Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Security Challenges of Biometric Systems
Chapter 12 Thwarting Attacks Leandro A. Loss. Introduction Benefits of Biometric Authentication: –Convenience (e.g. recall password, keep cards) –Security.
Biometrics.
Authors: Anil K. Jain, Arun Ross and Sharath Pankanti Presented By: Payas Gupta.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Fingerprint Biometrics By Tamar Bar.
Fingerprint Authentication Kevin Amendt David Friend April 26, MIT Course Project Presentations.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Securing Pervasive Networks Using Biometrics
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Biometrics: Ear Recognition
Authentication Approaches over Internet Jia Li
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Introduction to Biometric Systems
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
G53SEC 1 Authentication and Identification Who? What? Where?
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
UNIT I PART II R.S.Ponmagal. Pervasive Architecture Architecture is an abstraction of the system. Architecture defines the system elements and how they.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Biometrics Authentication Technology
1 Biometric Databases. 2 Overview Problems associated with Biometric databases Some practical solutions Some existing DBMS.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
G53SEC 1 Authentication and Identification Who? What? Where?
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Authentication What you know? What you have? What you are?
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
CSCE 201 Identification and Authentication Fall 2015.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Multimodal Biometric Security 1.
CSCE 522 Identification and Authentication
CSCE 522 Identification and Authentication
Authentication.
Multimodal Biometric Security
Authentication.
Security in ebXML Messaging
Asst. Prof. Arvind Selwal, CUJ,Jammu
A Framework of Remote Biometric Authentication on the Open Network
Security Risanuri Hidayat 21 February 2019 security.
Security in SDR & cognitive radio
Presentation transcript:

Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009

Authentication Definition: “Authentication is the binding of an identity to a subject.” “[Any] security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.” Mechanisms knowledge based possession based physiological/behavioral trait (Biometric) 2

Biometric Authentication Fingerprint to 6000 BC by the ancient Assyrians and Chinese. Clay pottery and clay seals

Security Issues Is biometric revocable? How reliably unique the biometrics are? How universal are the biometrics are? Are biometric traits invariant? How universal are the biometrics are? Biometrics have secondary uses.

Security Issues (contd.)

False sample presentation spoofing Sensor issues noise and distortion sensor characteristics unavailability of identical sensors Segmentation denial of service attack Feature extraction and QA exploit knowledge about algorithm

Security Issues (contd.) Template creation Is it one-way function? Data storage large data size cryptographic hashes not applicable database security Matching determining set of modality weights on modality

Security Issues (contd.) Decision based on statistical threshold configurable threshold level susceptible to human error

Security Issues (contd.)

Classification of Vulnerability Circumvention Covert acquisition (contamination) Collusion and Coercion Denial of Service (DoS) Repudiation

Towards Increased Security Multimodal authentication Template encryption Revokable biometric

Summary biometric authentication relieves from remembering passwords. accuracy is highly dependent on sensor and signal quality. decision is made based on statistical threshold. originally biometric is non-revokable, but distortion based algorithms may allow revokable use.