SlideShare a Scribd company logo
1 of 33
Biometric Techniques
MIA02108
Introduction to Biometric
Technologies and Applications
(Lecture 1-2)
1
What are Biometrics?
• ƒThe term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
ƒ
• For our use, biometrics refers to technologies for
measuring and analyzing a person's physiological
or behavioral characteristics.
• These characteristics are unique to individuals
hence can be used to verify or identify a person.
2
What are Biometrics?
“A biometric is a physiological or behavioral
characteristic of a human being that can
distinguish one person from another and that
theoretically can be used for identification or
verification of identity.”
3
Biometrics as Authentication
Authentication depends on
• Something you know, like a password or pass
phase
• Something you have, like a token
• Something you ARE, a measurable trait
Know
HaveBe
4
Something you know
• Passwords
• Pass phrases
• PINs
• Secret handshakes
5
Something you know
• Strong Passwords
1. Min. 8 characters
2. Include upper and lower cases
3. Contain numeric and non numeric characters.
4. Used for certain time period
5. Cannot contain a substring of the user name.
• Weak Passwords
• As user convenience increases, the strength of
authentication decreases.
6
Something you have
• Anything that is unique and that the user is
required to possess can be used as an
authenticating token.
• A token is generally issued to one user. It is
used with a password, PIN and user ID.
• If it has been lost or stolen, and if the user ID
presented with it matches, the user is
authenticated.
7
Something you have
• Token fall into two general categories:
1. Storage tokens
2. Dynamic tokens
8
Something you have
• Storage tokens: Token + Password
a) Smart cards
b) Unique information stored on the token that
identifies the processor.
c) Multi-factor authentication
d) Still has the weakness of passwords
e) Example: ATM card, and Employee ID card
etc.
9
Something you have
• Dynamic tokens: Token + Password + One
time authentication code
a) Storage token + One time authentication code
b) Strong authentication
c) But this is inconvenient for the user.
d) Example: Smart cards
10
Something you are
• Any physical trait that can be reliably measured
can be used to authenticate and is called a
biometric.
• A biometric is a physical or psychological trait
that can be measured, recorded, and quantified.
• By doing this, we can use that trait to obtain a
biometric enrollment.
• This way, we can say with a degree of certainty
that someone is the same person in future
biometric authentication based on their previous
enrollment authentications.
11
Problems with current security systems
• Based on Passwords, or ID/Swipe cards
• Can be Lost.
• Can be forgotten.
• Can be stolen and used by a thief/intruder to
access your data, bank accounts, car etc.
12
Problems with current security systems
• With increasing use of IT technology and need to
protect data, we have multiple
accounts/passwords.
• We can only remember so many passwords, so we
end up using things we know to create them
(birthdays, wife/mother name, dog, cat)
• Its is easy to crack passwords, because most of our
passwords are weak!
• If we create strong passwords (that should be
meaningless to us) we will forget them! And there
is no way to remember multiple such passwords.
13
Some statistics on User/Passwords
• Case Study: Telesis Community Credit
Union(CA), a California based financial
services provider that manages $1.2 billion in
assets.
• The VP of IT, lead a team to run a network
password cracker as part of an enterprise
security audit last year to see if employees
were following Telesis’ password policies.
• Result: They were far from doing so.
14
Some statistics on User/Passwords
• In fact within 30 seconds the team was able to
identify 80% of people’s passwords!
• The team asked employees to change their
passwords and comply with password policies.
• A few days later, the IT team run their
password cracking exercise again.
• This time they still were able to crack 70% of
the passwords!
15
• Traditional means of automatic
identification (before biometrics)
– Knowledge-based
• Use “something that you know”
• Examples: password, PIN
– Token-based
• Use “something that you have”
• Examples: credit card, smart card, keys
16
• Problems with traditional approaches
– Token may be lost, stolen or forgotten
– PIN may be forgotten or guessed by the imposters
• (25% of people seem to write their PIN on their
ATM card)
• Estimates of annual identity fraud damages per
year:
– $1 billion in welfare disbursements
– $1 billion in credit card transactions
– $1 billion in fraudulent cellular phone use
– $3 billion in ATM withdrawals
17
Frauds in industry happens in the
following situations:
• Bank transaction like ATM withdrawals
• Access to computers and emails
• Credit Card purchase
• Purchase of house, car, clothes or jewellery
• Getting official documents like birth certificates or
passports
• Obtaining court papers
• Drivers licence
• Getting into confidential workplace
18
• MANY PROBLEMS WITH CURRENT
SECURITY AUTHENTICATION
SYSTEMS.
• ANSWER: USE BIOMETRIC
TECHNOLOGY
• SSO (Single-Sign-On)
19
Some Examples of Different Biometrics
• Face
• Fingerprint
• Voice
• Iris
• Hand Geometry
• Retina Scan
• Signatures
• Keystroke scan
• DNA
20
• Requirements for an ideal biometric
– Universality
• Each person should have the characteristic
– Uniqueness
• No two persons should be the same in terms of the
characteristic
– Permanence
• The characteristic should not change
21
• Issues in a real biometric system
– Performance
• Identification accuracy, speed, robustness, resource
requirements
– Acceptability
• Extend to which people are willing to accept a particular
biometric identifier
– Faked protection
• How easy is it to fool the system by fraudulent methods
22
• “Physiological and/or behavioral characteristics”
1. Behavioral:
– User speaks.
– Types on a keyboard.
– Signs name.
2. Physiological:
– Fingerprint
– Hand
– Eyes
– Face
23
Key factor of Biometric System
• Enrollment
• Template
• Biometric algorithm
• Live template
• Verification
1. FAR (False acceptance rate)
2. FRR (False rejection rate)
24
Enrollment
• In a biometric system, a physical trait needs to
be recorded.
• Recording is referred to as an enrollment.
• Enrollment based on the creation of a template.
25
Template
• Digital representation of a physical trait.
• Long string of alphanumeric characters, based
on a biometric algorithm, characteristics or
features of the physical trait.
26
Biometric algorithm
• The biometric algorithm can be viewed as the
recipe for turning raw ingredients- like a
physical trait- into a digital representation in
the form of a template.
• The algorithm will also allow the matching of
an enrolled template with a new template just
created for verifying an identity, called a live
template.
27
Live template and verification
• Live template and stored template are
compared, the system calculates how closely
they match.
• If the match is close enough, a person will be
verified.
• FAR: Someone else is trying to verify you
• FRR: You fail to match against your own
template
28
• “Determine or Authenticate identity”
 Identification Systems:
– Who am I?
– Determine Identity
 Verification Systems:
– Am I who I claim to be?
– Authenticate Identity
29
• “Determine or authenticate identity”
 Verification Systems (cont):
– More accurate.
– Less expensive.
– Faster.
– More limited in function.
– Requires more effort by user.
30
 Benefits:
– Security
• PC, Network, Web
• Physical access to Buildings/Rooms
– Accountability
• Audit Trails
• Recordkeeping
– Convenience
– Savings
31
Books
• Biometrics for Network Security, Pearson,
Paul Reid
• Biometrics, McGraw Hill, John D. Woodward,
and Nicholos M. Orlans
32
Thank You
33

More Related Content

What's hot

Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric SecurityNed Hayes
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security MobileJerry Ruggieri
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationMayank Sachan
 

What's hot (20)

Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
3D password
3D password3D password
3D password
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric
 Biometric Biometric
Biometric
 

Similar to Basic of Biometrics Technology

74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access controlArsalan Mohammad
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfshivagreenevv
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptssuser7ec6af
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.pptJoshCasas1
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 

Similar to Basic of Biometrics Technology (20)

MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biomatric
BiomatricBiomatric
Biomatric
 
biometrics
biometricsbiometrics
biometrics
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Hisplus Biometrics
Hisplus Biometrics Hisplus Biometrics
Hisplus Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Basic of Biometrics Technology

  • 1. Biometric Techniques MIA02108 Introduction to Biometric Technologies and Applications (Lecture 1-2) 1
  • 2. What are Biometrics? • ƒThe term "biometrics" is derived from the Greek words bio (life) and metric (to measure). ƒ • For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics. • These characteristics are unique to individuals hence can be used to verify or identify a person. 2
  • 3. What are Biometrics? “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” 3
  • 4. Biometrics as Authentication Authentication depends on • Something you know, like a password or pass phase • Something you have, like a token • Something you ARE, a measurable trait Know HaveBe 4
  • 5. Something you know • Passwords • Pass phrases • PINs • Secret handshakes 5
  • 6. Something you know • Strong Passwords 1. Min. 8 characters 2. Include upper and lower cases 3. Contain numeric and non numeric characters. 4. Used for certain time period 5. Cannot contain a substring of the user name. • Weak Passwords • As user convenience increases, the strength of authentication decreases. 6
  • 7. Something you have • Anything that is unique and that the user is required to possess can be used as an authenticating token. • A token is generally issued to one user. It is used with a password, PIN and user ID. • If it has been lost or stolen, and if the user ID presented with it matches, the user is authenticated. 7
  • 8. Something you have • Token fall into two general categories: 1. Storage tokens 2. Dynamic tokens 8
  • 9. Something you have • Storage tokens: Token + Password a) Smart cards b) Unique information stored on the token that identifies the processor. c) Multi-factor authentication d) Still has the weakness of passwords e) Example: ATM card, and Employee ID card etc. 9
  • 10. Something you have • Dynamic tokens: Token + Password + One time authentication code a) Storage token + One time authentication code b) Strong authentication c) But this is inconvenient for the user. d) Example: Smart cards 10
  • 11. Something you are • Any physical trait that can be reliably measured can be used to authenticate and is called a biometric. • A biometric is a physical or psychological trait that can be measured, recorded, and quantified. • By doing this, we can use that trait to obtain a biometric enrollment. • This way, we can say with a degree of certainty that someone is the same person in future biometric authentication based on their previous enrollment authentications. 11
  • 12. Problems with current security systems • Based on Passwords, or ID/Swipe cards • Can be Lost. • Can be forgotten. • Can be stolen and used by a thief/intruder to access your data, bank accounts, car etc. 12
  • 13. Problems with current security systems • With increasing use of IT technology and need to protect data, we have multiple accounts/passwords. • We can only remember so many passwords, so we end up using things we know to create them (birthdays, wife/mother name, dog, cat) • Its is easy to crack passwords, because most of our passwords are weak! • If we create strong passwords (that should be meaningless to us) we will forget them! And there is no way to remember multiple such passwords. 13
  • 14. Some statistics on User/Passwords • Case Study: Telesis Community Credit Union(CA), a California based financial services provider that manages $1.2 billion in assets. • The VP of IT, lead a team to run a network password cracker as part of an enterprise security audit last year to see if employees were following Telesis’ password policies. • Result: They were far from doing so. 14
  • 15. Some statistics on User/Passwords • In fact within 30 seconds the team was able to identify 80% of people’s passwords! • The team asked employees to change their passwords and comply with password policies. • A few days later, the IT team run their password cracking exercise again. • This time they still were able to crack 70% of the passwords! 15
  • 16. • Traditional means of automatic identification (before biometrics) – Knowledge-based • Use “something that you know” • Examples: password, PIN – Token-based • Use “something that you have” • Examples: credit card, smart card, keys 16
  • 17. • Problems with traditional approaches – Token may be lost, stolen or forgotten – PIN may be forgotten or guessed by the imposters • (25% of people seem to write their PIN on their ATM card) • Estimates of annual identity fraud damages per year: – $1 billion in welfare disbursements – $1 billion in credit card transactions – $1 billion in fraudulent cellular phone use – $3 billion in ATM withdrawals 17
  • 18. Frauds in industry happens in the following situations: • Bank transaction like ATM withdrawals • Access to computers and emails • Credit Card purchase • Purchase of house, car, clothes or jewellery • Getting official documents like birth certificates or passports • Obtaining court papers • Drivers licence • Getting into confidential workplace 18
  • 19. • MANY PROBLEMS WITH CURRENT SECURITY AUTHENTICATION SYSTEMS. • ANSWER: USE BIOMETRIC TECHNOLOGY • SSO (Single-Sign-On) 19
  • 20. Some Examples of Different Biometrics • Face • Fingerprint • Voice • Iris • Hand Geometry • Retina Scan • Signatures • Keystroke scan • DNA 20
  • 21. • Requirements for an ideal biometric – Universality • Each person should have the characteristic – Uniqueness • No two persons should be the same in terms of the characteristic – Permanence • The characteristic should not change 21
  • 22. • Issues in a real biometric system – Performance • Identification accuracy, speed, robustness, resource requirements – Acceptability • Extend to which people are willing to accept a particular biometric identifier – Faked protection • How easy is it to fool the system by fraudulent methods 22
  • 23. • “Physiological and/or behavioral characteristics” 1. Behavioral: – User speaks. – Types on a keyboard. – Signs name. 2. Physiological: – Fingerprint – Hand – Eyes – Face 23
  • 24. Key factor of Biometric System • Enrollment • Template • Biometric algorithm • Live template • Verification 1. FAR (False acceptance rate) 2. FRR (False rejection rate) 24
  • 25. Enrollment • In a biometric system, a physical trait needs to be recorded. • Recording is referred to as an enrollment. • Enrollment based on the creation of a template. 25
  • 26. Template • Digital representation of a physical trait. • Long string of alphanumeric characters, based on a biometric algorithm, characteristics or features of the physical trait. 26
  • 27. Biometric algorithm • The biometric algorithm can be viewed as the recipe for turning raw ingredients- like a physical trait- into a digital representation in the form of a template. • The algorithm will also allow the matching of an enrolled template with a new template just created for verifying an identity, called a live template. 27
  • 28. Live template and verification • Live template and stored template are compared, the system calculates how closely they match. • If the match is close enough, a person will be verified. • FAR: Someone else is trying to verify you • FRR: You fail to match against your own template 28
  • 29. • “Determine or Authenticate identity”  Identification Systems: – Who am I? – Determine Identity  Verification Systems: – Am I who I claim to be? – Authenticate Identity 29
  • 30. • “Determine or authenticate identity”  Verification Systems (cont): – More accurate. – Less expensive. – Faster. – More limited in function. – Requires more effort by user. 30
  • 31.  Benefits: – Security • PC, Network, Web • Physical access to Buildings/Rooms – Accountability • Audit Trails • Recordkeeping – Convenience – Savings 31
  • 32. Books • Biometrics for Network Security, Pearson, Paul Reid • Biometrics, McGraw Hill, John D. Woodward, and Nicholos M. Orlans 32