24
BIOMETRICS - AN AUTHENTICATION

BiomETRICS -

  • Upload
    renjyth

  • View
    229

  • Download
    0

Embed Size (px)

Citation preview

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 1/24

BIOMETRICS - AN AUTHENTICATION

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 2/24

MOVI TO L WORLD

´ ccess to a security vault granted by aretinal scan

´

door unlocks as someone approaches,activated by facial recognition

´ My car door unlocks as I touch the door handle

´ ccessing a computer system by presentinga fingerprint

ound like Holl wood?

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 3/24

BIOMETRI OVERVIEW

The security field uses three different types of identification:

Something You Know ² a password, PIN, or piece

of personal information (such as your mother's maiden name);

Something You Have ² a card key, smart card, or token (like a

ecur I card); and/or Something You Are ²a biometric.

Of these, a biometric is the most secure and convenientauthentication tool. It can't be borrowed, stolen, or forgotten, andforging one is practically impossible. (Replacement part surgery,

by the way, is outside the scope of this presentation.)

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 4/24

W T RE BIOMETRI

Biometrics are automated methods of identifyinga person or verifying the identity of a personbased on a physiological or behavioralcharacteristicPhysiological are related to the shape of the body. Examplesinclude, but are not limited to fingerprint, face recognition, N ,hand and palm geometry, iris recognition, which has largelyreplaced retina, and odor/scent.Behavioral are related to the behavior of a person. Examplesinclude, but are not limited to typing rhythm, and voice. omeresearchers have coined the term behavior metrics for this classof biometrics.

trictly speaking, voice is also a physiological trait because everyperson has a different vocal tract, but voice recognition is mainlybased on the study of the way a person speaks, commonlyclassified as behavioral.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 5/24

BIOMETRI : OPERATION MET OD

 A biometric system can operate in the following two modes:

Verification ± A one to one comparison of a captured biometricwith a stored template to verify that the individual is who he

claims to be. an be done in conjunction with a smart card,username or ID number.

Identification ± A one to many comparison of the capturedbiometric against a biometric database in attempt to identify anunknown individual. The identification only succeeds in identifying

the individual if the comparison of the biometric sample to atemplate in the database falls within a previously set threshold.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 6/24

ENROLLMENT 2 VERIFI ATION

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 7/24

Characteristics of a biometric that must be present in order to use the

system for authentication purposes

Uniqueness - The same trait will not appear in two people

Universality - The trait has to occur in many people aspossible

Permanence - The trait does not change over time

Measurability - The trait can be measured with simple technicalinstruments

User friendliness - The trait is easily measured with minimaldiscomfort

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 8/24

B ASI BLOCK DI AGRAM OF  A BIOMETRIC SYSTEM

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 9/24

USES FOR BIOMETRICS

Biometric-based authentication applications include workstationand network access, single sign-on, application logon, dataprotection, remote access to resources, transaction security, and

eb security and more.

Biometric Needs ModelPhysical Security: Access to a physical location such as abuilding or room.

Cyber Security: Access to an organization¶s network through a

biometrically authenticated login schema.Transactional Security: Any monetary transaction whichbiometrically authenticates, accesses, and atomically debits or credits the user¶s account

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 10/24

 ACTIVE VS PASSIVE

Biometrics can also be defined as either Passive, or  Active.

Passive biometrics do not require a users active participation and canbe successful without a person even knowing that they have beenanalyzed.

Active biometrics however, do require a person cooperation and will notwork if they deny their participation in the process.

Active

 All finger print technologies, Hand geometry technologies, Retinascanning technologies, Signature recognition technologies, «««

PassiveVoice recognition technologies, Iris recognition technologies, acialrecognition technologies, ««««..

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 11/24

TYPES«..

Fingerprint Recognition: Identification by using patterns of friction ridgesand valleys on an individual's fingertips are unique to that individual. Byfar the most widely accepted biometric.

Face Recognition: The identification of a person by their facial imagecharacteristics

Voice Recognition: Identification using the acoustic features of speechthat have been found to differ between individualsIris/Retinal Recognition: This identification method uses the unique

characterizes of the eyeHand and Finger Geometry: Identification by measuring either physical

characteristics of the fingers or the handsSignature Verification: Identification using the dynamic analysis of a

signature to authenticate a personVenial Recognition: A system for Identification using a persons unique

vein patternsPalm Print Recognition: Uses the lines on one's palm to identify an

individual (similar to fingerprint recognition)

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 12/24

MULTI MOD AL

Multimodal biometric systems are those that utilize more than onephysiological or behavioral characteristic for enrollment, verification, or authentication.

Multi-modal biometric systems are looked to as a means of 

(1) reducing false non-match and false match rates,( ) providing a secondary means of enrollment, verification, and

identification if sufficient data cannot

be acquired from a given biometric sample, and

(3) combating attempts to spoof biometric systems

through non-live data sources such as fake fingers.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 13/24

W Y USE BIOMETRICS 

´ Convene for users.

´ Control for businesses.

´ Inexpensive implementation.

´ Price/Performance curves dropping.

´ Saves money (i.e., no need for producing keys, etc.)

´ Accountability/Non-Repudiation

´ Improved identification (i.e., authentication, verification, impersonation).

´ Improved audit trail.

´ ess administration (i.e., paperwork, cards, etc.)

´ More security??

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 14/24

BUSINESS  APPLICATION

´ Biometric oor entry´ Secured Safes´ Computer/Network Logon´ Employee Time cards´ Schools and Universities´ Voter Registration / Management´ river Licensing´ Border Control´ Passport / VISA

´ Welfare / Government Insurance (WIC)´ Criminal I / Wanted Persons Lookup

´ Jail Management´ Airports / requent Traveler / Passenger Tracking´ Check Cashing´ E Commerce & inancial Services

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 15/24

FUTURE OF BIOMETRICS

DNA matching : The "ultimate" biometric technology which wouldproduce proof-positive identification of an individual. Thistechnology is still not considered a "biometric" technology and isyears away from any kind of implementation. It is also very

intrusive for the user.Active Advertisement : Advertisements based on who you are

National Biometric Database (NBDb) :National atabase of citizens used for multiple purposes

Automobile Security: No more keys, just you

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 16/24

CONTROLLING T E  UMAN F ACTOR OFBIOMETRICS

Users may become uncooperative if systemslimitations are not tested

´ Simple ygiene of users may create problems with authentication

´ If the person has arthritis, long fingernails, is wearing hand creamor has circulation problems then this will not produce a goodreading

´ Around half the population wears glasses or contact lenses.

´ People age

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 17/24

MAINSTREAM ISSUES IN BIOMETRICS

´ Personal Privacy´ Physical Privacy´ Religious Objections´ System attack vulnerabilities (e.g. denial of service)´ Insider threat´ Hacking´ Spoofing´ Operational vulnerabilities (e.g. distraction and vigilance)

´ ace´ Skin texture and reflectance´ Speaker I´ NA

´ Template aging´ Simulation, e.g., synthetic aging

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 18/24

COUNTRIES  APPLYING BIOMETRICS

United States - The United States government has become astrong advocate of biometrics with the increase in fear of terrorism since September 11, 001. The BI is currentlyspending $1 billion to create a new biometric database, which willstore NA, fingerprints, and other biometric data. The computers

running the database will be contained in an underground facilityabout the size of a football field. The Information ProcessingTechnology Office, ran a program known as Human Identificationat a istance which developed technologies that are capable of identifying a person at up to 500 ft by their facial features. The US

Department of  Defense (DoD) Common Access Card, is an ID

card issued to all US Service personnel and contractors on US

Military sites. This card contains biometric data and digitizedphotographs.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 19/24

Germany - The biometrics market in Germany will experience

enormous growth until 009. ³The market size will increase fromapproximately 1 million ¼ ( 004) to 377 million ¼´ ( 009). ³The federalgovernment will be a major contributor to this development´. In

particular, the biometric procedures of fingerprint and facial recognitioncan profit from the government project. In May 005 the German Upper House of Parliament approved the implementation of the ePass, apassport issued to all German citizens which contain biometrictechnology. The ePass has been in circulation since November 005,and contains a chip that holds a digital photograph and one fingerprintfrom each hand

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 20/24

Brazil - Since the beginning of the 0th century, Brazilian citizens havehad user ID cards. The decision by the Brazilian government to adoptfingerprint-based biometrics.Iraq - Biometrics are being used extensively in Iraq to catalogue asmany Iraqis as possible providing Iraqis with a verifiable identificationcard, immune to forgery. During account creation, the collected

biometrics information is logged into a central database which thenallows a user profile to be created. Even if an Iraqi has lost their I D card,their identification can be found and verified by using their uniquebiometric information. Additional information can also be added to eachaccount record, such as individual personal history.Australia - Visitors intending to visit Australia may soon have to submitto biometric authentication as part of the Smartgate system, linking

individuals to their visas and passports. Biometric data are alreadycollected from some visa applicants by Immigration. Australia is the firstcountry to introduce a Biometrics Privacy Code. The Code includesprivacy standards that are at least equivalent to the Australian NationalPrivacy Principles (NPPs) in the Privacy Act and also incorporateshigher standards of privacy protection in relation to certain acts andpractices.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 21/24

India

India has planned an ambitious mega project. To provide a unique

identification number to each of its 1. 5 billion people. The Identification

number will be stored in a central databases. consisting the biometricinformation of the individual. If implemented. This would be the biggestimplementation of the Biometrics in the world.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 22/24

CONCLUSION

Biometrics comprises methods for uniquely recognizing humans basedupon one or more intrinsic physical or behavioral traits. In informationtechnology, in particular, biometrics is used as a form of identity accessmanagement and access control. It is also used to identify individuals in

groups that are under surveillance.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 23/24

Queries if any««.

8/9/2019 BiomETRICS -

http://slidepdf.com/reader/full/biometrics- 24/24

Presented by Renjith. S.

Thank you for one & all «««..