Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008

A definition Biometrics is a branch of computer security centering on authenticating a person’s identity based on some physiological or behavioral characteristic unique to that person Authentication system: verifies the identity of a user before allowing them access to the internal system

Stages of Operation Enrollment Biometric data is collected for a known identity Reference template is created and stored Authentication Identification: comparison of biometric data to all available data files in a database Verification: comparison of biometric data to previously stored version

A Better Approach to Security… Biometrics is seen as more secure than traditional methods: Biometrics vs. Passwords Biometrics vs. Tokens

Types of Biometric Authentication Fingerprints Retina / Iris Scans Facial Recognition Hand Recognition DNA Matching Keystroke Recognition

Fingerprints Ridges vs. Valleys Scanning Mechanisms Optical Scanner Capacitance Scanner

Fingerprints (contd.) Analyzing a Fingerprint - Minutiae

Retina Scans Small surface Detailed Scan Slow scan and compare procedure

Iris Scans More than 250 unique spots Compares trabecular meshwork of the iris Fast scans Requires a human eye

Facial Recognition Uses a video image to look at distances between features and overall structure Requires a human face Difficulties in finding the features in images

Hand Recognition Hand geometry not as unique as fingerprints Uses hand features and measurements increases uniqueness Measures up to 90 different points on the hand including characteristics of the finger and features on the skin Seen as less invasive than fingerprints

DNA Matching Comparison of a sample of a user’s DNA with a stored sample of the real person’s DNA DNA is readily available to collect Comparison process is slow and not completely automated

Keystroke Recognition Uses rhythm and manner in which characters are typed into a keyboard Typing characteristics are unique to individuals Indicators Speed in words per minute Delays Specific sequences of characters Typing errors Seek time and hold time

Issues / Concerns Data Storage Accuracy Physical Danger Privacy

Data Storage Permanence of Biometric data Re-issue is not possible Biometric data theft is permanent Possible solution: decentralization of data storage Store part of each record in the central database and the rest on a smart card with the individual user Complete records become inaccessible to hackers

Accuracy No perfect matches in biometrics Acceptance range of comparison algorithms Types of errors False positives: accepting wrong identity False negatives: rejecting correct identity Algorithm cut-off level is a compromise between the two error types

Physical Danger Thieves might target property owners to bypass biometric security measures Example: in 2005, car thieves in Malaysia cut off a man’s finger to bypass the fingerprint reader on his Mercedes Benz S Class

Privacy Questions Should organizations or individuals control biometric information? Can biometric information be used without individual consent? Can law enforcement agencies demand biometric data from individuals for forensic purposes? Answers ISO Department of Health, Education, and Welfare

Examples of Biometrics Usage Governments worldwide use biometrics for passports and airport security. Police agencies use fingerprints and DNA for identification and forensics. Financial institutions use palm/finger vein authentication to secure ATMs. Companies use biometrics to keep time records, secure locations and improve user convenience.

The Future of Biometrics September 11, 2001 resulted in unprecedented growth for the large-scale deployment of biometrics. Biometrics is being incorporated into national passports worldwide. Because of its advantages over traditional authentication methods, biometrics will continue to helm the endeavor for increased computer security.

References system.JPG

References (contd.) Langenderfer, J. & Linnhoff, S. (2005). The Emergence of Biometrics and Its Effect on Consumers. The Journal of Consumer Affairs, 39, Retrieved 9 November 2008 from H.W. Wilson database. Barton, B., Byciuk, S., & Harris, C. (2005). The Emerging Cyber-Risks of Biometrics. Risk Management, 52, 26-8, Retrieved 6 November 2008 from H.W. Wilson database. Gates, K. (2006). Biometrics and Access Control in the Digital Age. NACLA Report on the Americas, 39, Retrieved 12 November 2008 from H.W. Wilson database.