Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Biometrics Part 2  Access Control 1.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
3D Password.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
Biometrics.
Biometrics.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Access Control and Site Security
Presentation transcript:

Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang

Preface  We can authenticate an identity in three ways: by something the user knows (such as a password or personal identification number), something the user has (a security token) or something the user is (a physical characteristic, such as a fingerprint, called a biometric).

Abstract  Introduction to biometric authentication  Some related concepts  Biometric Methods  Can biometric authentication be fooled  Some issues about Access Control

Biometric Authentication  Biometric Authentication  Authentication based on body measurements and motions  It is easy because you always bring your body with you  Biometric Systems  Enrollment  Later access attempts  Acceptance or rejection

Biometric Authentication System 1. Initial Enrollment 2. Subsequent Access User Lee Scanning Applicant Scanning Template Database Brown Lee Chun Hirota … 3. Match Index Decision Criterion (Close Enough?) Processing (Key Feature Extraction) A=01, B=101, C=001 User Lee Template ( ) User Access Data ( ) Processing (Key Feature Extraction) A=01, B=111, C=001

Biometric Authentication  Verification Versus Identification  Verification: Are applicants who they claim to be? (compare with single template)  Identification: Who is the applicant? (compare with all templates)  More difficult than verification because must compare to many templates  Watch list: is this person a member of a specific group (e.g., known terrorists)  Verification is good for replacing passwords in logins  Identification is good for door access and other situations where entering a name would be difficult

FAR  Precision  False acceptance rates (FARs): Percentage of unauthorized people allowed in  Person falsely accepted as member of a group  Person allowed through a door who should not be allowed through it  Very bad for security

FRR  Precision  False rejection rates (FRRs): Percentage of authorized people not recognized as being members of the group  Valid person denied door access or server login because not recognized  Can be reduced by allowing multiple access attempts  High FRRs will harm user acceptance because users are angered by being falsely forbidden

Biometric Authentication  Precision  Vendor claims for FARs and FRRs tend to be exaggerated because they often perform tests under ideal circumstances  For instance, having only small numbers of users in the database  For instance, by using perfect lighting, extremely clean readers, and other conditions rarely seen in the real world

Biometric Authentication  User Acceptance is Crucial  Strong user resistance can kill a system  Fingerprint recognition may have a criminal connotation  Some methods are difficult to use, such as iris recognition, which requires the eye to be lined up carefully.  These require a disciplined group

Biometric Authentication  Biometric Methods  Fingerprint recognition  Dominates the biometric market today  Based on a finger’s distinctive pattern of whorls, arches, and loops  Simple, inexpensive, well-proven  Weak security: can be defeated fairly easily with copies  Useful in modest-security areas

Biometric Authentication  Biometric Methods  Iris recognition  Pattern in colored part of eye  Very low FARs  High FRR if eye is not lined up correctly can harm acceptance  Reader is a camera—does not send light into the eye!

Biometric Authentication  Biometric Methods  Face recognition  Can be put in public places for surreptitious identification (identification without citizen or employee knowledge). More later.  Hand geometry: shape of hand  Voice recognition  High error rates  Easy to fool with recordings

Biometric Authentication  Biometric Methods  Keystroke recognition  Rhythm of typing  Normally restricted to passwords  Ongoing during session could allow continuous authentication  Signature recognition  Pattern and writing dynamics  Biometric Standards  Almost no standardization  Worst for user data (fingerprint feature databases)  Get locked into single vendors

Biometric Authentication  Can Biometrics be Fooled?  Airport face recognition  Identification of people passing in front of a camera  False rejection rate: rate of not identifying person as being in the database  Fail to recognize a criminal, terrorist, etc.  FRRs are bad  4-week trial of face recognition at Palm Beach International Airport  Only 250 volunteers in the user database (unrealistically small)  Volunteers were scanned 958 times during the trial  Only recognized 455 times! (47%)  53% FRR

Biometric Authentication  Can Biometrics be Fooled?  Airport face recognition  Recognition rate fell if wore glasses (especially tinted), looked away  Would be worse with larger database  Would be worse if photographs were not good  DOD (Department of Defense )Tests indicate poor acceptance rates when subjects were not attempting to evade  270-person test  Face recognition recognized person only 51 percent of time  Even iris recognition only recognized the person 94 percent of the time!

Biometrics Authentication  Can Biometrics be Fooled?  Other research has shown that evasion is often successful for some methods  German c’t magazine fooled most face and fingerprint recognition systems  Prof. Matsumoto fooled fingerprint scanners 80 percent of the time with a gelatin finger created from a latent (invisible to the naked eye) print on a drinking glass

Access Control  Access Control  Access control is the policy-driven limitation of access to systems, data, and dialogs  Goals  Prevent attackers from gaining access, stopping them if they do  Provide appropriate limitations on the access rights of authorized users

Access Control  First Steps  Enumeration of Resources  Sensitivity of Each Resource  Next, who Should Have Access?  Can be made individual by individual  More efficient to define by roles (logged-in users, system administrators, project team members, etc.)

Access Control  Policy-Based Access Control and Protection  Have a specific access control policy and an access protection policy for each resource  For example, for a file on a server, for instance, limit authorizations to a small group, harden the server against attack, use a firewall to thwart external attackers, etc.  Focuses attention on each resource  Guides the selection and configuration of firewalls and other protections  Guides the periodic auditing and testing of protection plans