Your SlideShare is downloading. ×
070327 biometrics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

070327 biometrics

198
views

Published on

la biométrie, authentification

la biométrie, authentification


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
198
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Biometrics and Authentication Shivani Kirubanandan
  • 2. Lets Define ! “A biometric is a physiological or behavioralcharacteristic of a human being that can distinguishone person from another and that theoretically can beused for identification or verification of identity.”
  • 3. Biometrics as AuthenticationAuthentication depends on• What you have• What you know• What you ARE !
  • 4. Why Biometrics?• Identity thefts• Something you know can be stolen• Predicted or hacked• Reliability on manual verification
  • 5. Application Categories Biometric applications available today are categorized into 2 sectors• Psychological: Iris, Fingerprints, Hand, Retinal and Face recognition• Behavioral: Voice, Typing pattern, Signature
  • 6. Biometric Authentication Process• Acquisition• Creation of Master characteristics• Storage of Master characteristics• Acquisition(s)• Comparison• Decision
  • 7. The metrics of Biometrics• FTE – Failure To Enroll• FTA – Failure To Accept• FAR – False Acceptance Rates• FRR – False Reject Rates
  • 8. Essential parameters• Liveness testing• Tamper resistance• Secure communication• Security Threshold level• Fall back node
  • 9. Fingerprint recognition• Divides print into loops, whorls and arch• Calculates minutiae points (ridge endings)• Comparisons• authentication
  • 10. Fingerprint techniques• Optical• Capacitive• Thermal• Ultrasonic
  • 11. Disadvantages• Racial issues• Dirt , grime and wounds• Placement of finger• Too big a database to process• Can be spoofed –liveness important!
  • 12. Hand Geometry• Geometry of users hands• More reliable than fingerprinting• Balance in performance and usability
  • 13. Disadvantage• Very large scanners
  • 14. Retinal Scanning• Scans retina into database• User looks straight into retinal reader• Scan using low intensity light• Very efficient – cant be spoofed!
  • 15. Disadvantages• User has to look “directly”• FTE ratio high in this biometric• Acceptability concerns – Light exposure – Hygiene
  • 16. Iris Scanner• Scans unique pattern of iris• Iris is colored and visible from far• No touch required• Overcomes retinal scanner issues• Contact lenses an issue?
  • 17. Face recognition• User faces camera• Neutral expression required• Apt lighting and position• Algorithms for processing• Decision
  • 18. Issues with Face Recognition?
  • 19. Issues• Identification across expression• FRR or FAR fluctuate• Easily spoofed• Tougher usability• High Environmental impact
  • 20. Behavioral• Voice• Signature• Typing pattern
  • 21. Voice Recognition• Speech input – Frequency – Duration – Cadence• Neutral tone• User friendly
  • 22. Disadvantages• Local acoustics• Background noise• Device quality• Illness , emotional behavior• Time consuming enrollment• Large processing template
  • 23. Signature Recognition• Signature measures (dynamic) – Speed – Velocity – Pressure • Captures images (static) • High user acceptance
  • 24. Issues• Signature variable with – Age, illness, emotions • Requires high quality hardware • High FRR as signatures are very dynamic
  • 25. Typing Patterns• User typing pattern – Speed – Press and Release Rate • Unique patterns are generated • comparisons
  • 26. Issues• Not very scalable• FRR is high• Can be spoofed – by simple technology (recorders)
  • 27. Usability issues in Biometrics• User acceptability• Knowledge of technology• Familiarity with biometric characteristic• Experience with device
  • 28. Usability issues…• Environment of use• Transaction criticality• Time consuming tasks
  • 29. Biometric solutions• Educate• Train• Explain Interfaces• Use Trainers• Supervised Playtime
  • 30. General issues• FTE posses problem• Biometric characteristics are not encrypted• Trust on input device• Cannot authenticate computers!• Privacy attack?!
  • 31. Current applications• Banks• Immigration facilities across USA• IDwidget – interesting research• Eyegaze at Stanford
  • 32. Class task• Sell your biometric product Case1 A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?
  • 33. Class task… Case 2:• Suggest certain areas in which biometrics would prove disastrous• Note- You may suggest a particular combination of biometrics which may be disastrous to security and privacy
  • 34. Thank You!!