SlideShare uma empresa Scribd logo
1 de 24
Biometrics Sensors


Submitted by:- Sukhdeep Singh Sidhu
         Roll No. :- 115363
         Branch:- CSE N2
   Authentication – the process of verifying that a
    user requesting a network resource is who he,
    she, or it claims to be, and vice versa.

   Conventional authentication methods
    › „something that you have“ – key, magnetic card or
      smartcard
    › „something that you know“ – PIN or password

   Biometric authentication uses personal features
    › „something that you are“
Contents
   Application domains for biometric products

   Biometric products
       Fingerprint recognition
       Face recognition
       Iris recognition
       Retinal recognition
       Hand geometry measurement
       Dynamic signature verification

   How good are biometric products today?

   Conclusions
   Access control
    › to devices
        cellular phones
        logging into a computer, laptop, or PDA
        cars
        guns
    › to local services
        debitting money from a cash dispenser
        logging in to computer
        accessing data on smartcard
    › to remote services
        e-commerce
        e-business
   Physical access control
    › to high security areas
    › to public buildings or areas
 Time & attendance control
 Identification
    › forensic person investigation
    › social services applications, e.g. immigration or
      prevention of welfare fraud
    › personal documents, e.g. electronic drivers
      license or ID card
   Sensors
    › optical sensors
    › ultrasound sensors
    › chip-based sensors
    › thermal sensors
   Integrated products
    › for identification – AFIS systems
    › for verification
Electro-optical sensor
                                   [DELSY® CMOS sensor modul]


   Optical fingerprint sensor
[Fingerprint Identification Unit
     FIU-001/500 by Sony]




                                          Capacitive sensor
                                      [FingerTIP™ by Infineon]
Thermal sensor
                            [FingerChip™ by ATMEL
                              (was: Thomson CSF)]

      E-Field Sensor
[FingerLoc™ by Authentec]
[BioMouse™ Plus by American Biometric Company]




Physical Access Control System
 [BioGate Tower by Bergdata]                  [ID Mouse by Siemens]
Keyboard [G 81-12000
                                             by Cherry]




                                      System including
[TravelMate 740 by Compaq und Acer]   fingerprint sensor,
                                      smartcard reader and
                                      display by DELSY
Face recognition system
[TrueFace Engine by Miros]


                                           Face recognition system
                      [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r




S y s t e m f o r a c t iv e ir is
r e c o g n it io n b y Ir is S c a n
Retinal recognition system [Icam 2001 by Eyedentify]
Hand geometry reader by Recognition Systems


        Hand geometry reader for
two finger recognition by BioMet Partners
Electronic pen [LCI-SmartPen]
Digitising tablet by   Digitising tablet [Hesy Signature Pad
Wacom Technologies       by BS Biometric Systems GmbH]
   Combination of biometric technologies
    › Fingerprint and face recognition
    › Face recognition and lip movement
    › Fingerprint recognition and dynamic signature
     verification



 increase the level of security achieved by
  the system
 enlarge the user base
   depends on the application
     reliability
     security
     performance
     cost
     user acceptance
     life detection
     users that are unsuitable
     size of sensor
   How can we find out, how good a biometric
    product is?
    › Empirical tests of the product
   In the past year, there were two
    independent test series of biometric products
    › in Japan
    › in Germany
1.   Regular biometric sensor
     using artificially generated
     biometric data

3.   Replay attack of
     eavesdropped biometric
     data

5.   Manipulation of stored
     biometric reference data
 Tsutomu Matsumoto, a Japanese
  cryptographer working at Yokohama
  National University
 11 state-of-the-art fingerprint sensors
 2 different processes to make gummy fingers
    › from live finger
    › from latent fingerprint

 Gummy       fingers fooled fingerprint sensors 80%
    of the time
 Computer magazine c’t
 11 biometric sensors
    › 9 fingerprint sensors,
    › 1 face recognition system, and
    › 1 iris scanner
   Fingerprint sensors –
    › reactivate latent fingerprints (optical and capacitive
      sensors)
    › apply latex finger (thermal sensor)
   Face recognition system –
    › down- (up-) load biometric reference data from (to) hard
      disk
    › no or only weak life detection
   Iris recognition –
    › picture of iris of enrolled person with cut-out
      pupil, where a real pupil is displayed


 All tested biometric systems could be fooled,
    but the effort differed considerably
   Biometric technology has great potential
   There are many biometric products around,
    regarding the different biometric technologies
   Shortcomings of biometric systems due to
    › manufacturers ignorance of security concerns
    › lack of quality control
    › standardisation problems

   Biometric technology is very promising
   Manufacturers have to take security concerns
    serious

Mais conteúdo relacionado

Mais procurados (20)

Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 

Destaque

Nano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileNano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileRishu Mishra
 
optical nanosensors
optical nanosensorsoptical nanosensors
optical nanosensorsAhtirma Shan
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and InnovationsMarta Rauch
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Smart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSmart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSukanta Bhattacharyya
 
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareBio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareJeffrey Funk
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Nanosensors basics, design and applications
Nanosensors basics, design and applicationsNanosensors basics, design and applications
Nanosensors basics, design and applicationsUniversity of Technology
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde9527604481
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
Modern irrigation techniques
Modern irrigation techniquesModern irrigation techniques
Modern irrigation techniquesJatin Agarwal
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 

Destaque (18)

BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Nano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileNano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf file
 
Retina scan
Retina scanRetina scan
Retina scan
 
10 nanosensors
10 nanosensors10 nanosensors
10 nanosensors
 
optical nanosensors
optical nanosensorsoptical nanosensors
optical nanosensors
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and Innovations
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Smart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSmart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta Bhattacharyya
 
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareBio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Nanosensors basics, design and applications
Nanosensors basics, design and applicationsNanosensors basics, design and applications
Nanosensors basics, design and applications
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
7 nanosensors
7 nanosensors7 nanosensors
7 nanosensors
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
Modern irrigation techniques
Modern irrigation techniquesModern irrigation techniques
Modern irrigation techniques
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 

Semelhante a Biometric Sensors

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airportCheapticketsSG
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 

Semelhante a Biometric Sensors (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 

Mais de parmsidhu

open source technology
open source technologyopen source technology
open source technologyparmsidhu
 
C++ Introduction
C++ IntroductionC++ Introduction
C++ Introductionparmsidhu
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 

Mais de parmsidhu (6)

open source technology
open source technologyopen source technology
open source technology
 
C++ Introduction
C++ IntroductionC++ Introduction
C++ Introduction
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Parm
ParmParm
Parm
 
Parm
ParmParm
Parm
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Biometric Sensors

  • 1. Biometrics Sensors Submitted by:- Sukhdeep Singh Sidhu Roll No. :- 115363 Branch:- CSE N2
  • 2. Authentication – the process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa.  Conventional authentication methods › „something that you have“ – key, magnetic card or smartcard › „something that you know“ – PIN or password  Biometric authentication uses personal features › „something that you are“
  • 3. Contents  Application domains for biometric products  Biometric products  Fingerprint recognition  Face recognition  Iris recognition  Retinal recognition  Hand geometry measurement  Dynamic signature verification  How good are biometric products today?  Conclusions
  • 4. Access control › to devices  cellular phones  logging into a computer, laptop, or PDA  cars  guns › to local services  debitting money from a cash dispenser  logging in to computer  accessing data on smartcard › to remote services  e-commerce  e-business
  • 5. Physical access control › to high security areas › to public buildings or areas  Time & attendance control  Identification › forensic person investigation › social services applications, e.g. immigration or prevention of welfare fraud › personal documents, e.g. electronic drivers license or ID card
  • 6. Sensors › optical sensors › ultrasound sensors › chip-based sensors › thermal sensors  Integrated products › for identification – AFIS systems › for verification
  • 7. Electro-optical sensor [DELSY® CMOS sensor modul] Optical fingerprint sensor [Fingerprint Identification Unit FIU-001/500 by Sony] Capacitive sensor [FingerTIP™ by Infineon]
  • 8. Thermal sensor [FingerChip™ by ATMEL (was: Thomson CSF)] E-Field Sensor [FingerLoc™ by Authentec]
  • 9. [BioMouse™ Plus by American Biometric Company] Physical Access Control System [BioGate Tower by Bergdata] [ID Mouse by Siemens]
  • 10. Keyboard [G 81-12000 by Cherry] System including [TravelMate 740 by Compaq und Acer] fingerprint sensor, smartcard reader and display by DELSY
  • 11. Face recognition system [TrueFace Engine by Miros] Face recognition system [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
  • 12. S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r S y s t e m f o r a c t iv e ir is r e c o g n it io n b y Ir is S c a n
  • 13. Retinal recognition system [Icam 2001 by Eyedentify]
  • 14. Hand geometry reader by Recognition Systems Hand geometry reader for two finger recognition by BioMet Partners
  • 16. Digitising tablet by Digitising tablet [Hesy Signature Pad Wacom Technologies by BS Biometric Systems GmbH]
  • 17. Combination of biometric technologies › Fingerprint and face recognition › Face recognition and lip movement › Fingerprint recognition and dynamic signature verification  increase the level of security achieved by the system  enlarge the user base
  • 18. depends on the application  reliability  security  performance  cost  user acceptance  life detection  users that are unsuitable  size of sensor
  • 19. How can we find out, how good a biometric product is? › Empirical tests of the product  In the past year, there were two independent test series of biometric products › in Japan › in Germany
  • 20. 1. Regular biometric sensor using artificially generated biometric data 3. Replay attack of eavesdropped biometric data 5. Manipulation of stored biometric reference data
  • 21.  Tsutomu Matsumoto, a Japanese cryptographer working at Yokohama National University  11 state-of-the-art fingerprint sensors  2 different processes to make gummy fingers › from live finger › from latent fingerprint  Gummy fingers fooled fingerprint sensors 80% of the time
  • 22.  Computer magazine c’t  11 biometric sensors › 9 fingerprint sensors, › 1 face recognition system, and › 1 iris scanner  Fingerprint sensors – › reactivate latent fingerprints (optical and capacitive sensors) › apply latex finger (thermal sensor)  Face recognition system – › down- (up-) load biometric reference data from (to) hard disk › no or only weak life detection
  • 23. Iris recognition – › picture of iris of enrolled person with cut-out pupil, where a real pupil is displayed  All tested biometric systems could be fooled, but the effort differed considerably
  • 24. Biometric technology has great potential  There are many biometric products around, regarding the different biometric technologies  Shortcomings of biometric systems due to › manufacturers ignorance of security concerns › lack of quality control › standardisation problems  Biometric technology is very promising  Manufacturers have to take security concerns serious

Notas do Editor

  1. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  2. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  3. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  4. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 PDA = Personal Digital Assistant
  5. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 For example, a system for physical access control has been used at the Olympic Games in Atlanta. fingerprint recognition has been used in forensic applications since early 20 th century. ID cards based on fingerprint recognition are used in Brunei.
  6. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 AFIS = Automated Fingerprint Identification System
  7. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors by DELSY and Infineon are chip-based. A picture of an ultrasound fingerprint sensor [by UltraScan] was not available.
  8. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensor by Authentec is chip-based.
  9. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 BioMouse ™ Plus: integrated smartcard reader and fingerprint sensor ID Mouse: mouse with fingerprint sensor
  10. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Cherry keyboard: with integrated smartcard reader and fingerprint sensor
  11. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Sensors are standard off-the-shelf cameras. Therefore, the price of a face recognition system is determined solely by the software. This makes face recognition quite cost effective. TrueFace Engine: feedback for focussing the face on PC monitor One-to-One ™: feedback for focussing the face using mirrored camera
  12. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 IrisScan: In an active system, the user has to focus the iris into the corresponding frame (displayed on the computer monitor) him/herself. Sensar: In a passive system, the sensor focusses the biometric feature itself.
  13. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 To our knowledge, there is only one manufacturer of retinal recognition systems.
  14. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Hand geometry reading has been used at the Olympic Games in Atlanta to monitor access to the Olympic village.
  15. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The pen measures pressure and tilt.
  16. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors are incorporated into the tablet.
  17. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 „ increase the level of security achieved by the system“ by using two or more biometric methods in conjunction. „ enlarge the user base“ by giving the user an alternative.
  18. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Reliability: Some sensors are more vulnerable than others. Security: The error rates of different biometric technologies vary a lot. For example, iris recognition systems have an error rate in the order of 1 in 1 million users, fingerprint recognition systems have an error rate in the order of 1 in 1000 to 1 in 10000 and speaker recognition systems or dynamic signature verification systems have an error rate in the order of 1 in 100. Cost: Some biometric methods do not require specific sensor technology, for example speaker recognition, face recognition and keystroke dynamics, whereas other require sophisticated sensor technology. Hence, the costs vary a lot. User acceptance: For example, retinal recognition systems have a very low user acceptance, whereas others, like dynamic signature verification, face recognition, and speaker recognition are widely accepted. Life detection: Life detection is a very important feature of any biometric system. There are biometric technologies where life detection is not satisfactory (e.g. speaker recognition). Users that are unsuitable: For every biometric technology, there is a small ratio of users for whom the biometric method does not work, e.g. fingerprint recognition cannot be used when a person has lost both arms. Size of sensor: Fingerprint sensors are very small and can be incorporated even into small devices. Hand geometry readers, on the other, would not be suitable for e.g. mobile applications.
  19. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 [ http://www.itu.int/itudoc/itu-t/workshop/security/present/s5p4.pdf ] [Mat02] Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002.
  20. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Face recognition system (biometric data unprotected on hard disk) – Biometric reference data downloaded onto laptop and displayed on screen. The face recognition system accepts the displayed picture. Attacker creates new biometric reference data and loads it into the face recognition database. The face recognition system accepts the attacker as legitimate user. Fingerprint recognition – Breathe onto sensor or apply water-filled plastic bag or apply graphite powder and a piece of tape to reactivate latent fingerprints (for capacitive sensors) Use graphite powder technique plus bright light to reactivate latent fingerprints (for optical fingerprint sensors) Use latex finger (for thermal sensors)
  21. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Links and documents: Scheuermann, D., Schwiderski-Grosche, S. und Struif, B., Usability of Biometrics in Relation to Electronic Signatures , EU Studie 502533/8, http://www.sit.fraunhofer.de/cgi-bin/sit-frame/sica?link=/SICA/projects/bio_sig.html. Jain, A., Bolle, R. und Pankanti, S., Biometrics: Personal Identification in Networked Society , Kluwer Academic Publishers, 1999. International Biometric Group: http:// www.biometricgroup.com The Biometric Consortium: http://www.biometrics.org/ Association for Biometrics: http://www.afb.org.uk/ BioAPI Consortium: http://www.bioapi.org/ International Biometric Industry Association: http://www.ibia.org/