SlideShare a Scribd company logo
1 of 27
Download to read offline
Biometric identification
Bozhidar Bozhanov
● @bozhobg
● http://techblog.bozho.net
● http://blog.bozho.net
Biometrics
● Detecting inherent characteristics
○ fingerprints
○ iris
○ palm veins
○ face
○ voice
○ DNA
● Unique and unchangeable
Usage
● Border inspections
● Access control
○ Home door unlocking
● Smartphone unlocking
● Looks cool in movies
Fingerprint
● Binarization, thinning, extraction
● Minutia (pl. minutae)
○ Ridge ending
○ Ridge bifurication
○ Fingerprint template
● Other methods
○ Feature extraction
● MINEX (template standard)
Fingerprint
griaulebiometrics.com
binarization thinning
Storing and comparing
● Original / enhanced image
● Coordinates of the minutae
● Other features
● Fuzzy hash, locality-sensitive hash
○ “Percentage hash”
○ Collisions are needed
Problems...
● Bad images, dirty scanners, injured skin...
“A Japanese cryptographer has demonstrated how
fingerprint recognition devices can be fooled using a
combination of low cunning, cheap kitchen supplies and a
digital camera.” The Register, “Gummi bears defeat
fingerprint sensors”
“The results are enough to scrap the systems completely,
and to send the various fingerprint biometric companies
packing.” Bruce Schneier
Iris
● Detection of around 200 points
● Same storage methods as fingerprints
● Only patented algorithms
DNA, veins, voice, face...
● Using many in combination
● Expensive scanners (DNA, veins)
○ But Kuwait takes DNA from everyone
● Lack of uniqueness and high error rate
(voice, face)
Reconstructing
● ...possible
○ based on minutae, points, features
○ except if fuzzy / locality senstive hash is used
● => storing in centralized databases is
dangerous
In-person verification
● Easy faking
+
● Automated check
=
● Fraud
N-th factor
● Secure identification is
○ something you have +
○ something you know +
○ something you are
● e.g. smartcard with PIN + fingerprint
(matched on the card)
Border inspections
● ICAO biometric passports
○ Contain images of the face and fingerprints (soon
maybe iris) (JPEG2000)
○ Integrity - with QES of the issuing authoroity
● Fingerprints are read without PIN
○ ...but by a “trusted” terminal
● And are compared to the person’s fingerprints
● => fake/someone else’s document?
Problems
● Centralized databases with images of
fingerprints
● Contactless reading of fingerprints
○ 3 versions of the protocol have been demonstrated
to have security issues
○ Complex scheme for certificate management.
Certificates expire in 24 hours.
BSI
● ...but the chip doesn’t have a clock
○ 1 leaked terminal certificate
○ => all fingerprints in all passports in the world are
easy targets
○ ...if the central databases don’t leak before that
● experts - “well, I can get your fingerprint from
anywhere”
○ in high-res?
bioID - No go
● You can’t change your fingerprint/iris/DNA
● Databases leak sooner or later
● Easy to fake (gummi bears!)
● They are used to unlock phones => unlock
○ email
○ e-banking
○ ...everything
Applications
● 2nd factor
● Border inspections with match-on-card
verification
● Future?
“Free flight of the thought”
● Let’s imagine...
○ Cheap and exact biometric readers
● Then…
○ ID = hash(fingerprint) + hash(iris) + hash(DNA) +
hash(password)
● I am
66a1aa2b4add3d8775751b81adb86e476d0a735188c2e8582be0920b2a3
e55ea
● I can prove it
○ scanner + app
● Distributed global electronic identity
○ something I am + something I know
Fraud?
● How do we guarantee that the hash is a
result of our biometrics?
● biometrics+password-> KDF -> private key
(ephemeral)
○ KDF (key derivation function)
○ Sign challenge with the private key
Anonymity
● Hashes don’t have names
● Guarantees identity
● Aliases for different contexts (multiple
passwords?)
● Example: distributed ride-sharing with
distributed reputation system ontop of a
global anonymous identity
Conclusion
● Only biometrics - no
● Biometrics in clear form - no
● Biometrics in databases - no
● 2nd factor, match-on-card - okay
● Future applications
Thank you
Resources
http://www.theregister.co.uk/2002/05/16/gummi_bears_defeat_fingerprint_sensors/
http://www.griaulebiometrics.com/en-us/book/understanding-biometrics/types/feature-extraction/minutiae
http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=12
https://en.wikipedia.org/wiki/Key_derivation_function
http://techblog.bozho.net/electronic-machine-readable-travel-documents/
http://techblog.bozho.net/identity-in-the-digital-world/
http://europe.newsweek.com/kuwait-becomes-first-country-world-collect-dna-samples-all-citizens-and-449830?rm=eu

More Related Content

Viewers also liked

Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5
Clare Nelson, CISSP, CIPP-E
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 

Viewers also liked (16)

E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security Models
 
X-Road in Finland & REST Gateway
X-Road in Finland & REST GatewayX-Road in Finland & REST Gateway
X-Road in Finland & REST Gateway
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
 
Talking to organisations with x-road
Talking to organisations with x-roadTalking to organisations with x-road
Talking to organisations with x-road
 
Architecting estonia
Architecting estoniaArchitecting estonia
Architecting estonia
 
Async IO and Multithreading explained
Async IO and Multithreading explainedAsync IO and Multithreading explained
Async IO and Multithreading explained
 
API First Government
API First GovernmentAPI First Government
API First Government
 
#NoXML: Eliminating XML in Spring Projects - SpringOne 2GX 2015
#NoXML: Eliminating XML in Spring Projects - SpringOne 2GX 2015#NoXML: Eliminating XML in Spring Projects - SpringOne 2GX 2015
#NoXML: Eliminating XML in Spring Projects - SpringOne 2GX 2015
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5
 
Piston less pump
Piston less pumpPiston less pump
Piston less pump
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Chainer入門と最近の機能
Chainer入門と最近の機能Chainer入門と最近の機能
Chainer入門と最近の機能
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Block chain 101 what it is, why it matters
Block chain 101  what it is, why it mattersBlock chain 101  what it is, why it matters
Block chain 101 what it is, why it matters
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar to Biometric identification

What's Appropriate - Research in HCI
What's Appropriate - Research in HCIWhat's Appropriate - Research in HCI
What's Appropriate - Research in HCI
Xin(Jason) Wang
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
untitledpresentation1-201015162908 (1).pptx
untitledpresentation1-201015162908 (1).pptxuntitledpresentation1-201015162908 (1).pptx
untitledpresentation1-201015162908 (1).pptx
SaiRama27
 

Similar to Biometric identification (13)

Tokenization: Life beyond the Information Age
Tokenization: Life beyond the Information AgeTokenization: Life beyond the Information Age
Tokenization: Life beyond the Information Age
 
Blue Eyes Technology PPT
Blue Eyes Technology PPTBlue Eyes Technology PPT
Blue Eyes Technology PPT
 
What's Appropriate - Research in HCI
What's Appropriate - Research in HCIWhat's Appropriate - Research in HCI
What's Appropriate - Research in HCI
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Natural User Interfaces
Natural User InterfacesNatural User Interfaces
Natural User Interfaces
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
untitledpresentation1-201015162908 (1).pptx
untitledpresentation1-201015162908 (1).pptxuntitledpresentation1-201015162908 (1).pptx
untitledpresentation1-201015162908 (1).pptx
 
IT in 2017
IT in 2017IT in 2017
IT in 2017
 
Guerrilla UX: Practical and Affordable Research
Guerrilla UX: Practical and Affordable ResearchGuerrilla UX: Practical and Affordable Research
Guerrilla UX: Practical and Affordable Research
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 

More from Bozhidar Bozhanov

More from Bozhidar Bozhanov (20)

Антикорупционен софтуер
Антикорупционен софтуерАнтикорупционен софтуер
Антикорупционен софтуер
 
Nothing is secure.pdf
Nothing is secure.pdfNothing is secure.pdf
Nothing is secure.pdf
 
Elasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and MultitenancyElasticsearch - Scalability and Multitenancy
Elasticsearch - Scalability and Multitenancy
 
Encryption in the enterprise
Encryption in the enterpriseEncryption in the enterprise
Encryption in the enterprise
 
Blockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabiltyBlockchain overview - types, use-cases, security and usabilty
Blockchain overview - types, use-cases, security and usabilty
 
Електронна държава
Електронна държаваЕлектронна държава
Електронна държава
 
Blockchain - what is it good for?
Blockchain - what is it good for?Blockchain - what is it good for?
Blockchain - what is it good for?
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Scaling horizontally on AWS
Scaling horizontally on AWSScaling horizontally on AWS
Scaling horizontally on AWS
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Политики, основани на данни
Политики, основани на данниПолитики, основани на данни
Политики, основани на данни
 
Отворено законодателство
Отворено законодателствоОтворено законодателство
Отворено законодателство
 
Overview of Message Queues
Overview of Message QueuesOverview of Message Queues
Overview of Message Queues
 
Сигурност на електронното управление
Сигурност на електронното управлениеСигурност на електронното управление
Сигурност на електронното управление
 
Opensource government
Opensource governmentOpensource government
Opensource government
 
Биометрична идентификация
Биометрична идентификацияБиометрична идентификация
Биометрична идентификация
 
Регулации и технологии
Регулации и технологииРегулации и технологии
Регулации и технологии
 
Regulations and technology
Regulations and technologyRegulations and technology
Regulations and technology
 
Архитектура на електронното управление
Архитектура на електронното управлениеАрхитектура на електронното управление
Архитектура на електронното управление
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Biometric identification