BIOMETRICS.

Slides:



Advertisements
Similar presentations
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Advertisements

Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
(Biometrics Consortium)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
CS G357: Computer Security, Privacy and Usability Simson L. Garfinkel.
By: Monika Achury and Shuchita Singh
Biometrics 101 You are the Key. A Need for Better Security One person can have a greater negative impact on society than ever before. More individuals.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
 Access to a security vault granted by a retinal scan  A door unlocks as someone approaches, activated by facial recognition  My car door unlocks as.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

BIOMETRICS

What is Biometrics? Something that you know- password, PIN, or personal information such as your mother's maiden name) Something that you have- a card key, smart card, Something that you are- a biometric. Bio= “life”, metro=“measure” (ancient Greek)

Why Biometrics? Biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten. Control for businesses Passwords are not user-friendly Inexpensive implementation Less administration (paperwork, cards, etc.) Saves money (no need for producing keys, etc.)

Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological characteristic or behavioral characteristic.

Uses of Biometrics Simple: Advanced: Verification – Is this who he claims to be? Identification – who is this? Advanced: Detecting multiple identities Patrolling public spaces

Identification Methods Enrollment Biometric data is collected for a known identity Reference template is created and stored Authentication Identification: comparison of biometric data to all available data files in a database Verification: comparison of biometric data to previously stored version

Biometrics

Fingerprint Recognition Identification by using patterns of an individual's fingertips that are unique to that individual. By far the most widely accepted biometric.

Fingerprint Recognition Strengths: Fingerprints don’t change over time Widely believed fingerprints are unique Weaknesses: Scars Attacks: Surgery to alter or remove prints “Gummy fingers” Corruption of the database

Fingerprint Recognition

Face Recognition The identification of a person by their facial image characteristics

Face Recognition Strengths: Weaknesses: Attacks: Database can be built from driver’s license records, visas, etc. Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera

Facial Recognition Process 1) Digitally scan an existing photograph 2) Acquire a live picture of a subject 3) software is used to locate the faces in the image that has been obtained 4) software measures face according to is peaks and valleys (nodal points) 5) the face print created by the software is compared to all face prints the system has stored in its database.

6) software decides whether or not any comparisons from step 4 are close enough to declare a possible match

Voice Recognition: Identification using the features of speech that have been found to differ between individuals

Voice Recognition Strengths: Weaknesses: Attacks: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise (airplanes) No large database of voice samples Attacks: Tape recordings Identical twins / sound alike

Iris Recognition This identification method uses the unique characteristics of the eye.

Iris Recognition Strengths: Weaknesses: Attacks: 300+ characteristics; 200 required for match Weaknesses: Fear Discomfort Proprietary acquisition device Algorithms may not work on all individuals No large databases Attacks: Surgery

Hand Scan Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification

Behavior Biometrics: Handwriting (static & dynamic) Keystroke dynamics

Keystroke Recognition Uses rhythm and manner in which characters are typed into a keyboard Typing characteristics are unique to individuals Indicators Speed in words per minute Delays Specific sequences of characters Typing errors Seek time and hold time

Biometrics are used by: Government Military Schools Commerce Law Enforcement

Examples of Biometrics Usage Governments worldwide use biometrics for passports and airport security. Police agencies use fingerprints and DNA for identification and forensics. Financial institutions use palm/finger vein authentication to secure ATMs. Companies use biometrics to keep time records, secure locations and improve user convenience.

Business Applications Biometric Door entry Secured Safes Computer/Network Logon Employee Time cards U.S. Visit Program Schools

Sample of Applications Voter Registration / Management Driver Licensing Border Control Passport / VISA Welfare / Government Insurance (WIC) Criminal ID / Wanted Persons Lookup Jail Management Airports / Frequent Traveler / Passenger Tracking Check Cashing e-Commerce & Financial Services Identity Theft

Things That Make Biometrics Work Uniqueness - The same trait will not appear in two people Universality - The trait has to occur in many people as possible Permanence - The trait does not change over time Measurability - The trait can be measured with simple technical instruments User friendliness - The trait is easily measured with minimal discomfort

Problems With Biometrics Simple Hygiene of users may create problems with authentication If the person has arthritis, long fingernails, is wearing hand cream or has circulation problems then this will not produce a good reading Around half the population wears glasses or contact lenses

Future of Biometrics Active Advertisement DNA matching the "ultimate" biometric technology which would produce proof-positive identification of an individual. Active Advertisement Advertisements based on who you are National Biometric Database National Database of citizens used for multiple purposes Automobile Security = No more keys, just you

Future of Biometrics

Future…