SlideShare a Scribd company logo
1 of 28
Biometric System Concepts
and Attacks
By:
Saif Salah
Rafah Amer Jaafar
Supervisor
Dr. Bashar M. Nema
OUTLINE
❖ What is biometrics and Why need Biometrics
❖ Advantages of biometrics and Disadvantages of biometrics
❖ Biometrics Vs Privacy
❖ Types of biometrics
❖ Comparison of Biometrics
❖ Components of Biometric System
❖ Attack Points in a Biometric system
❖ Known Technologies To Resist the Attacks
❖ The last word
What is biometrics
The term biometrics is derived from the Greek
words bio meaning life and metric meaning to
measure.
Biometrics is a multidisciplinary field
concerned with representing, measuring and
statistical analysis of unique physical and
behavioural characteristics e.g. fingerprints,
face, palm veins, etc. to be used as an
individualized code for recognition [1].
Why need Biometrics
The need and the complexity of recognition of
humans has never been in this great in our history
as it is now, so that, the need for fast and accurate
new technology is increasing day by day, Which
are used in Verification (control access systems),
or Identification (surveillance systems).
The first use of biometrics was to link between
identity documents and their holders through a
face photos as in a passport.
Today the Authentication by biometric verification
is becoming increasingly common and an
indispensable tool to overcome the difficulties
being faced in security systems [1].
Advantages and Benefits of biometrics
❖ Hard to fake or steal, unlike passwords or Key.
❖ Fast Verify a large number of individuals in short
time.
❖ Fast Identify the individual from a very huge
number of people.
❖ Ease of use and convenience (Nothing to forget
or lose it).
❖ Simple change along the user's life.(long life)
❖ Non-transferrable from one to another.
❖ Templates take up less storage space.
❖ Continuous authentication in behavioural
identifiers.
Disadvantages of biometrics
❖ It is costly to get up a biometric system and
running it.
❖ If the system fails to capture all of the
biometric data, it can lead to failure in
identifying the person required.
❖ Databases holding biometric data can still be
hacked.
❖ If a user gets injured or burn, then a biometric
authentication system may fail to identify
them.
❖ Errors such as false rejects can still happen.
Biometrics Vs Privacy
❖ Using biometrics can help to protect privacy
by combating identity fraud, But it is also
can reveal an element of personal privacy.
❖ The biometrics are not usually ‘secret’, and
cannot be easily changed, destroyed or
declared invalid in case it was stolen, this
prevent using it again [2].
Types of biometrics
The two main types of biometric identifiers
depend on either physiological characteristics
or behavioural characteristics.
❑ Physiological identifiers
relate to the unique composition of the user,
include:
● Face recognition.
● Fingerprints.
● Iris recognition.
● DNA matching.
Types of biometrics
❑ Behavioural identifiers
It’s the unique ways in which individuals
act, including
● Handwriting
● keystroke
● Voice recognition.
● Walking speed
● Gestures.
Comparison of Biometrics [3]
Components of Biometric System
The biometric systems
have four basic modules
which are sensor module,
feature extractor module,
matcher module and
decision module [4].
These four modules are
necessary in any
biometric system to
acquire and process raw
biometric data and
convert it into some useful
information. The block
diagram of biometric
system is shown in fig.
1- Sensor Module
In this type of module raw biometric data is
captured by the sensor and it scans the
biometric trait to convert it into digital form.
Components of Biometric System
After converting it to
digital form, this module
transmits the data to
feature extraction module.
2- Feature Extraction Module
It processes the raw data captured by sensor
and generate a biometric template. It extracts
the necessary features from the raw data
which needs much attention because
essential features must be extracted in an
optimal way. It basically removes noise from
the input sample and transmits the sample to
the matcher module.
Components of Biometric System
3- Matcher Module
This module compares the input sample
with the templates being stored in the
database using matching algorithm and
produces match score.
The resulting match score is transmitted to
the decision module.
Components of Biometric System
4- Decision Module
After accepting the match score from
matcher module, it compares the matching
score against the predefined security
threshold. If match score is greater than
predefined security threshold it will accept
the individual otherwise reject it.
Components of Biometric System
Attack Points in a Biometric system
Biometric systems provide great advantages over
traditional systems but they are vulnerable to
attacks. There are eight attack points in biometric
system which can be attacked as shown in the
figure below [5,6].
Sensor
(1) Fake
Biometric
Feature
Extractor
Matcher Application
Database
(2) Replay
Biometric
(3) Override Feature
Extractor
(4) Modify
Feature Vector
(6) Modify
Template
(7) Attacking
the Chanel
(8) Override Final
Decision
(5) Override
Matcher
Attack Points in a Biometric system
(1) Fake Biometric
In this type of attack a fake biometric such as a
fake finger or image of the face is presented at the
sensor.
(2) Replay Biometric
Biometric Signals In this mode of attack a
recorded signal is replayed to the system
bypassing to the sensor.
Attack Points in a Biometric system
(3) Override Feature Extractor
The feature extractor is forced to produce feature
sets chosen by the attacker, instead of the actual
values generated from the data obtained from the
sensor.
(4) Modify Feature Vector
The features extracted using the data obtained
from the sensor is replaced with a different
fraudulent feature set.
(5) Override Matcher
The matcher component is attacked to produce
pre-selected match scores regardless of the input
feature set.
Attack Points in a Biometric system
(6) Modify Template
Modifying one or more templates in the database,
which could result either in authorizing a fraud or
denying service to the person, associated with the
corrupted template.
(7) Attacking the Chanel between Database and the
Matcher
Data traveling from the stored template to the
matcher is intercepted and modified in this form of
attack.
(8) Override Final Decision
Here the final match decision is overridden by the
hacker disabling the entire authentication system.
Known Technologies To Resist the
Attacks [6,7]
1- Liveness Detection Mechanisms
Liveness detection can be used to thwart the
attacks at attack point: 1(attacking the sensor).
Liveness detection refers to the ability of the
system to distinguish between a sample feature
provided by a live human being and a copy of a
feature provided by an artifact. Using extra
hardware to acquire life signs like:
1- pulse detection
2- blood pressure
2- thermal measurement;
4- head, face, eye and pupil movement
Known Technologies To Resist the
Attacks
2- Steganographic and Watermarking Techniques
Steganographic and Watermarking techniques are
used to resist attacks at the attack points 2 and 7
(Channel between the sensor and feature extractor
and also the channel between the stored template
and the matcher).
3- Soft biometrics
Soft biometrics can be used to thwart attacks at the
attack points 1 and 8 (attacks on the sensor and
decision maker). Soft Biometric traits are those
characteristics that provide some information about
the individual, but lack the distinctiveness or
permanence to sufficiently differentiate any two
individuals (gender, ethnicity, age, height, weight
etc).
4- Multi-modal Biometric Systems
Multi-modal biometric systems can be used to
resist spoofing attacks (attacks at point 1). Multi-
modal Biometric systems use multiple
representations of a single biometric, a single
biometric with multiple matchers or multiple
biometric identifiers.
The next table gives a comparison of the
advantages and drawbacks of the different
techniques to prevent attacks.
Known Technologies To Resist the
Attacks
Table : Advantages and drawbacks of the different
protection techniques [7].
The last word
The last word
The last word
The last word
References
❖ [1] Marcel, Sébastien, Mark S. Nixon, and Stan Z. Li. Handbook of biometric anti-spoofing. Vol. 1. New
York: Springer, 2014.
❖ [2] Dunstone, Ted, and Neil Yager. Biometric system and data analysis: Design, evaluation, and data
mining. Springer Science & Business Media, 2008.
❖ [3] Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT Professional
3.1 (2001): 27-32.
❖ [4] Jain, Rubal, and Chander Kant. "Attacks on biometric systems: an overview." International Journal of
Advances in Scientific Research 1.07 (2015): 283-288.
❖ [5] Campisi, Patrizio. Security and privacy in biometrics. Vol. 24. London, UK:: Springer, 2013.
❖ [6] Roberts, Chris. "Biometric attack vectors and defences.“ Computers & Security 26.1 (2007): 14-25.
❖ [7] Ambalakat, Parvathi. "Security of biometric authentication systems." 21st Computer Science Seminar.
2005.

More Related Content

What's hot

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 

What's hot (20)

Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Biometric System ‎Concepts and Attacks

IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET Journal
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...International Center for Biometric Research
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...sipij
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfintroductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfJohnLagman3
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 

Similar to Biometric System ‎Concepts and Attacks (20)

IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
 
R01754129132
R01754129132R01754129132
R01754129132
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfintroductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 

Recently uploaded

9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Servicenishacall1
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxSuji236384
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxRizalinePalanog2
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑Damini Dixit
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxBhagirath Gogikar
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Joonhun Lee
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oManavSingh202607
 

Recently uploaded (20)

9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 o
 

Biometric System ‎Concepts and Attacks

  • 1. Biometric System Concepts and Attacks By: Saif Salah Rafah Amer Jaafar Supervisor Dr. Bashar M. Nema
  • 2. OUTLINE ❖ What is biometrics and Why need Biometrics ❖ Advantages of biometrics and Disadvantages of biometrics ❖ Biometrics Vs Privacy ❖ Types of biometrics ❖ Comparison of Biometrics ❖ Components of Biometric System ❖ Attack Points in a Biometric system ❖ Known Technologies To Resist the Attacks ❖ The last word
  • 3. What is biometrics The term biometrics is derived from the Greek words bio meaning life and metric meaning to measure. Biometrics is a multidisciplinary field concerned with representing, measuring and statistical analysis of unique physical and behavioural characteristics e.g. fingerprints, face, palm veins, etc. to be used as an individualized code for recognition [1].
  • 4. Why need Biometrics The need and the complexity of recognition of humans has never been in this great in our history as it is now, so that, the need for fast and accurate new technology is increasing day by day, Which are used in Verification (control access systems), or Identification (surveillance systems). The first use of biometrics was to link between identity documents and their holders through a face photos as in a passport. Today the Authentication by biometric verification is becoming increasingly common and an indispensable tool to overcome the difficulties being faced in security systems [1].
  • 5. Advantages and Benefits of biometrics ❖ Hard to fake or steal, unlike passwords or Key. ❖ Fast Verify a large number of individuals in short time. ❖ Fast Identify the individual from a very huge number of people. ❖ Ease of use and convenience (Nothing to forget or lose it). ❖ Simple change along the user's life.(long life) ❖ Non-transferrable from one to another. ❖ Templates take up less storage space. ❖ Continuous authentication in behavioural identifiers.
  • 6. Disadvantages of biometrics ❖ It is costly to get up a biometric system and running it. ❖ If the system fails to capture all of the biometric data, it can lead to failure in identifying the person required. ❖ Databases holding biometric data can still be hacked. ❖ If a user gets injured or burn, then a biometric authentication system may fail to identify them. ❖ Errors such as false rejects can still happen.
  • 7. Biometrics Vs Privacy ❖ Using biometrics can help to protect privacy by combating identity fraud, But it is also can reveal an element of personal privacy. ❖ The biometrics are not usually ‘secret’, and cannot be easily changed, destroyed or declared invalid in case it was stolen, this prevent using it again [2].
  • 8. Types of biometrics The two main types of biometric identifiers depend on either physiological characteristics or behavioural characteristics. ❑ Physiological identifiers relate to the unique composition of the user, include: ● Face recognition. ● Fingerprints. ● Iris recognition. ● DNA matching.
  • 9. Types of biometrics ❑ Behavioural identifiers It’s the unique ways in which individuals act, including ● Handwriting ● keystroke ● Voice recognition. ● Walking speed ● Gestures.
  • 11. Components of Biometric System The biometric systems have four basic modules which are sensor module, feature extractor module, matcher module and decision module [4]. These four modules are necessary in any biometric system to acquire and process raw biometric data and convert it into some useful information. The block diagram of biometric system is shown in fig.
  • 12. 1- Sensor Module In this type of module raw biometric data is captured by the sensor and it scans the biometric trait to convert it into digital form. Components of Biometric System After converting it to digital form, this module transmits the data to feature extraction module.
  • 13. 2- Feature Extraction Module It processes the raw data captured by sensor and generate a biometric template. It extracts the necessary features from the raw data which needs much attention because essential features must be extracted in an optimal way. It basically removes noise from the input sample and transmits the sample to the matcher module. Components of Biometric System
  • 14. 3- Matcher Module This module compares the input sample with the templates being stored in the database using matching algorithm and produces match score. The resulting match score is transmitted to the decision module. Components of Biometric System
  • 15. 4- Decision Module After accepting the match score from matcher module, it compares the matching score against the predefined security threshold. If match score is greater than predefined security threshold it will accept the individual otherwise reject it. Components of Biometric System
  • 16. Attack Points in a Biometric system Biometric systems provide great advantages over traditional systems but they are vulnerable to attacks. There are eight attack points in biometric system which can be attacked as shown in the figure below [5,6]. Sensor (1) Fake Biometric Feature Extractor Matcher Application Database (2) Replay Biometric (3) Override Feature Extractor (4) Modify Feature Vector (6) Modify Template (7) Attacking the Chanel (8) Override Final Decision (5) Override Matcher
  • 17. Attack Points in a Biometric system (1) Fake Biometric In this type of attack a fake biometric such as a fake finger or image of the face is presented at the sensor. (2) Replay Biometric Biometric Signals In this mode of attack a recorded signal is replayed to the system bypassing to the sensor.
  • 18. Attack Points in a Biometric system (3) Override Feature Extractor The feature extractor is forced to produce feature sets chosen by the attacker, instead of the actual values generated from the data obtained from the sensor. (4) Modify Feature Vector The features extracted using the data obtained from the sensor is replaced with a different fraudulent feature set. (5) Override Matcher The matcher component is attacked to produce pre-selected match scores regardless of the input feature set.
  • 19. Attack Points in a Biometric system (6) Modify Template Modifying one or more templates in the database, which could result either in authorizing a fraud or denying service to the person, associated with the corrupted template. (7) Attacking the Chanel between Database and the Matcher Data traveling from the stored template to the matcher is intercepted and modified in this form of attack. (8) Override Final Decision Here the final match decision is overridden by the hacker disabling the entire authentication system.
  • 20. Known Technologies To Resist the Attacks [6,7] 1- Liveness Detection Mechanisms Liveness detection can be used to thwart the attacks at attack point: 1(attacking the sensor). Liveness detection refers to the ability of the system to distinguish between a sample feature provided by a live human being and a copy of a feature provided by an artifact. Using extra hardware to acquire life signs like: 1- pulse detection 2- blood pressure 2- thermal measurement; 4- head, face, eye and pupil movement
  • 21. Known Technologies To Resist the Attacks 2- Steganographic and Watermarking Techniques Steganographic and Watermarking techniques are used to resist attacks at the attack points 2 and 7 (Channel between the sensor and feature extractor and also the channel between the stored template and the matcher). 3- Soft biometrics Soft biometrics can be used to thwart attacks at the attack points 1 and 8 (attacks on the sensor and decision maker). Soft Biometric traits are those characteristics that provide some information about the individual, but lack the distinctiveness or permanence to sufficiently differentiate any two individuals (gender, ethnicity, age, height, weight etc).
  • 22. 4- Multi-modal Biometric Systems Multi-modal biometric systems can be used to resist spoofing attacks (attacks at point 1). Multi- modal Biometric systems use multiple representations of a single biometric, a single biometric with multiple matchers or multiple biometric identifiers. The next table gives a comparison of the advantages and drawbacks of the different techniques to prevent attacks. Known Technologies To Resist the Attacks
  • 23. Table : Advantages and drawbacks of the different protection techniques [7].
  • 28. References ❖ [1] Marcel, Sébastien, Mark S. Nixon, and Stan Z. Li. Handbook of biometric anti-spoofing. Vol. 1. New York: Springer, 2014. ❖ [2] Dunstone, Ted, and Neil Yager. Biometric system and data analysis: Design, evaluation, and data mining. Springer Science & Business Media, 2008. ❖ [3] Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT Professional 3.1 (2001): 27-32. ❖ [4] Jain, Rubal, and Chander Kant. "Attacks on biometric systems: an overview." International Journal of Advances in Scientific Research 1.07 (2015): 283-288. ❖ [5] Campisi, Patrizio. Security and privacy in biometrics. Vol. 24. London, UK:: Springer, 2013. ❖ [6] Roberts, Chris. "Biometric attack vectors and defences.“ Computers & Security 26.1 (2007): 14-25. ❖ [7] Ambalakat, Parvathi. "Security of biometric authentication systems." 21st Computer Science Seminar. 2005.