SlideShare a Scribd company logo
1 of 36
GUIDE TO BIOMETRICS
CHAPTER I & II
September 7th 2005
Presentation by Tamer Uz
Chapter I
Introduction
Outline
 Descriptions
 Authentication
 Overview of Biometric Systems
 Biometric Identification
 Biometric Verification
 Biometric Enrollment
 Biometric System Security
Descriptions
 Biometrics: Science of identifying, or verifying the
identity of, a person based on physiological or
behavioral characteristics.
Descriptions
 Authorization:
Permission or
approval.
 Authentication:
Validating or figuring
out the identity of a
person.
Authentication
 There are 3 traditional way of verifying the
identity of a person:
 Possessions (keys, passports, smartcards , …)
 Knowledge
 Secret (passwords, pass phrases, …)
 Non-secret (user Id, mothers maiden name, favorite
color)
 Biometrics
 Physiological (fingerprints, face, iris, …)
 Behavioral (walking, keystroke pattern, talking, …)
Authentication
 The 3 modes of authentication are sometimes
combined
 User id + password
 ATM card + password
 Passport + face picture and signiture
Authentication
There are two different authentication methods in
biometrics
 Verification: Is he/she the person who claims he/she
is? Works with id + biometrics. Thus it is based on a
combination of modes.
 Identification: Who is this person? Uses only the
biometrics and searches the entire database.
Overview of Biometric Systems
There are five important properties of biometric
identifiers:
1. Universality
2. Uniqueness
3. Permanence
4. Collectability
5. Acceptability
Overview of Biometric Systems
Biometric Identifiers
Overview of Biometric Systems
Biometric Subsystems
 Biometric readers (sensors)
 Feature extractors
 Feature Matchers
Overview of Biometric Systems
A generalized diagram of a biometric system is as
follows:
Overview of Biometric Systems
Design Issues:
4 basic design specifications of biometric systems are
 System accuracy
 How often the system accepts an imposter (FAR)
 How often the system rejects a genuine user (FRR)
 Computational Speed
 Exception Handling
 Failure to use (FTU)
 Failure to enroll (FTE)
 Failure to acquire (FTA)
 System Cost
Overview of Biometric Systems
Engineering Questions
- Trusting people/biometrics?
- Which biometrics is best for a given
application?
- How are the error numbers that are
reported for different biometrics to be
interpreted?
- Are new security holes created because of
the use of the biometrics?
- How to achieve a low exception rate?
- How to acquire the biometrics and how to
do it in a convenient way?
- What feature set is amenable for automatic
matching?
- Given the input data how to extract the
features from it?
- How to define a matching metric that
translates the intuition of “similarity” among
the patterns?
- How to implement the matching metric?
- Organization of the database?
- Methods for searching the database?
- Security?
- Privacy?
Biometric Identification
Biometric identification is based only on biometric
credentials.
Biometric Identification
Biometric identification system can be used in
two different modes
• Positive identification
• Authorization of a group without id
• Negative identification
• Most Wanted List
Biometric Verification
Biometric verification differs from biometric
identification in that the presented biometric is only
compared with a single enrolled biometric entity
which matches the input id
Biometric Verification
There are two possible database configurations for the
verification systems
Centralized Database: As the name suggests the enrollment
information is in a central database. When the token (id/card)
is provided, the corresponding biometrics is retrieved and the
comparison is made with the newly presented biometric
sample. E.g. laptop
Distributed Database: In this case the enrollment template is
usually stored in a device that the user carries. The user
provides the device and his/her biometrics. Then the
comparison is performed between the two. E.g. smart cards
Biometric Enrollment
Process of registering subjects in biometric database
Positive Enrollment:
• To create a database of eligible subjects
• Biometric samples and other credentials are stored in the database. An id
(or a smart card) is issued to the subject.
Negative Enrollment:
• To create a database of ineligible subjects
• Often without subject cooperation or even knowledge
Biometric System Security
 Possible Security Concerns:
 Biometric information is presented when the owner is not
present.
 Hacking the scanner, feature extractor, matcher, database,
and any other possible module in the system.
Chapter II
Authentication
and
Biometrics
Outline
 Descriptions
 Secure Authentication Protocols
 Access Control Security Services
 Authentication Methods
 Authentication Protocols
 Matching Biometric Samples
 Verification by Humans
 Passwords vs. Biometrics
 Hybrid Methods
Descriptions
 Authorization: Permission to access a resource
 Access Control: A mechanism for limiting the use of some
resource to authorized users
 Access Control List: A data structure associated with a
resource that specifies the authorized users and the conditions
for their access
 Authenticate: To determine that something is genuine; to
determine reliably the identity of the communicating party
 Authentication: Permission to access a resource
Secure Authentication Protocols
Characteristics of an authentication protocol:
 Established in advance
 Mutually agreed
 Unambiguous
 Complete (Able to handle exceptions)
An authentication protocol itself does “not” guarantee
security
Access Control Security Services
Some basic security services that should be offered by
any access control system are:
 Authentication
 Non-repudiation
 Confidentiality
Authentication Methods
Possession (P)
Knowledge (K)
Biometrics (B)
Authentication Protocols
Authentication protocol is the tasks the user and the
access point has to perform to be able to determine
whether the user has enough credentials or not.
Part of Authentication Protocols:
 Enrollment
 Tokens. E.g. T={x1…xn|xi Є (P,K,B)}
 Comparison rules. E.g. Matching threshold
 Other rules. E.g. “Three strikes and you are out”, or the
order of the presentation of the tokens: “First id number,
then the fingerprint, and than the key”
Matching Biometric Samples
Remark:
• P and K are checked by exact comparison;
• B is compared via pattern recognition techniques because of sampling
variations, noise and distortions
Three crucial design aspects of biometric system:
• The biometric sampling or signal acquisition (B=f(ß))
• The similarity function s=s(B1, B2) between two templates
• The decision threshold T that decides on a match or mismatch
Matching Biometric Samples
 Identification
Only the biometrics is needed (no id is claimed).
• Authorization is granted if d=di
• Multiple di might satisfy the similarity criteria. A secondary
matcher (possible a human expert) tries to narrow it down.
Matching Biometric Samples
 Screening
• Negative identification.
• Searching whether a subject is in an “interesting” people
database or not. (Most wanted criminals)
• Using biometrics only may result in too many false positives
(or false negatives depending on T). Bad ROC.
• Therefore several tokens P1, B1, K1, P2, K2, B2 etc. should
be matched with the ones in the file.
Matching Biometric Samples
 Verification
• Id + B is provided. (Sometimes K too)
• The template corresponding the Id is retrieved from
the database
• If s(B,Bi)>T pass, else fail.
Matching Biometric Samples
 Continuity of Identity
• Are the authenticated and authorized persons
the same?
• Re-establishing the authentication credentials
• Surveillance cameras
Verification by Humans
 By looking at the biometrics (face, signatures…)
 Face verification error rate 1:1000
 Signature verification is not very secure
Passwords versus Biometrics
 Passwords: Exact match
 Biometrics: Probabilistic match
 FAR, FRR
Hybrid Methods
 More than one identifier is used {P, K, B}
 Two Remarks
 B with {P, K}. Reduces identification to
verification (from 1:many to 1:1)
 B1 with B2. Results in better ROCs than using
only B1 or only B2
 Combination of matching scores is an
application specific problem
QUESTIONS?

More Related Content

Similar to Chapters_1_2.ppt

Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 

Similar to Chapters_1_2.ppt (20)

Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Uid security
Uid securityUid security
Uid security
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

More from JoshCasas1

Understanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third QuarterUnderstanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third Quarter
JoshCasas1
 
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptxMOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
JoshCasas1
 
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptxJOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JoshCasas1
 

More from JoshCasas1 (14)

Understanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third QuarterUnderstanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third Quarter
 
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptxMOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
 
Combined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.pptCombined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.ppt
 
270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.ppt270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.ppt
 
csce411-set7.ppt
csce411-set7.pptcsce411-set7.ppt
csce411-set7.ppt
 
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptxJOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
 
L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
 
Essential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdfEssential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdf
 
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.pptMS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
 
M0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdfM0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdf
 
Microsoft Access ppt.ppt
Microsoft Access ppt.pptMicrosoft Access ppt.ppt
Microsoft Access ppt.ppt
 
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdfMICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
 
Introduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.pptIntroduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.ppt
 
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdfLESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Chapters_1_2.ppt

  • 1. GUIDE TO BIOMETRICS CHAPTER I & II September 7th 2005 Presentation by Tamer Uz
  • 3. Outline  Descriptions  Authentication  Overview of Biometric Systems  Biometric Identification  Biometric Verification  Biometric Enrollment  Biometric System Security
  • 4. Descriptions  Biometrics: Science of identifying, or verifying the identity of, a person based on physiological or behavioral characteristics.
  • 5. Descriptions  Authorization: Permission or approval.  Authentication: Validating or figuring out the identity of a person.
  • 6. Authentication  There are 3 traditional way of verifying the identity of a person:  Possessions (keys, passports, smartcards , …)  Knowledge  Secret (passwords, pass phrases, …)  Non-secret (user Id, mothers maiden name, favorite color)  Biometrics  Physiological (fingerprints, face, iris, …)  Behavioral (walking, keystroke pattern, talking, …)
  • 7. Authentication  The 3 modes of authentication are sometimes combined  User id + password  ATM card + password  Passport + face picture and signiture
  • 8. Authentication There are two different authentication methods in biometrics  Verification: Is he/she the person who claims he/she is? Works with id + biometrics. Thus it is based on a combination of modes.  Identification: Who is this person? Uses only the biometrics and searches the entire database.
  • 9. Overview of Biometric Systems There are five important properties of biometric identifiers: 1. Universality 2. Uniqueness 3. Permanence 4. Collectability 5. Acceptability
  • 10. Overview of Biometric Systems Biometric Identifiers
  • 11. Overview of Biometric Systems Biometric Subsystems  Biometric readers (sensors)  Feature extractors  Feature Matchers
  • 12. Overview of Biometric Systems A generalized diagram of a biometric system is as follows:
  • 13. Overview of Biometric Systems Design Issues: 4 basic design specifications of biometric systems are  System accuracy  How often the system accepts an imposter (FAR)  How often the system rejects a genuine user (FRR)  Computational Speed  Exception Handling  Failure to use (FTU)  Failure to enroll (FTE)  Failure to acquire (FTA)  System Cost
  • 14. Overview of Biometric Systems Engineering Questions - Trusting people/biometrics? - Which biometrics is best for a given application? - How are the error numbers that are reported for different biometrics to be interpreted? - Are new security holes created because of the use of the biometrics? - How to achieve a low exception rate? - How to acquire the biometrics and how to do it in a convenient way? - What feature set is amenable for automatic matching? - Given the input data how to extract the features from it? - How to define a matching metric that translates the intuition of “similarity” among the patterns? - How to implement the matching metric? - Organization of the database? - Methods for searching the database? - Security? - Privacy?
  • 15. Biometric Identification Biometric identification is based only on biometric credentials.
  • 16. Biometric Identification Biometric identification system can be used in two different modes • Positive identification • Authorization of a group without id • Negative identification • Most Wanted List
  • 17. Biometric Verification Biometric verification differs from biometric identification in that the presented biometric is only compared with a single enrolled biometric entity which matches the input id
  • 18. Biometric Verification There are two possible database configurations for the verification systems Centralized Database: As the name suggests the enrollment information is in a central database. When the token (id/card) is provided, the corresponding biometrics is retrieved and the comparison is made with the newly presented biometric sample. E.g. laptop Distributed Database: In this case the enrollment template is usually stored in a device that the user carries. The user provides the device and his/her biometrics. Then the comparison is performed between the two. E.g. smart cards
  • 19. Biometric Enrollment Process of registering subjects in biometric database Positive Enrollment: • To create a database of eligible subjects • Biometric samples and other credentials are stored in the database. An id (or a smart card) is issued to the subject. Negative Enrollment: • To create a database of ineligible subjects • Often without subject cooperation or even knowledge
  • 20. Biometric System Security  Possible Security Concerns:  Biometric information is presented when the owner is not present.  Hacking the scanner, feature extractor, matcher, database, and any other possible module in the system.
  • 22. Outline  Descriptions  Secure Authentication Protocols  Access Control Security Services  Authentication Methods  Authentication Protocols  Matching Biometric Samples  Verification by Humans  Passwords vs. Biometrics  Hybrid Methods
  • 23. Descriptions  Authorization: Permission to access a resource  Access Control: A mechanism for limiting the use of some resource to authorized users  Access Control List: A data structure associated with a resource that specifies the authorized users and the conditions for their access  Authenticate: To determine that something is genuine; to determine reliably the identity of the communicating party  Authentication: Permission to access a resource
  • 24. Secure Authentication Protocols Characteristics of an authentication protocol:  Established in advance  Mutually agreed  Unambiguous  Complete (Able to handle exceptions) An authentication protocol itself does “not” guarantee security
  • 25. Access Control Security Services Some basic security services that should be offered by any access control system are:  Authentication  Non-repudiation  Confidentiality
  • 27. Authentication Protocols Authentication protocol is the tasks the user and the access point has to perform to be able to determine whether the user has enough credentials or not. Part of Authentication Protocols:  Enrollment  Tokens. E.g. T={x1…xn|xi Є (P,K,B)}  Comparison rules. E.g. Matching threshold  Other rules. E.g. “Three strikes and you are out”, or the order of the presentation of the tokens: “First id number, then the fingerprint, and than the key”
  • 28. Matching Biometric Samples Remark: • P and K are checked by exact comparison; • B is compared via pattern recognition techniques because of sampling variations, noise and distortions Three crucial design aspects of biometric system: • The biometric sampling or signal acquisition (B=f(ß)) • The similarity function s=s(B1, B2) between two templates • The decision threshold T that decides on a match or mismatch
  • 29. Matching Biometric Samples  Identification Only the biometrics is needed (no id is claimed). • Authorization is granted if d=di • Multiple di might satisfy the similarity criteria. A secondary matcher (possible a human expert) tries to narrow it down.
  • 30. Matching Biometric Samples  Screening • Negative identification. • Searching whether a subject is in an “interesting” people database or not. (Most wanted criminals) • Using biometrics only may result in too many false positives (or false negatives depending on T). Bad ROC. • Therefore several tokens P1, B1, K1, P2, K2, B2 etc. should be matched with the ones in the file.
  • 31. Matching Biometric Samples  Verification • Id + B is provided. (Sometimes K too) • The template corresponding the Id is retrieved from the database • If s(B,Bi)>T pass, else fail.
  • 32. Matching Biometric Samples  Continuity of Identity • Are the authenticated and authorized persons the same? • Re-establishing the authentication credentials • Surveillance cameras
  • 33. Verification by Humans  By looking at the biometrics (face, signatures…)  Face verification error rate 1:1000  Signature verification is not very secure
  • 34. Passwords versus Biometrics  Passwords: Exact match  Biometrics: Probabilistic match  FAR, FRR
  • 35. Hybrid Methods  More than one identifier is used {P, K, B}  Two Remarks  B with {P, K}. Reduces identification to verification (from 1:many to 1:1)  B1 with B2. Results in better ROCs than using only B1 or only B2  Combination of matching scores is an application specific problem