Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

Model: TA
(Biometrics Consortium)
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Information about Biometrics and its security By Ridham Bhatt.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Authentication What you know? What you have? What you are?
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Multimodal Biometric Security 1.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
A SEMINAR REPORT ON BIOMETRICS
Presentation transcript:

Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006

Outline Biometric Basics What is Biometrics? Why use Biometrics? Model of Biometric system Types of Biometrics Evaluating Accuracy User Acceptance Advantages & Disadvantages

Biometrics Derived from the Greek words “Bio”: Life “Metric”: to measure Measures and Analyzes characteristics Physiological Behavioral Authentication

2 major means for authentication Identification Verification Identification vs. Verification Question raised Analysis Uses

Biometric Components

Types of Biometrics Physiological Fingerprints Face Eyes DNA Behavioral Voice Keystroke

Fingerprinting

Face

Eyes

DNA

Voice

Key Stroke Requires no special hardware Methods are transparent to users increasing user acceptance Can be used for cryptographically stronger secrets for login and encryption

Accuracy Usability Metrics Failure to Enroll (FTE) Failure to Acquire (FTA) Performance Metrics False Acceptance Rates (FAR) False Rejection Rates (FRR)

Usability Metrics Failure to enroll (FTE) Medicine Intake Hoarseness Sticky fingers Cataract Rare skin diseases Failure to acquire (FTA) Smudged finger prints Retina alignment Mumbling Hand positioning

Performance Metrics

User Acceptance Socially acceptable Knowledge of technology and computers Acceptance of the concept Usability Security Personal privacy

Usability Considerations Familiarity with characteristics Experience with devices Environment of use Transaction Criticality

Security Considerations Biometrics are not secrets and are therefore susceptible to modified or spoofed measurements There is no recourse for revoking a compromised identifier Strategic Solutions Liveness testing Multi-biometrics

Privacy Considerations A reliable biometric system provides an irrefutable proof of identity Threatens individuals right to anonymity Cultural concerns Religious concerns Violates civil liberties Strategic Solutions Biometric cryptosystems Transparency

Advantages Reduces cost within organizations Increases security Competitive advantage Convenience to employees Non-repudiation Eliminates a paper trail

Disadvantages Accuracy of Performance Failure to enroll rate Information Abuse May violate privacy

Conclusion Biometrics is a technology that can simplify the process of authentication Biometrics can be best used in situations where specific identity or exception identity is desired

References Tynan, Dan, “Biometrics: from Reel to Real” Yudkowsky, Chaim, “Byte of Success”, Biometrics tml tml International Biometric Group, Patrick, Andrew S., “Usability and Acceptability of Biometric Security Systems”, Institute for Information Technology National Research Council Biometric Assessment Benefits sbiometrics.com/riskans.htmhttp:// sbiometrics.com/riskans.htm Bioidentification Fact sheet