Vein recognition (hand) Gait recognition Body odour measurements Ear shape DNA Keystroke dynamics Body movement Etc. FIT3105 - Security and Identity Management

Biometrics with fingerprint techniques (e.g) Borrowed from other author FIT3105 - Security and Identity Management

Biometrics with fingerprint (e.g) Optical fingerprint sensor Capacitive sensor Borrowed from other author FIT3105 - Security and Identity Management

Design of biometrics systems Major components of a biometric system: Data collection Processing Matching Decision Storage Retrieval, Transmission, and comparison. FIT3105 - Security and Identity Management

Biometric system design Extracted features Data collection Raw Data processing Template Matching Storage Matching score Biometrics Applications Decision Authentication/identification decision FIT3105 - Security and Identity Management

Data collection/acquisition subsystem Comprises input devices or sensors that read the biometric information from the user Eg.; video camera, fingerprint scanner, digital tablet, microphone, etc. Converts biometric information into a suitable form for processing by the remainder of the biometric system FIT3105 - Security and Identity Management

Requirements for data collection Sampled biometric characteristics must be similar to users’ enrolled templates. The users and data collectors may require training to be able to get the input data as accurate as possible. Adaptation of users’ templates or re-enrolments may be necessary to accommodate changes in physiological characteristics. Sensors must be similar/standard so that biometric features are measured consistently. FIT3105 - Security and Identity Management

Raw data processing subsystem This subsystem receives raw biometric data from the data collection subsystem, then Transforms the data into the form required by matching subsystem This subsystem may use filters to remove possible noise. It carries out the feature extraction from the raw biometric data for further processing FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Matching subsystem Receives processed biometric data from raw data processing subsystem and biometric template from storage subsystem. Measures the similarity of the claimant’s sample with the reference template. methods: distance metrics, probabilistic measures, neural networks, etc. The result should be a number known as match score FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Storage subsystem Keeps the templates of enrolled users (One or more templates for each user are stored in storage). For different applications: the templates can be stored in: physically protected storage within the biometric device Digital database portable devices such as smart cards, palm devices, mobile phones, etc. FIT3105 - Security and Identity Management

FIT3105 - Security and Identity Management Decision subsystem Interprets the match score from the matching subsystem (Eg: a threshold is defined. If the score is above the threshold, the user is authenticated. If it is below, the user is rejected). May require more than one submitted samples to reach a decision. May produce false positive or negative. FIT3105 - Security and Identity Management

Biometrics applications Physical access control To high security areas To public buildings or areas Time & attendance control Identification Forensic person investigation Social services applications, e.g. immigration or prevention of welfare fraud Personal documents, e.g. electronic drivers license or ID card FIT3105 - Security and Identity Management

Biometrics for identification Positive identification: Is this the person who claims to be? Yes: Provide access or log-in access to a valid user No: do not provide access or log-in access Negative identification: Is this the person who denies to be? Yes: prevent multiple authorisations to the system. It is hard to be transferred, forgotten, lost or copied Hopefully eliminate repudiation claims Automatic personalisation of user interfaces FIT3105 - Security and Identity Management

Biometrics and Identification Many countries apply biometrics for identification cards: ID Cards include basic personal information, a digital photo and a biometric identifier (facial recognition, iris scan, fingerprint). FIT3105 - Security and Identity Management

Authentication and identification with biometrics - conclusion Biometrics information must be reliable. It also must not be forgeable. Algorithms used for computer processing. (retrieving, processing and comparing) have to be accurate. Authentication for biometrics systems must be strong enough to protect privacy and maintain security. FIT3105 - Security and Identity Management