SlideShare a Scribd company logo
Biometric Techniques
MIA02108
Introduction to Biometric
Technologies and Applications
(Lecture 1-2)
1
What are Biometrics?
• ƒThe term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
ƒ
• For our use, biometrics refers to technologies for
measuring and analyzing a person's physiological
or behavioral characteristics.
• These characteristics are unique to individuals
hence can be used to verify or identify a person.
2
What are Biometrics?
“A biometric is a physiological or behavioral
characteristic of a human being that can
distinguish one person from another and that
theoretically can be used for identification or
verification of identity.”
3
Biometrics as Authentication
Authentication depends on
• Something you know, like a password or pass
phase
• Something you have, like a token
• Something you ARE, a measurable trait
Know
HaveBe
4
Something you know
• Passwords
• Pass phrases
• PINs
• Secret handshakes
5
Something you know
• Strong Passwords
1. Min. 8 characters
2. Include upper and lower cases
3. Contain numeric and non numeric characters.
4. Used for certain time period
5. Cannot contain a substring of the user name.
• Weak Passwords
• As user convenience increases, the strength of
authentication decreases.
6
Something you have
• Anything that is unique and that the user is
required to possess can be used as an
authenticating token.
• A token is generally issued to one user. It is
used with a password, PIN and user ID.
• If it has been lost or stolen, and if the user ID
presented with it matches, the user is
authenticated.
7
Something you have
• Token fall into two general categories:
1. Storage tokens
2. Dynamic tokens
8
Something you have
• Storage tokens: Token + Password
a) Smart cards
b) Unique information stored on the token that
identifies the processor.
c) Multi-factor authentication
d) Still has the weakness of passwords
e) Example: ATM card, and Employee ID card
etc.
9
Something you have
• Dynamic tokens: Token + Password + One
time authentication code
a) Storage token + One time authentication code
b) Strong authentication
c) But this is inconvenient for the user.
d) Example: Smart cards
10
Something you are
• Any physical trait that can be reliably measured
can be used to authenticate and is called a
biometric.
• A biometric is a physical or psychological trait
that can be measured, recorded, and quantified.
• By doing this, we can use that trait to obtain a
biometric enrollment.
• This way, we can say with a degree of certainty
that someone is the same person in future
biometric authentication based on their previous
enrollment authentications.
11
Problems with current security systems
• Based on Passwords, or ID/Swipe cards
• Can be Lost.
• Can be forgotten.
• Can be stolen and used by a thief/intruder to
access your data, bank accounts, car etc.
12
Problems with current security systems
• With increasing use of IT technology and need to
protect data, we have multiple
accounts/passwords.
• We can only remember so many passwords, so we
end up using things we know to create them
(birthdays, wife/mother name, dog, cat)
• Its is easy to crack passwords, because most of our
passwords are weak!
• If we create strong passwords (that should be
meaningless to us) we will forget them! And there
is no way to remember multiple such passwords.
13
Some statistics on User/Passwords
• Case Study: Telesis Community Credit
Union(CA), a California based financial
services provider that manages $1.2 billion in
assets.
• The VP of IT, lead a team to run a network
password cracker as part of an enterprise
security audit last year to see if employees
were following Telesis’ password policies.
• Result: They were far from doing so.
14
Some statistics on User/Passwords
• In fact within 30 seconds the team was able to
identify 80% of people’s passwords!
• The team asked employees to change their
passwords and comply with password policies.
• A few days later, the IT team run their
password cracking exercise again.
• This time they still were able to crack 70% of
the passwords!
15
• Traditional means of automatic
identification (before biometrics)
– Knowledge-based
• Use “something that you know”
• Examples: password, PIN
– Token-based
• Use “something that you have”
• Examples: credit card, smart card, keys
16
• Problems with traditional approaches
– Token may be lost, stolen or forgotten
– PIN may be forgotten or guessed by the imposters
• (25% of people seem to write their PIN on their
ATM card)
• Estimates of annual identity fraud damages per
year:
– $1 billion in welfare disbursements
– $1 billion in credit card transactions
– $1 billion in fraudulent cellular phone use
– $3 billion in ATM withdrawals
17
Frauds in industry happens in the
following situations:
• Bank transaction like ATM withdrawals
• Access to computers and emails
• Credit Card purchase
• Purchase of house, car, clothes or jewellery
• Getting official documents like birth certificates or
passports
• Obtaining court papers
• Drivers licence
• Getting into confidential workplace
18
• MANY PROBLEMS WITH CURRENT
SECURITY AUTHENTICATION
SYSTEMS.
• ANSWER: USE BIOMETRIC
TECHNOLOGY
• SSO (Single-Sign-On)
19
Some Examples of Different Biometrics
• Face
• Fingerprint
• Voice
• Iris
• Hand Geometry
• Retina Scan
• Signatures
• Keystroke scan
• DNA
20
• Requirements for an ideal biometric
– Universality
• Each person should have the characteristic
– Uniqueness
• No two persons should be the same in terms of the
characteristic
– Permanence
• The characteristic should not change
21
• Issues in a real biometric system
– Performance
• Identification accuracy, speed, robustness, resource
requirements
– Acceptability
• Extend to which people are willing to accept a particular
biometric identifier
– Faked protection
• How easy is it to fool the system by fraudulent methods
22
• “Physiological and/or behavioral characteristics”
1. Behavioral:
– User speaks.
– Types on a keyboard.
– Signs name.
2. Physiological:
– Fingerprint
– Hand
– Eyes
– Face
23
Key factor of Biometric System
• Enrollment
• Template
• Biometric algorithm
• Live template
• Verification
1. FAR (False acceptance rate)
2. FRR (False rejection rate)
24
Enrollment
• In a biometric system, a physical trait needs to
be recorded.
• Recording is referred to as an enrollment.
• Enrollment based on the creation of a template.
25
Template
• Digital representation of a physical trait.
• Long string of alphanumeric characters, based
on a biometric algorithm, characteristics or
features of the physical trait.
26
Biometric algorithm
• The biometric algorithm can be viewed as the
recipe for turning raw ingredients- like a
physical trait- into a digital representation in
the form of a template.
• The algorithm will also allow the matching of
an enrolled template with a new template just
created for verifying an identity, called a live
template.
27
Live template and verification
• Live template and stored template are
compared, the system calculates how closely
they match.
• If the match is close enough, a person will be
verified.
• FAR: Someone else is trying to verify you
• FRR: You fail to match against your own
template
28
• “Determine or Authenticate identity”
 Identification Systems:
– Who am I?
– Determine Identity
 Verification Systems:
– Am I who I claim to be?
– Authenticate Identity
29
• “Determine or authenticate identity”
 Verification Systems (cont):
– More accurate.
– Less expensive.
– Faster.
– More limited in function.
– Requires more effort by user.
30
 Benefits:
– Security
• PC, Network, Web
• Physical access to Buildings/Rooms
– Accountability
• Audit Trails
• Recordkeeping
– Convenience
– Savings
31
Books
• Biometrics for Network Security, Pearson,
Paul Reid
• Biometrics, McGraw Hill, John D. Woodward,
and Nicholos M. Orlans
32
Thank You
33

More Related Content

What's hot

Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
DrKRBadhiti
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
proma_goswami
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
Ned Hayes
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
Jerry Ruggieri
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group
 
3D password
3D password3D password
3D password
anuradha srivastava
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
Shiva Krishna Chandra Shekar
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
Mayank Sachan
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometric
 Biometric Biometric
Biometric
apekdm_91
 

What's hot (20)

Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
3D password
3D password3D password
3D password
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric
 Biometric Biometric
Biometric
 

Similar to Basic of Biometrics Technology

MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
20BAI017HarshVasisht
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
Arsalan Mohammad
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
NareshKireedula
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
shivagreenevv
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
ssuser7ec6af
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
MaidaShahbaz3
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
JoshCasas1
 
Biometrics
BiometricsBiometrics
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
RahulSagar79
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
Kurukshetra University, Kurukshetra
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
preethi3173
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biomatric
BiomatricBiomatric
Biomatric
NA000000
 
biometrics
biometricsbiometrics
biometrics
Akhil Kumar
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 
Hisplus Biometrics
Hisplus Biometrics Hisplus Biometrics
Hisplus Biometrics
Hisplus Systems Limited
 
Biometrics
BiometricsBiometrics
Biometrics
Raga Deepthi
 

Similar to Basic of Biometrics Technology (20)

MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biomatric
BiomatricBiomatric
Biomatric
 
biometrics
biometricsbiometrics
biometrics
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Hisplus Biometrics
Hisplus Biometrics Hisplus Biometrics
Hisplus Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 

Recently uploaded (20)

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 

Basic of Biometrics Technology

  • 1. Biometric Techniques MIA02108 Introduction to Biometric Technologies and Applications (Lecture 1-2) 1
  • 2. What are Biometrics? • ƒThe term "biometrics" is derived from the Greek words bio (life) and metric (to measure). ƒ • For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics. • These characteristics are unique to individuals hence can be used to verify or identify a person. 2
  • 3. What are Biometrics? “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” 3
  • 4. Biometrics as Authentication Authentication depends on • Something you know, like a password or pass phase • Something you have, like a token • Something you ARE, a measurable trait Know HaveBe 4
  • 5. Something you know • Passwords • Pass phrases • PINs • Secret handshakes 5
  • 6. Something you know • Strong Passwords 1. Min. 8 characters 2. Include upper and lower cases 3. Contain numeric and non numeric characters. 4. Used for certain time period 5. Cannot contain a substring of the user name. • Weak Passwords • As user convenience increases, the strength of authentication decreases. 6
  • 7. Something you have • Anything that is unique and that the user is required to possess can be used as an authenticating token. • A token is generally issued to one user. It is used with a password, PIN and user ID. • If it has been lost or stolen, and if the user ID presented with it matches, the user is authenticated. 7
  • 8. Something you have • Token fall into two general categories: 1. Storage tokens 2. Dynamic tokens 8
  • 9. Something you have • Storage tokens: Token + Password a) Smart cards b) Unique information stored on the token that identifies the processor. c) Multi-factor authentication d) Still has the weakness of passwords e) Example: ATM card, and Employee ID card etc. 9
  • 10. Something you have • Dynamic tokens: Token + Password + One time authentication code a) Storage token + One time authentication code b) Strong authentication c) But this is inconvenient for the user. d) Example: Smart cards 10
  • 11. Something you are • Any physical trait that can be reliably measured can be used to authenticate and is called a biometric. • A biometric is a physical or psychological trait that can be measured, recorded, and quantified. • By doing this, we can use that trait to obtain a biometric enrollment. • This way, we can say with a degree of certainty that someone is the same person in future biometric authentication based on their previous enrollment authentications. 11
  • 12. Problems with current security systems • Based on Passwords, or ID/Swipe cards • Can be Lost. • Can be forgotten. • Can be stolen and used by a thief/intruder to access your data, bank accounts, car etc. 12
  • 13. Problems with current security systems • With increasing use of IT technology and need to protect data, we have multiple accounts/passwords. • We can only remember so many passwords, so we end up using things we know to create them (birthdays, wife/mother name, dog, cat) • Its is easy to crack passwords, because most of our passwords are weak! • If we create strong passwords (that should be meaningless to us) we will forget them! And there is no way to remember multiple such passwords. 13
  • 14. Some statistics on User/Passwords • Case Study: Telesis Community Credit Union(CA), a California based financial services provider that manages $1.2 billion in assets. • The VP of IT, lead a team to run a network password cracker as part of an enterprise security audit last year to see if employees were following Telesis’ password policies. • Result: They were far from doing so. 14
  • 15. Some statistics on User/Passwords • In fact within 30 seconds the team was able to identify 80% of people’s passwords! • The team asked employees to change their passwords and comply with password policies. • A few days later, the IT team run their password cracking exercise again. • This time they still were able to crack 70% of the passwords! 15
  • 16. • Traditional means of automatic identification (before biometrics) – Knowledge-based • Use “something that you know” • Examples: password, PIN – Token-based • Use “something that you have” • Examples: credit card, smart card, keys 16
  • 17. • Problems with traditional approaches – Token may be lost, stolen or forgotten – PIN may be forgotten or guessed by the imposters • (25% of people seem to write their PIN on their ATM card) • Estimates of annual identity fraud damages per year: – $1 billion in welfare disbursements – $1 billion in credit card transactions – $1 billion in fraudulent cellular phone use – $3 billion in ATM withdrawals 17
  • 18. Frauds in industry happens in the following situations: • Bank transaction like ATM withdrawals • Access to computers and emails • Credit Card purchase • Purchase of house, car, clothes or jewellery • Getting official documents like birth certificates or passports • Obtaining court papers • Drivers licence • Getting into confidential workplace 18
  • 19. • MANY PROBLEMS WITH CURRENT SECURITY AUTHENTICATION SYSTEMS. • ANSWER: USE BIOMETRIC TECHNOLOGY • SSO (Single-Sign-On) 19
  • 20. Some Examples of Different Biometrics • Face • Fingerprint • Voice • Iris • Hand Geometry • Retina Scan • Signatures • Keystroke scan • DNA 20
  • 21. • Requirements for an ideal biometric – Universality • Each person should have the characteristic – Uniqueness • No two persons should be the same in terms of the characteristic – Permanence • The characteristic should not change 21
  • 22. • Issues in a real biometric system – Performance • Identification accuracy, speed, robustness, resource requirements – Acceptability • Extend to which people are willing to accept a particular biometric identifier – Faked protection • How easy is it to fool the system by fraudulent methods 22
  • 23. • “Physiological and/or behavioral characteristics” 1. Behavioral: – User speaks. – Types on a keyboard. – Signs name. 2. Physiological: – Fingerprint – Hand – Eyes – Face 23
  • 24. Key factor of Biometric System • Enrollment • Template • Biometric algorithm • Live template • Verification 1. FAR (False acceptance rate) 2. FRR (False rejection rate) 24
  • 25. Enrollment • In a biometric system, a physical trait needs to be recorded. • Recording is referred to as an enrollment. • Enrollment based on the creation of a template. 25
  • 26. Template • Digital representation of a physical trait. • Long string of alphanumeric characters, based on a biometric algorithm, characteristics or features of the physical trait. 26
  • 27. Biometric algorithm • The biometric algorithm can be viewed as the recipe for turning raw ingredients- like a physical trait- into a digital representation in the form of a template. • The algorithm will also allow the matching of an enrolled template with a new template just created for verifying an identity, called a live template. 27
  • 28. Live template and verification • Live template and stored template are compared, the system calculates how closely they match. • If the match is close enough, a person will be verified. • FAR: Someone else is trying to verify you • FRR: You fail to match against your own template 28
  • 29. • “Determine or Authenticate identity”  Identification Systems: – Who am I? – Determine Identity  Verification Systems: – Am I who I claim to be? – Authenticate Identity 29
  • 30. • “Determine or authenticate identity”  Verification Systems (cont): – More accurate. – Less expensive. – Faster. – More limited in function. – Requires more effort by user. 30
  • 31.  Benefits: – Security • PC, Network, Web • Physical access to Buildings/Rooms – Accountability • Audit Trails • Recordkeeping – Convenience – Savings 31
  • 32. Books • Biometrics for Network Security, Pearson, Paul Reid • Biometrics, McGraw Hill, John D. Woodward, and Nicholos M. Orlans 32