SlideShare uma empresa Scribd logo
1 de 35
Biometrics and Authentication


           Shivani Kirubanandan
Lets Define !

  “A biometric is a physiological or behavioral
characteristic of a human being that can distinguish
one person from another and that theoretically can be
used for identification or verification of identity.”
Biometrics as Authentication

Authentication depends on
• What you have
• What you know
• What you ARE !
Why Biometrics?

•   Identity thefts
•   Something you know can be stolen
•   Predicted or hacked
•   Reliability on manual verification
Application Categories
 Biometric applications available today are
 categorized into 2 sectors
• Psychological: Iris, Fingerprints, Hand, Retinal
  and Face recognition
• Behavioral: Voice, Typing pattern, Signature
Biometric Authentication Process

•   Acquisition
•   Creation of Master characteristics
•   Storage of Master characteristics
•   Acquisition(s)
•   Comparison
•   Decision
The metrics of Biometrics

•   FTE – Failure To Enroll
•   FTA – Failure To Accept
•   FAR – False Acceptance Rates
•   FRR – False Reject Rates
Essential parameters
•   Liveness testing
•   Tamper resistance
•   Secure communication
•   Security Threshold level
•   Fall back node
Fingerprint recognition

•   Divides print into loops, whorls and arch
•   Calculates minutiae points (ridge endings)
•   Comparisons
•   authentication
Fingerprint techniques

•    Optical
•    Capacitive
•    Thermal
•    Ultrasonic
Disadvantages
•   Racial issues
•   Dirt , grime and wounds
•   Placement of finger
•   Too big a database to process
•   Can be spoofed –liveness important!
Hand Geometry

• Geometry of users hands
• More reliable than fingerprinting
• Balance in performance and usability
Disadvantage


• Very large scanners
Retinal Scanning

•   Scans retina into database
•   User looks straight into retinal reader
•   Scan using low intensity light
•   Very efficient – cant be spoofed!
Disadvantages
• User has to look “directly”
• FTE ratio high in this biometric
• Acceptability concerns
  –   Light exposure
  –   Hygiene
Iris Scanner
•   Scans unique pattern of iris
•   Iris is colored and visible from far
•   No touch required
•   Overcomes retinal scanner issues
•   Contact lenses an issue?
Face recognition
•   User faces camera
•   Neutral expression required
•   Apt lighting and position
•   Algorithms for processing
•   Decision
Issues with Face Recognition?
Issues
•   Identification across expression
•   FRR or FAR fluctuate
•   Easily spoofed
•   Tougher usability
•   High Environmental impact
Behavioral

• Voice
• Signature
• Typing pattern
Voice Recognition
• Speech input
  –   Frequency
  –   Duration
  –   Cadence
• Neutral tone
• User friendly
Disadvantages
•   Local acoustics
•   Background noise
•   Device quality
•   Illness , emotional behavior
•   Time consuming enrollment
•   Large processing template
Signature Recognition
•   Signature measures (dynamic)
    –   Speed
    –   Velocity
    –   Pressure
    •   Captures images (static)
    •   High user acceptance
Issues
•   Signature variable with
    – Age, illness, emotions
    • Requires high quality hardware
    • High FRR as signatures are very dynamic
Typing Patterns
•   User typing pattern
    –   Speed
    –   Press and Release Rate
    •   Unique patterns are generated
    •   comparisons
Issues
•   Not very scalable
•   FRR is high
•   Can be spoofed – by simple
    technology (recorders)
Usability issues in Biometrics

•   User acceptability
•   Knowledge of technology
•   Familiarity with biometric characteristic
•   Experience with device
Usability issues…

• Environment of use
• Transaction criticality
• Time consuming tasks
Biometric solutions
•   Educate
•   Train
•   Explain Interfaces
•   Use Trainers
•   Supervised Playtime
General issues
•   FTE posses problem
•   Biometric characteristics are not encrypted
•   Trust on input device
•   Cannot authenticate computers!
•   Privacy attack?!
Current applications

•   Banks
•   Immigration facilities across USA
•   IDwidget – interesting research
•   Eyegaze at Stanford
Class task
• Sell your biometric product
  Case1
  A bank needs an appropriate
  authentication mechanism to allow remote
  user transactions. What kind of multifactor
  system would you sell them?
Class task…
  Case 2:
• Suggest certain areas in which biometrics
  would prove disastrous
• Note- You may suggest a particular
  combination of biometrics which may be
  disastrous to security and privacy
Thank You!!

Mais conteúdo relacionado

Mais procurados (19)

Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric
Biometric Biometric
Biometric
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 

Semelhante a 070327 biometrics

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptxsahoosabyasachi000
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NRavikumar Chilmula
 

Semelhante a 070327 biometrics (20)

Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 

070327 biometrics

  • 1. Biometrics and Authentication Shivani Kirubanandan
  • 2. Lets Define ! “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”
  • 3. Biometrics as Authentication Authentication depends on • What you have • What you know • What you ARE !
  • 4. Why Biometrics? • Identity thefts • Something you know can be stolen • Predicted or hacked • Reliability on manual verification
  • 5. Application Categories Biometric applications available today are categorized into 2 sectors • Psychological: Iris, Fingerprints, Hand, Retinal and Face recognition • Behavioral: Voice, Typing pattern, Signature
  • 6. Biometric Authentication Process • Acquisition • Creation of Master characteristics • Storage of Master characteristics • Acquisition(s) • Comparison • Decision
  • 7. The metrics of Biometrics • FTE – Failure To Enroll • FTA – Failure To Accept • FAR – False Acceptance Rates • FRR – False Reject Rates
  • 8. Essential parameters • Liveness testing • Tamper resistance • Secure communication • Security Threshold level • Fall back node
  • 9. Fingerprint recognition • Divides print into loops, whorls and arch • Calculates minutiae points (ridge endings) • Comparisons • authentication
  • 10. Fingerprint techniques • Optical • Capacitive • Thermal • Ultrasonic
  • 11. Disadvantages • Racial issues • Dirt , grime and wounds • Placement of finger • Too big a database to process • Can be spoofed –liveness important!
  • 12. Hand Geometry • Geometry of users hands • More reliable than fingerprinting • Balance in performance and usability
  • 14. Retinal Scanning • Scans retina into database • User looks straight into retinal reader • Scan using low intensity light • Very efficient – cant be spoofed!
  • 15. Disadvantages • User has to look “directly” • FTE ratio high in this biometric • Acceptability concerns – Light exposure – Hygiene
  • 16. Iris Scanner • Scans unique pattern of iris • Iris is colored and visible from far • No touch required • Overcomes retinal scanner issues • Contact lenses an issue?
  • 17. Face recognition • User faces camera • Neutral expression required • Apt lighting and position • Algorithms for processing • Decision
  • 18. Issues with Face Recognition?
  • 19.
  • 20. Issues • Identification across expression • FRR or FAR fluctuate • Easily spoofed • Tougher usability • High Environmental impact
  • 22. Voice Recognition • Speech input – Frequency – Duration – Cadence • Neutral tone • User friendly
  • 23. Disadvantages • Local acoustics • Background noise • Device quality • Illness , emotional behavior • Time consuming enrollment • Large processing template
  • 24. Signature Recognition • Signature measures (dynamic) – Speed – Velocity – Pressure • Captures images (static) • High user acceptance
  • 25. Issues • Signature variable with – Age, illness, emotions • Requires high quality hardware • High FRR as signatures are very dynamic
  • 26. Typing Patterns • User typing pattern – Speed – Press and Release Rate • Unique patterns are generated • comparisons
  • 27. Issues • Not very scalable • FRR is high • Can be spoofed – by simple technology (recorders)
  • 28. Usability issues in Biometrics • User acceptability • Knowledge of technology • Familiarity with biometric characteristic • Experience with device
  • 29. Usability issues… • Environment of use • Transaction criticality • Time consuming tasks
  • 30. Biometric solutions • Educate • Train • Explain Interfaces • Use Trainers • Supervised Playtime
  • 31. General issues • FTE posses problem • Biometric characteristics are not encrypted • Trust on input device • Cannot authenticate computers! • Privacy attack?!
  • 32. Current applications • Banks • Immigration facilities across USA • IDwidget – interesting research • Eyegaze at Stanford
  • 33. Class task • Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?
  • 34. Class task… Case 2: • Suggest certain areas in which biometrics would prove disastrous • Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy