Presentation is loading. Please wait.

Presentation is loading. Please wait.

Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006.

Similar presentations


Presentation on theme: "Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006."— Presentation transcript:

1 Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006

2 Outline Biometric Basics What is Biometrics? Why use Biometrics? Model of Biometric system Types of Biometrics Evaluating Accuracy User Acceptance Advantages & Disadvantages

3 Biometrics Derived from the Greek words “Bio”: Life “Metric”: to measure Measures and Analyzes characteristics Physiological Behavioral Authentication

4 2 major means for authentication Identification Verification Identification vs. Verification Question raised Analysis Uses

5 Biometric Components

6 Types of Biometrics Physiological Fingerprints Face Eyes DNA Behavioral Voice Keystroke

7 Fingerprinting

8 Face

9 Eyes

10 DNA

11 Voice

12 Key Stroke Requires no special hardware Methods are transparent to users increasing user acceptance Can be used for cryptographically stronger secrets for login and encryption

13 Accuracy Usability Metrics Failure to Enroll (FTE) Failure to Acquire (FTA) Performance Metrics False Acceptance Rates (FAR) False Rejection Rates (FRR)

14 Usability Metrics Failure to enroll (FTE) Medicine Intake Hoarseness Sticky fingers Cataract Rare skin diseases Failure to acquire (FTA) Smudged finger prints Retina alignment Mumbling Hand positioning

15 Performance Metrics

16 User Acceptance Socially acceptable Knowledge of technology and computers Acceptance of the concept Usability Security Personal privacy

17 Usability Considerations Familiarity with characteristics Experience with devices Environment of use Transaction Criticality

18 Security Considerations Biometrics are not secrets and are therefore susceptible to modified or spoofed measurements There is no recourse for revoking a compromised identifier Strategic Solutions Liveness testing Multi-biometrics

19 Privacy Considerations A reliable biometric system provides an irrefutable proof of identity Threatens individuals right to anonymity Cultural concerns Religious concerns Violates civil liberties Strategic Solutions Biometric cryptosystems Transparency

20 Advantages Reduces cost within organizations Increases security Competitive advantage Convenience to employees Non-repudiation Eliminates a paper trail

21 Disadvantages Accuracy of Performance Failure to enroll rate Information Abuse May violate privacy

22 Conclusion Biometrics is a technology that can simplify the process of authentication Biometrics can be best used in situations where specific identity or exception identity is desired

23 References Tynan, Dan, “Biometrics: from Reel to Real” www.pcworld.com/resource/printable/article/o,aid,120889,00.asp www.pcworld.com/resource/printable/article/o,aid,120889,00.asp Yudkowsky, Chaim, “Byte of Success”, http://accounting.smartpros.com/x40536.xml http://accounting.smartpros.com/x40536.xml http://perso.wanadoo.fr/fingerchip/biometrics/movies.htm Biometrics http://searchsecurity.techtarget.com/sdefinition/0,,sid14_gci211666,00.h tml http://searchsecurity.techtarget.com/sdefinition/0,,sid14_gci211666,00.h tml International Biometric Group, http://www.biometricgroup.com/reports/public/reports/ http://www.biometricgroup.com/reports/public/reports/ Patrick, Andrew S., “Usability and Acceptability of Biometric Security Systems”, Institute for Information Technology National Research Council Biometric Assessment Benefits http://www.ax- sbiometrics.com/riskans.htmhttp://www.ax- sbiometrics.com/riskans.htm Bioidentification http://www.bromba.com/faq/biofaqe.htmhttp://www.bromba.com/faq/biofaqe.htm Fact sheet http://www.jrc.cec.eu.int/download/press/20050330_biometrics_fact_sheet.pdf http://www.jrc.cec.eu.int/download/press/20050330_biometrics_fact_sheet.pdf


Download ppt "Usable Biometrics Ashley Brooks Usability and Privacy 95-899 Cranor, Reiter, and Hong April 11, 2006."

Similar presentations


Ads by Google