Presentation is loading. Please wait.

Presentation is loading. Please wait.

Biometrics , Computer & Network Security 1

Similar presentations


Presentation on theme: "Biometrics , Computer & Network Security 1"— Presentation transcript:

1 Biometrics 6.857 6.857, Computer & Network Security 1
Basics Warnings Fingerprint Example 1 6.857

2 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. 2 6.857

3 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric Authentication: technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. voice facial patterns irises typing patterns gait photo 3 6.857

4 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 4 6.857

5 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 5 6.857

6 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 6 6.857

7 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 7 6.857

8 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 8 6.857

9 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 9 6.857

10 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 10 6.857

11 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 11 6.857

12 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature Biometric authentication has been around since the beginning of human interaction. voice facial patterns irises typing patterns gait photo 12 6.857

13 Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 13 6.857

14 Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 14 6.857

15 Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 15 6.857

16 lossy image compression
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 16 6.857

17 lossy image compression
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… voice lossy image compression facial patterns irises typing patterns gait photo 17 6.857

18 Biometrics But databases make it interesting… Connecticut DMV
6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 18 6.857

19 Biometrics But databases make it interesting… Connecticut DMV
6.857, Computer & Network Security Basics Warnings Fingerprint Example Connecticut DMV hand measurements fingerprints retinas signature But databases make it interesting… voice facial patterns irises typing patterns gait photo 19 6.857

20 Biometrics But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice facial patterns irises typing patterns gait photo 20 6.857

21 Biometrics ? = But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 21 6.857

22 Biometrics ? = But databases make it interesting… hand measurements
6.857, Computer & Network Security Basics Warnings Fingerprint Example hand measurements fingerprints retinas signature But databases make it interesting… Disney World voice = ? facial patterns irises typing patterns gait photo 22 6.857

23 Biometrics 6.857 6.857, Computer & Network Security 23
Basics Warnings Fingerprint Example 23 6.857

24 Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! 24 6.857

25 Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! You brazenly trot your face, eyes, hands, fingerprints, gait, and signature out in public on a daily basis. (unless you are a hermit) 25 6.857

26 Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password 26 6.857

27 Biometrics Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access 27 6.857

28 Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone 28 6.857

29 Biometrics are not secret keys!
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are not secret keys! Remote system where I mail a photo and get password Thumbprint scanner to grant me remote access Faxing a signed consent form to tell me password over phone Problem with Connecticut DMV 29 6.857

30 Biometrics Biometrics are UIDs 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs 30 6.857

31 Very useful with trusted path from subject to verifier…
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… 31 6.857

32 Biometrics Biometrics are UIDs
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… 32 6.857

33 Biometrics Biometrics are UIDs
6.857, Computer & Network Security Basics Warnings Fingerprint Example Biometrics are UIDs Very useful with trusted path from subject to verifier… requires (probably) human observation… no longer very automated. Oh well. 33 6.857

34 Case Study: Fingerprint Authentication
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Case Study: Fingerprint Authentication 34 6.857

35 Biometrics 6.857 6.857, Computer & Network Security 35
Basics Warnings Fingerprint Example 35 6.857

36 Biometrics capture 6.857 6.857, Computer & Network Security 36
Basics Warnings Fingerprint Example capture 36 6.857

37 Biometrics capture optical 6.857 6.857, Computer & Network Security 37
Basics Warnings Fingerprint Example capture optical 37 6.857

38 Biometrics capture capacitive 6.857 6.857, Computer & Network Security
Basics Warnings Fingerprint Example capture capacitive 38 6.857

39 Biometrics capture ultrasonic 6.857 6.857, Computer & Network Security
Basics Warnings Fingerprint Example capture ultrasonic 39 6.857

40 Biometrics capture “Live and Well” Sanity Check 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture “Live and Well” Sanity Check 40 6.857

41 Biometrics capture feature extraction 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction 41 6.857

42 Biometrics capture feature extraction Pattern matching
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction Pattern matching * Keep (oriented) image 42 6.857

43 Biometrics capture feature extraction or Minutia vectors 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) or Minutia vectors 43 6.857

44 Biometrics capture feature extraction or Minutia vectors bifurcation
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction (type, x, y, θ, W) or Minutia vectors bifurcation ridge ending short ridge 44 6.857

45 Biometrics capture feature extraction compare or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) or 45 6.857

46 Biometrics capture feature extraction compare or Pattern matching
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) or Pattern matching 46 6.857

47 Biometrics capture feature extraction compare or Vector comparison
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) (type, x, y, θ, W) or Vector comparison * e.g., 7-20 out of are close. 47 6.857

48 Biometrics capture feature extraction compare result or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example capture feature extraction compare (type, x, y, θ, W) result or 48 6.857

49 Biometrics Enrollment capture feature extraction or 6.857
6.857, Computer & Network Security Basics Warnings Fingerprint Example Enrollment capture feature extraction (type, x, y, θ, W) or 49 6.857

50 Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 50 6.857

51 Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger Other stuff (hack the software, blind the sensor, walk in behind someone else, kick in the door…) 51 6.857

52 Risk Analysis (from Matsumoto Paper)
Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example Risk Analysis (from Matsumoto Paper) Registered finger (at gunpoint) Use an un-registered finger Severed registered finger Genetic Clone of registered finger Artificial clone of registered finger T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. 52 6.857

53 Biometrics 6.857, Computer & Network Security Basics Warnings Fingerprint Example T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, “Impact of Artificial ‘Gummy’ Finders on Fingerprint Systems.” Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Slides from Matsumoto talk showing the construction of a ‘gummy finger’… 53 6.857

54 Biometrics Conclusion 6.857 6.857, Computer & Network Security 54
Basics Warnings Fingerprint Example Conclusion 54 6.857

55 Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. 55 6.857

56 Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. 56 6.857

57 Biometrics Conclusion
6.857, Computer & Network Security Basics Warnings Fingerprint Example Conclusion Trade convenience of use for complexity of safety analysis. Hard to remember a secret random sequence of 20 digits…but easy to analyze its security. Easy to stick your finger on a scanner and have it extract 20 digits worth of information…but hard to analyze its security. 57 6.857


Download ppt "Biometrics , Computer & Network Security 1"

Similar presentations


Ads by Google