BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Biometrics.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
Fingerprint Sensor Market Demands
A Seminar Report On Face Recognition Technology
BIOMETRICS Presented By Sapin.M.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser

6 Types of Biometric Technology:  Face Recognition  Fingerprint Recognition  Hand Geometry  Iris/Retina Scan  Voice Recognition  Keystroke Dynamics

Face Recognition Technology  Proven to be remarkably ineffective.  To give accurate identifications, the camera requires the suspect to stare directly and frontally into the lens.  To verify a match, a video database is also required and this database must be updated frequently to account for changes due to aging and other cosmetic changes. A computerized photo match that emphasizes parts of the face that are less susceptible to alteration such as the upper outlines of the eye sockets, areas around the cheekbones, and side of the mouth (Kroeker, 2002).

Fingerprint Recognition Technology  An individual puts his or her hand on a scanning pad called a platen and the finger’s minutiae, the ridges, valleys and bifurcations that are unique to an individual, are recorded.  The methodology utilized to capture finger scans comes from three sources: 1. capacitance, which uses electrical charges between the finger’s ridges, 2. optical, which uses light, and 3. thermal, which uses heat (Finger Image, 2003).  A single fingerprint is matched against a central database.  Is the least accurate biometric reading (only has 40 characteristics to measure) (Ackerman, 2003). This is the preferred biometric tool because the general population has become accustomed to it and has accepted the practice as a legitimate invasion of privacy.

Hand Geometry  The user enters a PIN number on a keypad and then positions their hand on a plate (Spence, 2003).  This plate has a set of guidance pins, which ensure that the hand will be in generally the same position for every measurement.  A digital camera mounted above the plate, with the aid of a mirror, takes a picture of the top and side views of the hand.  The dimensions of the hand, such as finger length, width and area, are extrapolated from the image and the magnification of the camera (Spence, 2003).

Iris/Retina Scan  Focuses on identifying unique patterns of blood vessels on the back wall of the retina.  The head is positioned against a support, and a low power infrared light is directed against the back of the retina.  The vein pattern image is reflected back to the camera.  Extremely accurate because it has to verify 266 characteristics: more than any other biometric reading (IBG, 2003).  Very expensive.

Voice Recognition  The user speaks into a microphone and gives his password or access phrase.  Utilizes digital technology to produce a voiceprint that is stored and then referred to each time the owner of the voiceprint attempts to access a system.  For a voice print to be verified, the pass phrase must be identical to the one initially recorded.  Verification time is about five seconds (Collin, 2003). To prevent someone from using a recording of another person’s voice, the voice recognition system requires that high and low frequencies of the sound match.

Keystroke Dynamics  Evaluates the manner by which an individual types at a computer terminal by monitoring the keyboard inputs thousands of times per second in an effort to identify users based on habitual typing rhythm patterns.  The durations of keystrokes and the latencies between them are recorded.  The sample is compared with the template through statistical means, where the computed distance must be within an accepted range. Recognition based on typing rhythm is not intrusive, so users would not see this as an extensive invasion of privacy (Monrose and Rubin, 1999).

 The U.S. National Institute for Technology & Standards has found that facial-recognition systems perform well in controlled situations but that in uncontrolled settings, facial appearances can vary significantly depending on lighting, camera angle, and a number of intangibles.  The IBG also criticized the accuracy of face-scanning systems: in one case study (under controlled circumstances), six weeks after users had been scanned into the system, the device failed to recognize them almost one-third of the time (Hawkins, 2002). How Effective Is Biometrics?

How Effective Is Biometrics? (con’t)  The IBG says the failure rate of fingerprint scanners is as high as 12%.  Digital fingerprint readers can fail to identify people whose professions entail working with harsh chemicals, such as hairdressers.  The prints of the aged may also be too worn to register.  About 4% of the population cannot be tracked by fingerprint biometrics because their prints are too blurry to discern (Salkever, 2003).

The ultimate biometric technology is the computer chip implant. Now being marketed by the VeriChip Corporation, the product is awaiting consumer acceptance. The computer chip will stay with you for life and will act like a personal emergency transmission alert. Possibilities

Do you want a computer chip implanted into your body? Do we want to be watched all the time? The likely answer is NO! (Source: Greater Things Website - However, unless the technology exists to simultaneously track the activities of millions, perhaps billions of computer chip recipients, surveillance will continue to be the result of a subjective decision to have somebody watched.

What is Privacy? “ the right to be left alone ” “the right to exercise control over information about oneself” “the ability to control the use and disclosure of one’s personal information” The concept of privacy remains difficult to define.