Biometrics: Identity Verification in a Networked World

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Introduction to Biometric Systems
Information Security for Managers (Master MIS)
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Networking Network Classification, by there: 3 Security And Communications software.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
BIOMETRICS.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Access control techniques
Biometrics : From Yesterday to Tomorrow
A Seminar Report On Face Recognition Technology
Authentication.
FACE RECOGNITION TECHNOLOGY
Biometrics.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Biometrics and Standards ITU-T Technology Watch Report December 2009.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics: Identity Verification in a Networked World Transparent Multimodal Biometric System for HD Multimedia Conference Biometrics: Identity Verification in a Networked World Name: Laith Abbadi, Abbas Javadtalab

Introduction Identification in electronic networks (e-Identification) is a main topic in e-world (e-commerce and e-government) [1]. A biometric system recognizes a person based on physiological or behavioral characteristics of the person. A multimodal biometric system is a system that combines two or more of the biometric characteristics.

Purpose The purpose of the paper is to verify the identity of a person during a video conference using a transparent multimodal biometrics. The paper will propose a multimodal biometric system using face and ear recognition and without the user’s interaction.

Security Proposed Framework For practical use, the framework is aiming to satisfy a set of criteria include: (i)Ease of deployment: A system can be deployed with few additional requirements on current infrastructure and communication protocols; (ii) Ease of use: Users have no difficulties using the system; (iii) Security: A system should address the real security concerns in verifying a person in the system. The security may not be perfect, but should be good enough to be user-friendly and business-driven

Authentication Type Table 1: Classification of authentication type Description Example Identifier Group Type 1 Something you know Password, PIN Knowledge based Type 2 Something you have Token, OTP Electronic tokens Type 3 Something you are Fingerprint, iris, face, ear Biometric (Physiological) Type 4 Something you do Voice, Signature Biometric (Behavioral)

Identifier Groups Knowledge Based Identifiers Electronic Tokens Date of Birth SIN Number Names Address PIN Numbers (passwords) Electronic Tokens Digital tokens are the physical devices that contain digital information for verification purposes. a. Smart Cards b. One time Password Token OTP Time based Token OTP Event based Token c. Radio frequency identifiers (RFID).

Identifier Groups Biometric Identifiers Physiological Biometric Identifiers: Fingerprint Retina image Iris Face Recognition Ear Recognition Behavioral Biometric Identifiers: Voice Dynamic signature Keystrokes dynamics Note: Using behavioral identifiers alone is not a solid solution, but they work well if they used with other types of identifiers.

Biometric for Verification Biometric System Table 2: Biometric Features Features Biometric for Verification Biometric for Identification Fingerprint √ Iris Face Recognition Ear Recognition Voice Dynamic Signature Keystrokes dynamics

E-identifiers Table 3: Comparison of e-identifier groups Source: [1]

Biometric identifiers Table 4: Biometric Identifiers [2] Ear Note: For Ear, research was not finished by Nov 3, 2010

HD Multimedia Conference High quality video Conferencing Used for communicating between CEO’s and VIP’s Video Quality:1920x1080 x264: Open source implementation of H.264 standard x264 offers faster encoding

Sample Results (CBR) Original 1200 Kbit/s 100 Kbit/s 800 Kbit/s

Multimodal Biometric Recognition system Face Templates Face Matching Face Extraction Ear Templates Fusion Ear Matching Ear Extraction Decision

Conference solution

Conference solution

Future Work 1- Apply face detection Algorithm 2- Apply ear recognition Algorithm 3- Apply voice detection a.    Oral style (such as spelling ‘aahhh’) 4- Mouth movement 5- Face Expression & Emotion (ex. laughing) 8- Ration (face with upper body) 9- Add-ons a.    Hand shake (haptics)

Conclusion Use of Multimodal Biometric system is more advantageous than using a mono-modal biometric system Biometric features are unique to each person It is feasible to have a transparent verification system using face and ear recognition

Thank You

References [1] Biometric Technology Today (BTT), June (2008) Biometrics in the retail sector page 9-11 [2] Black Cathryn, (2008) Biometric Technology Today • January 2008page 5 [3] Clarke Roger (2007) Introduction to Information Security, February 2007 [4] Clarke, Roger (2008), ``EDI is but one element of electronic commerce'', Roger Clarke's EC Foundation Paper http://www.anu.edu.au/people/Roger.Clarke/EC/Bled08.ht [5] Clarke, Roger (2005) Dataveillance by Governments The Technique of Computer Matching Information Technology & People, Vol. 7 No. 2, 2005, pp. 46-85 [6] Clarke, Roger (2009) Human Identification in Information Systems: Management Challenges and Public Policy Issues [7] Cranor L, Cytron R. Sensus:a security-conscious electronic polling system for the Internet. Proceedings of the Hawaii International Conference on System Sciences; 2009. p. 561e70. [8] Desmarais Norman, (2009) Body language, security and e-commerce Volume 18 . Number 1 . 2009 . pp. 61-74 [9] Granova Anna & Eloff JHP, (2004) Online banking and identity theft: who carries the risk? Computer Fraud and Security page 7-8 [10] Marshalla Angus M., Tompsett Brian, (2005) Identity theft in an online world Computer Law & Security Report (2008) 21, 128e137 [11] Monrose Fabian, Rubin Aviel D. (2009) Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 (2009) 351-359