Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics Pearl Brewer, Ph.D. HOA 725. Definition of Biometrics Automated identification based on physiological or behavioral characteristics  Examples.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Introduction to Fingerprint Biometrics By Tamar Bar.
PALM VEIN TECHNOLOGY.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security

What Is Biometrics? The automated identification or verification of human identity through physiological and behavioral traits The automated identification or verification of human identity through physiological and behavioral traits

History of Biometrics The first known example of biometrics was fingerprinting in China in the 14 th century, used to distinguish young children from one another. The first known example of biometrics was fingerprinting in China in the 14 th century, used to distinguish young children from one another. In the past three decades, it has moved from solely fingerprinting to more than ten discreet methods. In the past three decades, it has moved from solely fingerprinting to more than ten discreet methods. Laws and regulations continue to be drafted and standards are beginning to be developed. No biometric has yet reached the breadth of fingerprinting. Laws and regulations continue to be drafted and standards are beginning to be developed. No biometric has yet reached the breadth of fingerprinting.

Uses of Biometrics Identification determines who a person is. Identification determines who a person is. Take the measured characteristic and try to find a match in a database containing records of people and that characteristic. Take the measured characteristic and try to find a match in a database containing records of people and that characteristic. Can require a large amount of processing power and some time if the database is large Can require a large amount of processing power and some time if the database is large Verification determines if a person is who they say they really are. Verification determines if a person is who they say they really are. Take the measured characteristic and compare it to the previously recorded data for that person Take the measured characteristic and compare it to the previously recorded data for that person Requires less processing power and time Requires less processing power and time

How Does Biometrics Work? All biometric systems operate the same way in a four-step process that is automated and computerized. All biometric systems operate the same way in a four-step process that is automated and computerized. Capture – a physical or behavioral sample is captured by the system during enrollment Capture – a physical or behavioral sample is captured by the system during enrollment Extraction – unique data are extracted from the sample and a template is created; unique features are then extracted by the system and converted into a mathematical code (biometric data); this sample is then stored as the biometric template for that person. Extraction – unique data are extracted from the sample and a template is created; unique features are then extracted by the system and converted into a mathematical code (biometric data); this sample is then stored as the biometric template for that person. Comparison – template is then compared with a new sample; a computer algorithm normalizes the captured biometric signature so that it is in the same format as an individual’s signature stored in the database; biometric data are then stored as the biometric template for that person Comparison – template is then compared with a new sample; a computer algorithm normalizes the captured biometric signature so that it is in the same format as an individual’s signature stored in the database; biometric data are then stored as the biometric template for that person Match/Non-match – the system decides whether the features extracted from the new sample are a match or a non-match with the template; if so, the person’s identity is confirmed Match/Non-match – the system decides whether the features extracted from the new sample are a match or a non-match with the template; if so, the person’s identity is confirmed

Why Use Biometrics? PINs, passwords, and physical tokens, are popular present-day methods used for authentication and verification. However, there are a number of problems associated with these types of identification. PINs, passwords, and physical tokens, are popular present-day methods used for authentication and verification. However, there are a number of problems associated with these types of identification. People forget, reuse, and write down passwords. People forget, reuse, and write down passwords. People loose tokens or they may be stolen. People loose tokens or they may be stolen. Recognition of passwords or tokens does not ensure the identity of the person providing it. Recognition of passwords or tokens does not ensure the identity of the person providing it. There is little “work” on the part of the user to authenticate or verify themselves. There is little “work” on the part of the user to authenticate or verify themselves. No memorization of passwords No memorization of passwords No misplacing of tokens No misplacing of tokens

Problems with Implementing Biometrics Cultural and Social Issues Cultural and Social Issues People would think that there are hidden cameras everywhere People would think that there are hidden cameras everywhere People believe biometrics is used only for criminals (i.e. fingerprint biometrics) People believe biometrics is used only for criminals (i.e. fingerprint biometrics) Some cultures do not allow taking photographs Some cultures do not allow taking photographs Biometric systems are not 100% accurate 100% of the time. Biometric systems are not 100% accurate 100% of the time. Humans are inconsistent: both our physical and behavioral characteristics can change over time. Humans are inconsistent: both our physical and behavioral characteristics can change over time. Technology is still more expensive Technology is still more expensive

Fingerprinting Basics Basics Takes an image (using ink or a digital scan) of a person’s fingerprints and records the characteristics. Takes an image (using ink or a digital scan) of a person’s fingerprints and records the characteristics. This information is usually not stored as an image. Instead, it is encoded as a character string. This helps to prevent reverse engineering of a person’s fingerprint, as well as decreasing lookup time. This information is usually not stored as an image. Instead, it is encoded as a character string. This helps to prevent reverse engineering of a person’s fingerprint, as well as decreasing lookup time. How It Works How It Works User presses his/her finger gently against a smaller reader surface. User presses his/her finger gently against a smaller reader surface. The reader scans the finger (usually about 5 seconds) and sends the information to a database. The reader scans the finger (usually about 5 seconds) and sends the information to a database. This is then compared to the information within. This is then compared to the information within. To prevent fake or detached fingers from being used, many systems also measure blood flow, temperature, or check for correctly arrayed ridges at the edges of the finger. To prevent fake or detached fingers from being used, many systems also measure blood flow, temperature, or check for correctly arrayed ridges at the edges of the finger.

Fingerprinting Evaluation Evaluation Accurate Accurate Powerful Powerful Small storage Small storage Highly developed and researched Highly developed and researched Secure Secure Requires a bit of management – scanner must be kept clean Requires a bit of management – scanner must be kept clean

Retinal Scanning Basics Basics Analyzes the layers of the blood vessels at the back of the eye using a low-intensity light source and an optical coupler which can read the patterns at a greater level of accuracy Analyzes the layers of the blood vessels at the back of the eye using a low-intensity light source and an optical coupler which can read the patterns at a greater level of accuracy How It Works How It Works User looks through a small opening in the device at a small green light, and must keep their head still and eye focused on the light for several seconds during which time the device will verify the identity. User looks through a small opening in the device at a small green light, and must keep their head still and eye focused on the light for several seconds during which time the device will verify the identity. The process takes about 10 to 15 seconds in total. The process takes about 10 to 15 seconds in total. Evaluation Evaluation Most accurate biometric available today Most accurate biometric available today Extremely difficult to fool the device Extremely difficult to fool the device Expensive Expensive Users think it is harmful to the eye and discomforting. Users think it is harmful to the eye and discomforting.

Iris Scanning Basics Basics Analyzes the features that exist in the colored tissue surrounding the pupil Analyzes the features that exist in the colored tissue surrounding the pupil How It Works How It Works User positions themselves such that he/she can see their own eye reflection in the device (can be done at a slight distance) User positions themselves such that he/she can see their own eye reflection in the device (can be done at a slight distance) Uses a regular video camera Uses a regular video camera Can be done even through glasses Can be done even through glasses Light varied to watch for pupil dilation Light varied to watch for pupil dilation Evaluation Evaluation Likelihood of a false positive very low, due to uniqueness of eyes even between right and left eyes. Likelihood of a false positive very low, due to uniqueness of eyes even between right and left eyes. Takes a bit more memory to store Takes a bit more memory to store

Speaker Recognition Basics Basics Analyzes the acoustic features of speech that are unique to each individual Analyzes the acoustic features of speech that are unique to each individual Acoustic patterns reflect both the anatomy (size and shape of throat and mouth) and learned behavioral patterns (voice pitch and speaking style). Acoustic patterns reflect both the anatomy (size and shape of throat and mouth) and learned behavioral patterns (voice pitch and speaking style). How It Works How It Works User speaks into microphone his/her password or access phrase. User speaks into microphone his/her password or access phrase. Verification time is approximately 5 seconds. Verification time is approximately 5 seconds. Most devices require the high and low frequencies of the sound to match to prevent recorded voice use. Most devices require the high and low frequencies of the sound to match to prevent recorded voice use. Evaluation Evaluation Low Cost – very little hardware is required (a microphone on a standard PC with software to analyze unique characteristics. Low Cost – very little hardware is required (a microphone on a standard PC with software to analyze unique characteristics. Ideally suited for telephone-based applications Ideally suited for telephone-based applications Difficult to analyze speech Difficult to analyze speech

Using Biometrics Without Ruining Its Functionality Use with a combination of other security mechanisms Use with a combination of other security mechanisms Fingerprinting in combination with a password Fingerprinting in combination with a password Use with a combination of other biometrics Use with a combination of other biometrics Fingerprinting with iris scanning Fingerprinting with iris scanning

Future of Biometrics Biometrics will grow! Biometrics will grow! It will be present in areas that really need security. It will be present in areas that really need security. It will be integrated into our daily lives. It will be integrated into our daily lives. IBM has shipped 3 million ThinkPads that have an embedded security chip and the ability to authenticate by fingerprint to get on the system. IBM has shipped 3 million ThinkPads that have an embedded security chip and the ability to authenticate by fingerprint to get on the system. Door locks (with knob and handle) that contain a fingerprint sensor Door locks (with knob and handle) that contain a fingerprint sensor Cars Cars Safes Safes USB Flash Drives USB Flash Drives Weaponry Weaponry