Venu Govindaraju University at Buffalo

Slides:



Advertisements
Similar presentations
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
Advertisements

Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Biometrics.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Biometrics and Sensors
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
CUBS, University at Buffalo
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometric Systems Adapted from B. Cukic
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Chapter 10: Authentication Guide to Computer Network Security.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometric Systems Adapted from B. Cukic
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Access control techniques
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Venu Govindaraju University at Buffalo

Current Research Activities at CUBS Mainstream Research  Biometric Identification  Fingerprint Verification  Hand Geometry  Signature Verification  Speaker Recognition  Multimodal Biometrics  Classifier Combination  Information Fusion  Storage of Biometric Data  2D barcodes  Smart cards  Materials and Light Sources  Analog VLSI and Optical Detectors Exploratory Research  Large Scale Biometric Databases  Indexing and binning  Soft biometrics  Securing Biometric Data  Template hiding  Cancelable biometrics  Personal Hashes  Biometric Hardening  Novel Applications of Biometrics  Pervasive Computing  Information assurance  Biometric Encryption  Chemical/Biological Biometrics  Skin spectroscopy  Perspiration/odor

Teams  Fingerprints  Sharat Chikkerur  Chaohang Wu  Alan Tjea   Hand Geometry  Amit Mhatre   Face Catalog  Zhi Zhang  Karthik Sridharan  Sankalp Nayak   Speech Accent  Shamalee Deshpande   Biometric Hardening  Sharat Chikkerur  Amit Mhatre  Large scale Databases  Sharat Chikkerur  Amit Mhatre  Praveer Mansukhani  Skin biometrics  Sarojini Ramakrishnan   Biometric Hashing  Sergey Tulyakov  Faisal Farooq   Speaker ID  Face Recognition  Palmprint  Skin biometrics  Multimodal Biometrics  Barcode representation  Pervasive Computing  Information Assurance  Biometric Cryptography  YOU!!

Packaged Device Bright & Cartwright Sensors (Materials Development & Characterization) Titus Analog VLSI (Smart Systems) Biometric Authentication (Pattern Recognition & Analysis) Govindaraju Cartwright Light Sources (Materials Development & Characterization) Faculty Collaboration

Intellectual Resources  Faculty  Interdisciplinary Faculty Collaboration  School of Engineering and Applied Sciences  Dept. of Computer Science and Engineering  Dept. of Electrical Engineering  UB School of Arts and Sciences  Dept. of Chemistry  UB Law School  UB School of Medicine and Biomedical Sciences  UB School of Informatics  Research Scientists  Four full time research scientists  Students  One Post-doc  Ten Ph.D. students  Five M.S. students

Material Resources  Hardware  Hand Geometry  Recognition Systems:Hand Geometry  Prototype acquisition and verification  Fingerprint  Ultrascan TM ultrasound sensor  E-Pad TM capacitive sensor  U.R.U TM optical sensor  Signature  E-Pad TM digitizer  Logitech digital pen  Infrastructure  6,000 sq. ft of office space shared with CEDAR.  Solaris and Intel Computers  Funding  More than 1M dollars in current grants

Industrial Collaboration  Handwriting Recognition  INS Forms processing  Biometric Fusion  ‘Accuscript’ : Pen stroke dynamics  Hand Geometry  Indexing and binning  Face recognition  Soft biometrics

Industrial Collaboration Unified Data Systems for Medical Rehabilitation  Disease surveillance  Medical Form processing  AFIS Implementation  Multi modal biometrics  Biometrics enabled smart cards INHOUSE TRAINING IRELAND  Biometrics awareness training

Biometrics  Definition  Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits  Examples  Physical Biometrics  Fingerprint, Hand Geometry,Iris,Face  Measurement Biometric  Dependent on environment/interaction  Behavioral Biometrics  Handwriting, Signature, Speech, Gait  Performance/Temporal biometric  Dependent on state of mind  Chemical Biometrics  DNA, blood-glucose

Conventional Security Measures  Possession or Token Based  Passport, IDs, Keys  License,Smart cards,Swipe cards, Credit Cards  Knowledge Based  Username/password  PIN  Combination of possession and knowledge  ATM  Disadvantages of Conventional Measures  Do not authenticate the user  Tokens can be lost or misused  Passwords can be forgotten  Multiple tokens and passwords difficult to manage  Repudiation

Need for biometrics  Reliable authentication and authorization  Billions of dollars are lost in identity theft and fraud  Common security measures authenticate the token or password and not the user.  Repudiation problems cannot be resolved even in the face of well documented audit trails.  Identity management  Managing multiple tokens, badges, usernames and passwords are cumbersome  Maintaining such personally  Biometrics cannot be lost, forgotten or stolen*

Characteristics of Biometrics  Universality  Each person should have the biometric  Uniqueness  Any two persons should have distinctive characteristics  Permanence  Characteristic should be invariant over time  Collectability  Characteristic should be easy to acquire  Acceptability  Is non-intrusive and accepted by a large population  Non repudiation  User cannot deny having accessed the system

The Field of Biometrics  Biometrics grew out of different fields  Speaker ID : Signal processing  Face Recognition: Computer Vision  Fingerprints : Forensics  Biometrics is the confluence of several disciplines  Sensors: electrical and mechanical engineering  Pattern recognition, probability and statistics  Image processing and computer vision  Signal processing  Algorithms and databases

Uses of Biometric Systems  Physical access control  Airports, Banks, Industry  Logical access control  Computer/network logon, e-commerce  Preventing identity fraud  Social security (double dipping), Immigration, Border Control  Information assurance  Audit trails, Biometric cryptography protocols  Securing pervasive environments

Aspects of a Biometric Systems  Sensor and devices  Types of sensors  Electrical and mechanical design  Feature representation and matching  Enhancement, preprocessing  Developing invariant representations  Developing matching algorithms  Evaluation  Testing  System Issues  Large Scale databases  Securing Biometric Systems  Ethical, Legal and Privacy Issues  Ergonomics, usability

Applications And Scope of Biometrics TechnologiesHorizontal ApplicationsKey Vertical Markets FingerprintCivil IDGovernment Sector Facial RecognitionSurveillance and ScreeningTravel and Transportation Iris ScanPC / Network AccessFinancial Sector MiddlewareRetail / ATM / Point of SaleHealth Care AFISCriminal IDLaw Enforcement Voice ScaneCommerce / Telephony Hand GeometryPhysical Access / Time and Attendance Signature Verification Keystroke Dynamics