3. What Is Biometrics
Biometrics is the reading of a unique human
physical attribute as data, which is then applied to
actuating a system.
Access control of Secure areas
Replacing passwords on computers or PDAs
5. RETINAL SCANNING
User Looks Into a Viewer and Focuses
on a Point; Infrared Light Scans Retina
Iris Scanning
User looks at a camera
(distance from camera increasing rapidly
to 2-3 feet)
9. User speaks into a microphone or other device,
such as a telephone handset
Signature Recognition
Keystroke Recognition
User signs name on a device
User types standard sample on keyboard
Voice Recognition & DSV
Other Techniques
10. Strengths, and Weakness
Technique Strengths
Retina Highly accurate
Iris Highly accurate; works with eyeglasses; more acceptable
to users than retina scan
Fingerprint Mature technology; highly accurate; low cost; small size,
becoming widely acceptable
Hand/Finger Geometry accurate and flexible; widely acceptable to users
Face Recognition Widely acceptable to users; low cost; no direct contact;
passive monitoring possible
Voice Recognition Usable over existing telephone system; good for remote
access and monitoring;
Signature Recognition Widely acceptable to users
Keystroke Recognition Widely acceptable to users; low cost; uses existing
hardware.
11. Strengths, and Weakness
Technique Weaknesses
Retina Inconvenient forpersons with eyeglasses; dislike
contact with device and light beam
Iris New technology, cost, although this is rapidly
changing
Fingerprint Users can create high FRR; some persons dislike
contact with device
Hand/Finger Geometry Userinterface is bulky; dislike contact with device
Face Recognition Face recognition is less accurate than othermethods
Voice Recognition Less accuracy; subject to background noise
Signature Recognition Less accuracy; not widely used yet, but has potential
with PDAs
Keystroke Recognition Less accuracy
12. FAR & FRR
• FAR(False Acceptance rate) – refers to how often the
system accepts someone it should reject
• FRR(False Rejection Rate) is how often the system
rejects someone it shouldn’t.
15. Summary
As biometric technology advances, the cost of systems will
decrease.
At the same time, biometrics systems will become increasingly
sophisticated and accurate.
Scientist will physical and behavioral traits will increase the
usefulness of biometrics.
The general public will gradually come to accept biometric
system.
16. References
Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls “Planning and Implementing
Your Network Security System.” Ventana Communications Group, Inc.
Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from
Attack.
McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct. 2002.
Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.
Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier
Publishing
Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human
Element of Security. Library Journal.
Editor's Notes
The graph tells us that at high security setting we need to accept that an authorized person might have to touch the sensor more than once.
Computer Access
Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed.
Physical Access
As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats.
Time and Attendance
Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared.
Handheld devices
As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs.
National Security
Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card.
Telecommunications
With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.