2. • In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified.
• A Biometric System is a system for the automated
recognition of individuals based on their behavioral and
biological characteristics.
• Depending on the context, in a biometric system, there are
two different ways to resolve a person’s identity
i. VERIFICATION
ii. IDENTIFICATION
3. Verification:- Comparing a sample against
a single stored template is called
verification
stored Template
? 1
Input Data
6. Physical biometrics:
Fingerprint—Analyzing fingertip patterns
Facial recognition/face location—Measuring facial
characteristics
Hand geometry—Measuring the shape of the hand
Iris scan—Analyzing features of colored ring of the eye.
Retinal scan—Analyzing blood vessels in the eye
Vascular patterns—Analyzing vein patterns
DNA—Analyzing genetic makeup.
7. Fingerprint Recognition is the identification by using patterns
of friction ridges and valleys on an individual's fingertips
which are unique to that individual.
8. o Face recognition uses the visible physical structure of the
face and analyses the spatial geometry of distinguishing
features in it to identify an individual.
o The distance between eyes
o Size of mouth
o It is sensitive to environmental variables such as dust and
lighting and other factors such as facial expression, facial
hair, hats and spectacles.
o Templates are typically between 80 and 1,000 bytes in
size.
10. The colored ring surrounding
The pupil of the eye
Iris patterns are formed in the eighth month of age and,
remain stable throughout the life of the individual
The iris can have approximately 270 distinct
characteristics including meshwork, striations, rings,
freckles.
high-quality black and white image of the iris is taken for
processing into a template that is typically around 256
bytes in size.
12. Retinal scans record the pattern of blood vessels at
the back of the eyeball
The biometric sensor projects a light into the eye
and requires close proximity and a high degree of
user co- operation.
Retinal patterns are affected by medical conditions,
for example high blood pressure or eye disease
Retinal scan templates are typically 40 to 100 bytes
in size.
13. Behavioral Biometrics:
• Speaker/voice recognition—Analyzing vocal
behavior
• Signature/handwriting—Analyzing signature
dynamics
• Keystroke/patterning—Measuring the time
spacing of typed words
14. 1. It’s a habitual speaking recognition.
2. Voice recognition systems analyze differences such
as in pitch, and tone.
3. This biometric is also sensitive to
environmental conditions such as background
noise.
4 . Template size can vary significantly according to
the length of the pass phrase.
Construct voice
reference template
Database
15. This biometric analyses signature characteristics
such as total time, speed, acceleration, character
direction, stroke order, stroke count, pressure and
contact with the writing surface.
These templates are typically 50 to 300 bytes in size.
17. • Similar to signature verification, this measures the
characteristics of an individual’s input of a pass phrase
or password. Characteristics may include total time,
speed with particular keys and pressure.
• Again the template size can vary significantly
depending on the length of the password or
phrase.
18. 1. Sensing
◦ User’s characteristic must be presented to a sensor
◦ Output is a function of:
Biometric measure
The way it is presented
Technical characteristics of sensor
2. Signal Processing
◦ Feature extraction
◦ Extract the desired biometric pattern
remove noise and signal losses
discard qualities that are not distinctive/repeatable
Determine if feature is of “good quality”
19. 3. Pattern matching
◦ Sample compared to original signal in database
◦ Closely matched patterns have “small distances” between them
◦ Distances will hardly ever be 0 (perfect match)
4. Decisions
◦ Decide if the match is close enough
◦ Trade-off:
false non-matches leads to false matches
20.
21. Something you have:
(token: key, card)
Something you know:
(Password, Pin )
Something you are:
(biometric :physiological, behavioral)
23. 1 . Location
2. Security
3. Task( identification,
verification)
4 . Number of users
5 . Circumstances(user’s)
6 . Existing data
24. i . Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and prison
security, and that has the potential to be used in a large range of
civilian application areas.
i i . Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs, workstations,
and computer networks.
i i i . It can be used during transactions conducted by telephone and
Internet (electronic commerce and electronic banking).
i v . In automobiles, biometrics can replace keys with keyless entry
devices.
25. Markets/sectors that are using
biometrics:
✓Government—Passports, national identification (ID) cards, voter
cards, driver’s licenses, social services, and so on
✓Transportation—Airport security, boarding passes, and commercial
driver’s licenses
✓Healthcare—Medical insurance cards, patient/employee identity cards
✓Financial—Bankcards, ATM cards, credit cards, and debit cards
✓Security—Access control and identity verifications, including time and
attendance
✓Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
27. • Biometrics cannot be lost, stolen or forgotten. Barring disease or
serious physical injury, the biometric is consistent and permanent.
• It is also secure in that the biometric itself cannot be socially
engineered, shared or used by others.
• There is no requirement to remember passwords, or PINs, thus
eliminating an overhead cost. The biometric is always available to
the individual;
• Coupled with a smart card, biometrics provide strong security for
any credentials on the smart card.
• Biometric system provide a high degree of confidence in user
identity.
• Organizations can implement recognition systems to obviate the
need to log onto a system manually.
28. i. Costly
ii. Missing body part problem.
iii. Lack of standardization
iv. While the reliability and the accuracy of biometric
devices continues to improve.
v. Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
vi. The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
29. Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
30. References:
• The Biometric Consortium - http://www.biometrics.org/
•National Institute of Standards and Technology - http://www.nist.gov/
•The Biometric Catalog - http://www.biometricscatalog.org/
•ITPro - http://www.computer.org/
•Georgia Institute of Technology - http://www.gatech.edu/
•http://www.biometricgroup.com/abio1/technology/researchtechnology
.htm
•http://www.conspiracyarchive.com/images/biometrics.jpg
• http://www.information-security-
topics.org/information_security_index/V
http://www.bromba.com/faq/fpfaqe.htm