This document discusses biometrics and biometric encryption. It begins with an introduction to biometrics and biometric principles and standards. It then discusses different methods to securely store cryptographic keys using biometrics, including biometric encryption. The document compares userID-based keys to biometric-based keys. It also covers advantages and threats of biometric systems, as well applications of biometric systems. In conclusion, the document provides an overview of biometrics and biometric encryption.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual making them suitable as long-term markers of human identity and may be employed by police or other authorities to identify individuals who wish to conceal their identity, or to identify people are incapacitated or deceased and thus unable to identify themselves, as in the aftermath of a natural disaster. When this fact is integrated for authentication purpose ,it creates an amazing lock system for Security purpose.Here we discuss what is Information Security ,how it is enhanced with the help of Fingerprint , its advantages, disadvantages.You will get a overall end to end scenario infront of you after going through all the slides. I have presented this topic in the Seminar presentation for completion of my M.Tech in Computer Science & Engineering.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : September 2019
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual making them suitable as long-term markers of human identity and may be employed by police or other authorities to identify individuals who wish to conceal their identity, or to identify people are incapacitated or deceased and thus unable to identify themselves, as in the aftermath of a natural disaster. When this fact is integrated for authentication purpose ,it creates an amazing lock system for Security purpose.Here we discuss what is Information Security ,how it is enhanced with the help of Fingerprint , its advantages, disadvantages.You will get a overall end to end scenario infront of you after going through all the slides. I have presented this topic in the Seminar presentation for completion of my M.Tech in Computer Science & Engineering.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : September 2019
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
BSI Biometrics Standards Presentation.
View BSI’s presentation about biometric standards, and get an overview of biometrics and identity management, and standards development for biometrics.
These slides use concepts from my (Jeff Funk) course entitled analyzing hi-tech opportunities to show how the cost and performance of biometrics are improving rapidly, making many new applications possible, particularly for fingerprinting in phones. Improvements in cameras and other electronics are making optical, capacitive, and ultrasound sensors better. Improvements in microprocessors are making the matching algorithms operate faster and with higher accuracy. We expect biometrics to become widely used in the next few years beginning with smart phones and followed by automobiles, homes, and offices. Better biometrics in smart phones will promote security and mobile commerce.
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
This slideshow is about biometrics. I covered the examples and also its whole functioning as well the cryptography used in the biometric system. The Advantages and disadvantages as well.
Similar to Biometric security using cryptography (20)
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
2. Introduction to Cryptography & Biometric Security
Principle & Standards Of Biometrics
Methods to secure a key using Biometrics
Biometric Encryption
User Based Cryptographic Keys & their Generation
Similarities & Differences Between UserID and Biometric-based Keys
Advantages & Threats to Biometric System
Applications of Biometric Systems
Conclusion
4. Cryptography is an important feature of computer security. It is dependent on
the secrecy of the secret or private key.
The user chooses an easily remembered pass code that is used to encrypt the
cryptographic key and this key is then stored in a database.
Security of the cryptographic key is weak due to practical problems of
remembering pass codes.
Since the pass code is not directly tied to a user, the system is unable to
differentiate between the legitimate user and the attacker.
5. “BIOS” ► life
“METRON” measurement
Study of automated methods for uniquely recognizing humans based upon
one or more intrinsic physical or behavioral traits for authentication
purposes.
Measurable characteristics of the individual based on their physiological
features / behavioral patterns that can be used to recognize or verify their
identity.
6. “Everyone in the world is unique, and this uniqueness
can be used for identity verification.”
Uniqueness : Distinction between individuals
Permanence : Resistance to ageing
Collectability : Ease to obtain a biometric for measurement.
Performance : Accuracy, speed, robustness of the biometric system.
Acceptability :Degree of approval of a technology.
Circumvention : Anomalies in the authentication system.
9. Fingerprints are unique to each individual and no two fingerprints are alike.
Fingerprint recognition is most widely accepted biometrics among the
technology being used today.
Converts the image of a fingerprint into a mathematical template of the print's
minutiae points.
Fingerprints contains pattern of ridges and valleys as well as minutia points.
Scanners : Optical scanners, Thermal scanners, Capacitances (solid state
scanner), Minutia based, Correlation based.
10. Creates a voiceprint based on the
inflection points of your speech,
emphasizing the highs and lows specific
to your way of talking.
11. An authenticam takes the pictures of
person’s iris. The image is analyzed and a
512 byte code is generated. The code is then
compared with the iris imprints in the
database and used to determine the
individual’s authorisation level.
Discriminate between individuals with
identical DNA like monozygotic twins.
12. A camera captures the image of the face.
Face Recognition Features and discrete areas are analyzed.
The system analyses the characteristic rhythm
Keystroke Dynamics of a person's typing.
A picture of the hand is taken. Features like3D
Hand Geometry shape, length, width of fingers and shape of
knuckles are recorded.
Signature Users signature digital graphic tablet. The
verification system analyses speed, stroke order, stroke
count and pressure .
13. First one involves remote template matching and key storage. In this method
biometric image is captured and compared with a corresponding template. If
the user is verified, the key is released.
Drawback :
The main problem here is use of an insecure storage media
14. Hide the cryptographic key within the enrollment template itself via a secret
bit-replacement algorithm. When the user is successfully authenticated, this
algorithm extracts the key bits from the appropriate locations and releases
the key.
Drawback:
The key will be retrieved from the same location in a template
each time a different user is authenticated
15. Using data derived directly from a biometric image is another method. In
this manner biometric templates are used as a cryptographic key.
Drawback:
Sensitivities due to environmental and physiological factors, and
compromising of the cryptographic keys stand as a big obstacle
16. A new and exciting technique is developed by Mytec Technologies Inc.
and named as Biometric Encryption™.
During the enrollment phase, the process combines the biometric image
with a digital key to create a secure block of data known as BioScrypt™ and
then the key is retreived using the biometric during the verification phase.
17. It provides a mechanism for the linking and retrieval of a digital key using a
biometric. This biometric might be a 2D image such as fingerprint, palm
print, face, iris or retina.
The resulting digital key is then used as a cryptographic key.
Note: The key is completely independent of the biometric data so that the
use of the biometric is not forfeited if the key is ever compromised
and can be easily modified or updated.
18. Cryptographic systems require a secret key or a random number which must
be tied to an individual through an identifier. This identifier indeed could be a
globally unique user id or biometric data.
Pseudorandom numbers are generated by a PRNG (pseudo random number
generator). The resulting pseudorandom number can be used directly as a
key or adjusted with user-dependent data (userID or biometric data).
19. User dependent key generation is done in two ways:
First the key generation algorithm could be modified by using the user-
dependent data.
Second PRNG could be modified which is accomplished using a front-end or
back-end approach. In front-end manner, the definition of the key is extended
to include a user-specific data component. In back-end manner,
pseudorandom numbers are treated as intermediate values and processed
further.
20. Similar to image-type biometrics, human voice is a good biometric to
generate a cryptographic key.
For the goal of unpredictability, i.e. applying automatic speech recognition to
recognize the password spoken and then simply using the password, as a
cryptographic key is way. But it is not secure.
21. One solution is a user utters a password to his/her device and that
device would generate a key. Repeated utterance of the same password
by the same user would improve the security of the key after successful
matches with his/her previous recorded utterances.
22. Both of them are different for each user.
Both of them are non-secret data. It is clear to see that userID data is non-secret.
Similarly biometric data is insecure in some sense because there is no practical
way to prevent the capture of user biometric data outside the biometric system.
23. Biometric data is obtained or derived from the user whereas userID is
assigned to a user.
Except the accidents biometric data can not be changed. But userID can easily
be changed.
Set of userIDs may be dense and it is easy to enumerate the set. Unlikely, set of
biometric data is not dense and this makes it infeasible to enumerate the
biometric data for each user.
24. Biometrics directly authenticates the person, not indirectly through a
password or token.
Biometrics features are difficult to steal; thereby making biometrics
authentication very strong.
The Biometrics feature is eminently portable, and is unlikely to be lost.
Another advantage of biometrics authentication systems is user cannot share
or forget his retina or fingerprint, while a password and username are easily
forgotten.
25. Software
Organizational
Physical
As with any IT security system, biometric-based security policy must
deal with the threats from the workers of the organization who can
damage any software or hardware component of the system. Attackers
may also change the statistical recognition parameters of the components
and decrease the recognition rates.
26. • Attacks on the biometric sensor/Acquisition device
Example: usage of artificial or disembodied dead features like a cut-off
finger in the fingerprint case.
• Communication channel attacks (man-in-the-middle attacks)
The first type is just eavesdropping. If the channel between the sensor
and the feature extraction unit or the one between the reference database and
the matching unit is attacked, the attacker will gain information about the
biometric data. In the second type, purposeful use or change is done to the
intercepted data for subsequent introduction back into the system
27. • Iris Recognition
It is Relatively expensive; requires large amount of computer storage; may
not be generally accepted by public.
• Voice Verification
Works well over the telephone but requires large amount of computer
storage; people's voices can change; background noises can interfere.
28. PC access and internet security (Computer network security, Internet
transaction, Laptop security, Application level security)
Physical area security(military, government, banking, voting, prisons)
Employee record check
Mobile phones: network access & theft protection
Mobile financial transaction: Credit cards & ATM cards.
29. Reliable user authentication is highly significant in this web enabled world.
Consequences of an insecure authentication system can be catastrophic and
may include loss of information, denial of service and loss of data integrity.
Biometric Encryption™ and Bioscrypt™ are high security means of protecting
the critical data of government, police departments, army and big firms.
The current generation of biometric identification devices offer cost and
performance advantages over manual security procedures.
All these methods have shown that, using biometrics for identification or
verification-based security systems and cryptosystems, is a promising
technology
30. www.ieeexplore.ieee.org
www.cscjournals.org
www.en.wikipedia.org
C.Soutar, D.Roberge, A.Stoianov, R.Gilroy and B.V.K.V.Kumar,
“Biometric Encryption™ using image processing”
M. Peyravian, S. M. Matyas, A. Roginsky, N. Zunic, “Generating user-
based Cryptographic keys and random numbers”