1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRIC VOTING SYSTEM
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi.
(Biometrics Consortium)
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
Authentication What you know? What you have? What you are?
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
SUBMITTED BY ATHIRA BALAKRISHNAN
Challenge/Response Authentication
Authentication.
FACE RECOGNITION TECHNOLOGY
Biometrics.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only selected information to different access devices

2 Figure 2-8: Access Cards Tokens  Small device with constantly-changing password  Or device that can plug into USB port or another port RFIDs (Radio-Frequency IDs)  Can be detected and tested without physical contact  Allows easier access; used in Tokyo subways New

3 Figure 2-8: Access Cards Card Cancellation  Requires a central system PINs  Personal Identification Numbers  Short: about 4 digits  Can be short because attempts are manual (10,000 combinations to try with 4 digits)  Should not choose obvious combinations (1111, 1234) or important dates  Provide two-factor authentication

4 Figure 2-9: Biometric Authentication Biometric Authentication  Authentication based on body measurements and motions  Because you always bring your body with you Biometric Systems (Figure 2-10)  Enrollment  Later access attempts  Acceptance or rejection

5 Figure 2-10: Biometric Authentication System 1. Initial Enrollment 2. Subsequent Access User Lee Scanning Applicant Scanning Template Database Brown Lee Chun Hirota … 3. Match Index Decision Criterion (Close Enough?) Processing (Key Feature Extraction) A=01, B=101, C=001 User Lee Template ( ) User Access Data ( ) Processing (Key Feature Extraction) A=01, B=111, C=001

6 Figure 2-9: Biometric Authentication Verification Versus Identification  Verification: Are applicants who they claim to be? (compare with single template)  Identification: Who is the applicant? (compare with all templates) More difficult than verification  Verification is good for replacing passwords in logins  Identification is good for door access and other situations where entering a name would be difficult

7 Figure 2-9: Biometric Authentication Precision  False acceptance rates (FARs): Percentage of unauthorized people allowed in Person falsely accepted as member of a group Person allowed through a door who should be allowed through it Very bad for security

8 Figure 2-9: Biometric Authentication Precision  False rejection rates (FRRs): Percentage of authorized people rejected Valid person denied door access or server login Can be reduced by allowing multiple access attempts High FRRs will harm user acceptance

9 Figure 2-9: Biometric Authentication Precision  Vendor claims for FARs and FRRs tend to be exaggerated because they often perform tests under ideal circumstances  For instance, having only small numbers of users in the database  For instance, by using perfect lighting, extremely clean readers, and other conditions rarely seen in the real world

10 Figure 2-9: Biometric Authentication User Acceptance is Crucial  Strong user resistance can kill a system  Fingerprint recognition may have a criminal connotation  Some methods are difficult to use, such as Iris recognition, which requires the eye to be lined up carefully. These require a disciplined group

11 Figure 2-9: Biometric Authentication Biometric Methods  Fingerprint recognition Simple, inexpensive, well-proven Weak security: can be defeated fairly easily with copies Useful in modest-security areas  Face recognition Can be put in public places for surreptitious identification (identification without citizen or employee knowledge). More later.

12 Figure 2-9: Biometric Authentication Biometric Methods  Iris recognition Pattern in colored part of eye Very low FARs Somewhat difficult to use: must line up eye exactly or will be rejected High FRR if eye is not lined up correctly can harm acceptance Hand geometry: shape of hand  Voice recognition High error rates Easy to fool with recordings

13 Figure 2-9: Biometric Authentication Biometric Methods  Keystroke recognition Rhythm of typing Normally restricted to passwords Ongoing during session could allow continuous authentication  Signature recognition Pattern and writing dynamics

14 Figure 2-9: Biometric Authentication Biometric Standards  Almost no standardization  Worst for user data (fingerprint feature databases)  Get locked into single vendors

15 Figure 2-9: Biometric Authentication Can Biometrics be Fooled?  Airport face recognition mostly has false positives 4-week trial of face recognition at Palm Beach International Airport Only 250 volunteers in the user database (unrealistically small) Volunteers were scanned 958 times during the trial Only recognized 455 times! Recognition rate fell if wore glasses (especially tinted), looked away Would be worse with larger database Would be worse if photographs were not good

16 Figure 2-9: Biometric Authentication Can Biometrics be Fooled?  DOD Tests indicate poor acceptance rates when subjects were not attempting to evade 270-person test Face recognition recognized person only 51 percent of time Iris recognition only recognized 94 percent of the time. Other research has shown that evasion is often successful for some methods German c’t magazine fooled most face and fingerprint recognition systems Prof. Matsumoto fooled fingerprint scanners 80 percent of the time with a gelatin finger created from a latent (invisible to the naked eye) print on a drinking glass