Biometrics Angela Sasse – Dept of Computer Science

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Measuring Usability of Biometrics Review of Experiences at NPL Linda Johnstone Sorensen
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Biometrics.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Biometrics Security in Banking Systems Image processing in ATM
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
Presentation transcript:

Biometrics Angela Sasse – Dept of Computer Science

Goals of this lecture What are biometrics? How they are applied Usability and security issues

See http://www.bromba.com for a good FAQ on Biometric jargon biometric = biological or behavioural property of an individual that can be measured and from which distinguishing, repeatable biometric features can be extracted for the purpose of automated recognition of individuals biometric sample = analog or digital representation of biometric characteristics prior to biometric feature extraction process and obtained from a biometric capture device or biometric capture subsystem (raw data) biometric template = stored biometric features, applied to the biometric features of a recognition biometric sample during a comparison to give a comparison result. See http://www.bromba.com for a good FAQ on Biometric jargon

Some basics Verification using ID + biometric, or Enrolment = capture of biometric feature and generation of biometric sample and/or template Full images or templates templates are more efficient Images can be used to reverse-id/create new templates Verification using ID + biometric, or identification (biometric compared to database

Physical/behavioural Fingerprint Finger / Palm Vein Hand geometry Face recognition Iris Retina Earshape Behavioural Voice print Dynamic Signature Recognition (DSR) Typing pattern Gait recognition Heart rate analysis

Enrolment Crucial for security and subsequent performance In some context, identity of enrolee needs to be checked Biometrics enrolled need to be genuine (see attacks) good enough quality to work Enrolment procedure needs to be formalised Staff need to be trained Staff need to be trustworthy or closely checked Time taken to carry out enrolment often under-estimated

FTE FTE (failure to enrol) rate = proportion of people who fail to be enrolled successfully FTAs: users can be enrolled but biometric sample too poor quality to verify Reasons for FTE/FTA Biometric not present or temporarily inaccessible Biometric not sufficiently prominent or stable Problem for Universal Access – may exclude Older users Disabled Equipment may be too difficult to use

FTE in UKPS enrolment trial Face Iris Finger Quota 0.15% 12.30% 0.69% Disabled 2.73% 39% 3.91% UKPS (UK Passport Service) enrolment trial 2004

FAR & FRR FAR (False Acceptance Rate) accepting user who is not registered mistaking one registered user for another High security: FAR of .01% acceptable FRR (False Rejection Rate) – rejecting legitimate user High FRRs reduce usability, high FARs reduce security customer-based applications tend to raise FAR

Performance User performance depends on frequency of use: Frequent users complete faster and with fewer errors, infrequent users need step-by-step guidance and detailed feedback Degree of cooperation Total usage time (not just for matching) Quality of enrolled and presented samples has key impact (e.g. fingerprints 1 or 10 at a time?) Different performance for identification and verification (1-1 verification or 1-many identification)

"We were aiming for it to scan 12 pupils a minute, but it was only managing 5 so has been temporarily suspended as we do not want pupils' meals getting cold while they wait in the queue." Careful balancing of business process requirements and security requirements needed

Average 12-20 seconds, longer with infrequent users Total Usage Process Time quoted by suppliers often only refer to capture of live image & matching Walk up to machine Put down bags, remove hats, etc. Find token (if used) Put on token (if used) Read token Wait for live image to be captured & matched Walk away & free machine for next user Plus average number of rejections & re-tries Average 12-20 seconds, longer with infrequent users

FRR in UKPS enrolment trial Face Iris Finger Quota Time: 30.82% 39 sec 1.75% 58 sec 11.70% 1 min 13 sec Disabled 51.57% 1 min 3 sec 8.22% 1 min 18 sec 16.35% 1 min 20 sec

Performance: Smartgate Sydney Airport Problem: speedy & secure immigration Technology: Face recognition system Users: Quantas air crew (2000) Performance: FAR “less than 1%” FRR 2% “could be faster” (average 12 secs) Several re-designs necessary, including updating of image templates

Example: BKA face recognition trial Railway station with 20,000 passengers/day 2 month trial of 3 systems 200 people on watch list, who passed through every day, making no effort to conceal their identity FAR fixed at .1% (= 23 false alarms/day) Best performing system at under most favourable detected caught 60% (down to 20%)

Usability Issues: Finger Which finger? How to position Where on sensor? Which part of finger? Straight or sideways? Problems: arthritis, long fingernails, handcreme, circulation problems

Which finger?

Finger position?

Usability Issues: Iris What is it – iris or face? One or both eyes? One eye: how to focus? Distance adjustment Positioning “rocking” or “swaying” Glasses and contact lenses about half of population wear them Target area difficult to see when glasses are removed Example: Project IRIS at Heathrow

Focussing

Height adjustment Often not sufficient for very short (under 1.55 m) or very tall (over 2.10) people, or wheelchair users Need to use hand to adjust If card needs to be held, other things users carry or hold need to be put down

Height adjustment

… but users may not realise this … or be reluctant to touch equipment, or think it takes too long

Usability Issues: Face What is it? Where do I stand? Where do I look/what am I looking at? Standing straight, keeping still “Neutral expression” Hats, changes in (facial) hair, makeup

Distance

“Neutral expression”

User Acceptance Issues –Finger Hygiene, Hygiene, Hygiene Association with forensics/criminals Finger chopped off

Liveness detection Detects movement, pulse, blood flow Fitted to several systems, but tends to increase FRR Users: fine, but do the criminals know about it?

User Acceptance Issues - Iris Risk to health (e.g. damage to eyes, triggering epilepsy) Covert medical diagnosis Illnesses (iridology) Pregnancy Drugs “Minority Report” attacks

User Acceptance Issues - Face Covert identification Surveillance/tracking Direct marketing

User Acceptance – General Issues Data protection – threat to  privacy Abuse by employer, commercial organisations, state, or malicious individuals Mission creep Increasing capability of technology – e.g. iris recognition at a distance Integration with other technologies – e.g. RFID Doubts about reliability Sophisticated attackers Can government really keep systems secure? Cheap systems and successful attacks erode confidence

Attacks - Finger Simple Activate latent prints: breathing, bag with warm water Sophisticated Lift print with tape or photograph Gelatine print (gummy bear attack) – lasts 1x Silicone print

CCC strikes again Pay-by-touch system in German supermarket chain Superglue Plastic bottle cap Digital camera PC with laser printer Plastic foil Wood glue Published fingerprint of German Home Secretary

Attacks - Iris Simple Picture of eye stuck on glasses Sophisticated Coloured contact

Attacks - Face Simple Replay attack (Photo or video of person) Glasses with strong frames Sophisticated Mask (Mission Impossible attack) http://www.heise.de/ct/english/02/11/114/bild7.jpg