Upload
others
View
12
Download
0
Embed Size (px)
Citation preview
Biometric Inaccuracies
Project Team 9: Tanner Ellenberger and Grant Miller
Overview● History● Types of biometrics, how they work● Overall effectiveness ● Risks/Downsides (problem)● Known alternatives● Our solution
History● Biometrics used since 500 B.C by Babylonian merchants
for transactions
● Bertillon System was used in mid 1800s to measure
various body dimensions
● Henry System implemented in late 1800s to include
fingerprints of inmates
● Biometrics we see today were not implemented until late
90s, early 2000’s
How Biometrics Work
1. Proper recording/scanning device records initial
appropriate biometric input
2. System turns biometric input into storable data
3. User seeking access presents biometric input to device
4. Device compares new input to original stored input
5. If new input matches original stored input, access granted
Popular Types of Biometrics
● Fingerprint● Retina● Iris● Facial● Voice● Signature
Effectiveness
● Convenient, easy to use● Very unique● Always with you● Easy to implement
Risks/Downsides● Cannot change your DNA if compromised ● Lack of privacy● Users can be forced to use their biometric with physical force● Can be manipulated
Alternatives
● Password/Passphrase
● Personal Device Check
● Two-Factor
● Two-Step
● Randomly Generated Codes
Solution● AI.Lock
● User takes picture of unique object or scene (reference image)
● Must take picture of same object/scene for authorization (candidate image)
● Only stores a hash of the image
Conclusion● Biometric History● How biometrics work ● Types of biometrics● Effectiveness of biometrics● Risks of Biometrics● Biometric Alternatives● Our Solution
Works CitedAzimpourkivi, et al. “A Secure Mobile Authentication Alternative to Biometrics.” [1402.1128] Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition, 7 Dec. 2017, arxiv.org/abs/1712.02483.
Yang, Kai, et al. “Consent Biometrics.” Neurocomputing, vol. 100, 2013, pp. 153–162., doi:10.1016/j.neucom.2011.12.044.
Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number (The Implementation of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4:129. doi:10.4172/2165-7866.1000129
Shahnewaz, Shaon. “The Top Seven Advantages of a Biometric Identification Management System”. M2SYS. Apr 4, 2016. Web. Jun 24, 2018.
Mayhew, S. (2018, March 21). History of Biometrics. Retrieved from https://www.biometricupdate.com/201802/history-of-biometrics-2
Penny, Wayne. “Biometrics: A Double Edged Sword - Security and Privacy”. SANS Institute. 2002. Web. Jun 24, 2018.
Questions ?