ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Introduction to Biometric Systems
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
CORE ZOO. INTRODUCTION Will biometric characteristics within a zoo menagerie change with the addition of good and bad quality biometric enrollments?
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
WELCOME.
1 Machine Vision. 2 VISION the most powerful sense.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
BIOMETRICS.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ENTROPY OF FINGERPRINT SENSORS STEPHEN ELLIOTT, KEVIN O’CONOOR, ZACH MOORE, JEFF CHUDIK, TORREY HUTCHISON, AND NICK THOMPSON.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication Schemes for Session Passwords using Color and Images
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics , Computer & Network Security 1
Presentation transcript:

ENTROPY OF FINGERPRINT SENSORS

Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS

Industry has been pushing for biometrics to replace passwords More convenient, but are biometrics still as secure as a traditional password? STATEMENT OF THE PROBLEM

The purpose is to discover whether or not different fingerprint sensors will produce different results for entropy across the same subjects and the same finger in all trials STATEMENT OF PURPOSE/SCOPE

LITERATURE REVIEW

Biometrics refers to the identification of an individual based on singular physiological or behavioral traits A biometric factor must be measurable, permanent in nature, and unique to an individual Examples include fingerprints, face, hand geometry and iris etc. BIOMETRICS

Passwords are secret based authentication, meaning that the person being authenticated has to have the knowledge of the password They can be guessed by brute force attack methods PASSWORDS

Entropy, in the case of biometrics, refers to the randomness of the biometric sample as it is collected and converted into a template Unlike passwords, which can be changed or varied in length, each unique biometric sample has only one possible character key associated with it BIOMETRICS AND PASSWORDS

What makes a fingerprint unique is the pattern, made up of the various ridges, bifurcations and endings. Each line has a specific beginning and an end, or sometimes splits into two lines MINUTIAE

Shannon coined the term entropy in information theory Since been used in cryptography as a measure of the difficulty of guessing a password or secret key SHANNON’S THEORY

When relating entropy and passwords, the higher the entropy, the longer the password needs to be ENTROPY AND PASSWORDS

The logic of defining entropy of a user selected password is an estimate. The first character is taken to be 4 bits of entropy The entropy of the next 7 characters are 2 bits per character The 9th through the 20th character is 1.5 bits per character For characters 21 and above entropy is 1 bit per character An additional 6 bits of entropy is added for the composition rule. The composition rule requires lower-case, upper-case, and non-alphabetic characters USER SELECTED PASSWORDS 94 CHARACTERS

3 bits of Entropy for the first character 2 bits of Entropy for the next three characters 1 bit of Entropy for the rest of the characters USER SELECTED PASSWORDS 10 CHARACTERS

RANDOMLY SELECTED PASSWORDS

METHODOLOGY

151 Subjects 107 male 44 female Each supplied their right index finger 6 times on 8 different sensors All sensors produced consistent image sizes DATA COLLECTION

SENSORS

DatarunArea (Pixels)Type x428Thermal Swipe x480Optical Touch x357Optical Touch x300Capacitive Touch x480Optical Touch x292Optical Touch x270Capacitive Swipe x360Capacitive Touch HARDWARE USED

VeriFinger SDK v5 Extract minutiae data Megamatcher Used for ground truthing Visual Studio (C#) Used for Entropy calculations Filemaker 13 Used to manage the samples SOFTWARE USED

Created data runs to only include those subjects who successfully supplied 6 samples across all 8 sensors Extracted the data from the database and processed the images through VeriFinger SDK 5.0 to extract the minutiae information Subjects were removed from all 8 data runs if one of their samples were unable to extract minutiae DATA MANAGEMENT

VeriFinger SDK V.5 outputted the minutiae data including the x, y, theta, and type of minutiae point x and y are the location of the point in the image Theta is the angle of the minutiae point Theta is classified as either 1, 2, 3, or 4 depending on the angle Type is either ridge ending or bifurcation Ending = 1 Bifurcation = 2 MINUTIAE DATA

Angle 1: 0° - 89° Angle 2: 90° - 179° Angle 3: 180° - 269° Angle 4: 270° - 359° 14 32

Keyspace needs to be determined Based on two parameters Possible pixel locations, denoted by L, which is the surface area of the image (varied between data runs) Possible characteristics about a minutiae point, denoted by C, which is defined by type and angle as defined earlier ENTROPY CALCULATION

RESULTS

SAMPLES FROM EACH SENSOR The same subject across all 8 sensors

DatarunType Angle 1 Angle 2 Angle 3 Angle 4EndBifa1enda1bifa2enda2bifa3enda3bifa4enda4bif avg minutiaeentropy entropy per minutiae 1761 Thermal Swipe Optical Touch Optical Touch Capacitive Touch Optical Touch Optical Touch Capacitive Swipe Capacitive Touch ENTROPY CALCULATIONS TABLE

The highest minutiae count was produced by a thermal swipe sensor Optical touch sensors seem to provide a higher average minutiae count than capacitive touch sensors A capacitive sensor provided the highest entropy per minutiae but least average minutiae. SENSOR RESULTS

MINUTIAE VS. CHARACTER LENGTH

Probability of Minutiae Location

ENTROPY AND PASSWORD LENGTH User ChosenRandomly Chosen 94 Char. Alphabet10 Char. Alphabet 94 Char. Datarun Avg. Minutiae EntropyNo Checks Dict. & Composition Rule

The first three columns are entropy calculations based on the data runs The next columns output a password length equal to the entropy of the data run There are also other conditions under which the password has constraints, such as being out of 94 possible characters or 10 EXPLANATION

CONCLUSIONS

When analyzing the data there seemed to be some scanners that had a very low quality image but high minutiae This could have to do with the scanner type specifically or rather a function image quality, or image size CONCLUSIONS

REFERENCES