SlideShare a Scribd company logo
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Subtopics
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
‘Biometrics’
Relation between BIOMETRICS and
COMPUTERS
• Authentication
• Make the work easier, faster
• Managing accounts and users with ease
Types based on characteristics
1. Physiological characteristics :
 Finger-Print
 Face recognition
 DNA
 Palm Print
 hand geometry
 Iris recognition
 odour/scent
2. Behavioural characteristics :
 Typing rhythm
 Gait
 Voice
Parameters
A.K. Bolle, R. Pankanti eds. (1999). Biometrics:
Personal Identification in Networked Society.
Kluwer Academic Publications
• Universality
• Uniqueness
• Permanence
• Measurability
• Performance
• Acceptability
• Circumvention
How Templates are Generated???
Applications
• Industries, Offices
• Schools, Colleges, Classes
• Smart cards, Passports, License
• Residential security (Door locks etc.)
• Gun safe
• Cell phones
Attendance systems
Security purpose
Future
Value Chain Market Sizing 2013-2017
($m USD X 10000)
0
1
2
3
4
5
6
2013 2014 2015 2016 2017
Biometrics Core
Technology
Technical Integrated
solution
Application/point solution
•Apple takes a Giant Leap in Future
“Biometrics”
•Intel's McAfee brings biometric authentication to cloud
storage
Companies in race for Biometrics
Conclusion
Biometrics is the safest and easiest way
for authentication and security. It has
its advantages as well as disadvantages
but finally it’s the newest and smartest
solution to security problems…
Questions???
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Summary
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
Subtopics
• Brief introduction
• Major contributor
• Methods:
1) On basic level
2) On professional level
• Major Issues
• Conclusion
The 6th Day
•Science Fiction Action Thriller Movie
•Directed by Roger Spottiswoode
•Starring Arnold Schwarzenegger
iPhone 5S fingerprint sensor hacked
by Germany's Chaos Computer Club
Chaos Computer Club (CCC)
Europe's largest association of hackers.
Major Contributor
• Prof. Tsutomu Matsumoto
• “gummy finger” concept:
1)Direct experiment
2)Professional level
Required Material
Freeplastic used for finger print mold
Gelatin sheet used for gummy
finger
Creation of fingerprint mold
Creation of gummy finger
Professional Level
Creation of gummy finger from latent
fingerprint mold
Hacking from the another
point of view
• In another test of biometric security, an Australian National
University student was able to hack through the device
using the information stored within the system itself.
• Chris Hill worked on discovering the way the system stored
the template information and then created images that had
enough similar “features” of the desired fingerprint to trick
the device.
• He said, “Really all I had to do was crack the code of the
template, so the images I created that were accepted by
the security system did not even look like thumbprints they
just displayed the characteristics required by the computer
program.”
Major Issues
• Other issues needing discussion are: What
happens when the part of the body getting
validated is somehow damaged, such as a
finger getting badly burned or deeply cut Or if
someone does manage to create a fake
fingerprint from your finger, how is that issue
resolved, since a finger can’t be easily
changed like a password can?
CONCLUSION
Biometric devices have flaws, but so does every
other security hardware and software solution.
Biometric security measures offer such a strong
level of security, that they cannot be thrown out
or ignored simply because a few flaws have been
discovered. They need to be incorporated into an
organization’s already strong defence in depth.
Biometrics, especially in conjunction with
passwords or passcards, offers the level of
security that we need at this stage in the
development of information security…
Biometrics and its hacking
Biometrics and its hacking

More Related Content

What's hot

Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
Shiva Krishna Chandra Shekar
 
biometrics
biometricsbiometrics
biometrics
Akhil Kumar
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
Cover page
Cover pageCover page
Cover page
ErmiyasSolomon2
 
PROJECT POWERPOINT
PROJECT POWERPOINTPROJECT POWERPOINT
PROJECT POWERPOINT
Simon Chege
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
parmsidhu
 
Final report
Final reportFinal report
Final report
Pranjul Mishra
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
DrKRBadhiti
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
Gagan Gowda
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
biometrics
biometricsbiometrics
biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Cover page
Cover pageCover page
Cover page
 
PROJECT POWERPOINT
PROJECT POWERPOINTPROJECT POWERPOINT
PROJECT POWERPOINT
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Final report
Final reportFinal report
Final report
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 

Viewers also liked

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Emanuela Marasco
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
Pratish Sardar
 
Biometrics
BiometricsBiometrics
Biometrics
Rare Input
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
Qafis
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 

Viewers also liked (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric
Biometric Biometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 

Similar to Biometrics and its hacking

Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Seetu
SeetuSeetu
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
Shiva Krishna Chandra Shekar
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
Biometrics
BiometricsBiometrics
Biometrics
biometrics12
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
CSCJournals
 
Biometrics
BiometricsBiometrics
Biometrics
Satish Chandra
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
Biometric technology 2023 report.pdf
Biometric technology 2023 report.pdfBiometric technology 2023 report.pdf
Biometric technology 2023 report.pdf
Ahmed N. Younis
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Deepák Soni
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 

Similar to Biometrics and its hacking (20)

Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Seetu
SeetuSeetu
Seetu
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometrics
BiometricsBiometrics
Biometrics
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric technology 2023 report.pdf
Biometric technology 2023 report.pdfBiometric technology 2023 report.pdf
Biometric technology 2023 report.pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 

Biometrics and its hacking

  • 1. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 2. Subtopics • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 4. Relation between BIOMETRICS and COMPUTERS • Authentication • Make the work easier, faster • Managing accounts and users with ease
  • 5. Types based on characteristics 1. Physiological characteristics :  Finger-Print  Face recognition  DNA  Palm Print  hand geometry  Iris recognition  odour/scent 2. Behavioural characteristics :  Typing rhythm  Gait  Voice
  • 6. Parameters A.K. Bolle, R. Pankanti eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications • Universality • Uniqueness • Permanence • Measurability • Performance • Acceptability • Circumvention
  • 7.
  • 8. How Templates are Generated???
  • 9. Applications • Industries, Offices • Schools, Colleges, Classes • Smart cards, Passports, License • Residential security (Door locks etc.) • Gun safe • Cell phones
  • 13.
  • 14. Value Chain Market Sizing 2013-2017 ($m USD X 10000) 0 1 2 3 4 5 6 2013 2014 2015 2016 2017 Biometrics Core Technology Technical Integrated solution Application/point solution
  • 15. •Apple takes a Giant Leap in Future “Biometrics” •Intel's McAfee brings biometric authentication to cloud storage
  • 16. Companies in race for Biometrics
  • 17. Conclusion Biometrics is the safest and easiest way for authentication and security. It has its advantages as well as disadvantages but finally it’s the newest and smartest solution to security problems…
  • 19.
  • 20. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 21. Summary • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 22. Subtopics • Brief introduction • Major contributor • Methods: 1) On basic level 2) On professional level • Major Issues • Conclusion
  • 23. The 6th Day •Science Fiction Action Thriller Movie •Directed by Roger Spottiswoode •Starring Arnold Schwarzenegger
  • 24. iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club Chaos Computer Club (CCC) Europe's largest association of hackers.
  • 25. Major Contributor • Prof. Tsutomu Matsumoto • “gummy finger” concept: 1)Direct experiment 2)Professional level
  • 26. Required Material Freeplastic used for finger print mold Gelatin sheet used for gummy finger
  • 30. Creation of gummy finger from latent fingerprint mold
  • 31. Hacking from the another point of view • In another test of biometric security, an Australian National University student was able to hack through the device using the information stored within the system itself. • Chris Hill worked on discovering the way the system stored the template information and then created images that had enough similar “features” of the desired fingerprint to trick the device. • He said, “Really all I had to do was crack the code of the template, so the images I created that were accepted by the security system did not even look like thumbprints they just displayed the characteristics required by the computer program.”
  • 32. Major Issues • Other issues needing discussion are: What happens when the part of the body getting validated is somehow damaged, such as a finger getting badly burned or deeply cut Or if someone does manage to create a fake fingerprint from your finger, how is that issue resolved, since a finger can’t be easily changed like a password can?
  • 33. CONCLUSION Biometric devices have flaws, but so does every other security hardware and software solution. Biometric security measures offer such a strong level of security, that they cannot be thrown out or ignored simply because a few flaws have been discovered. They need to be incorporated into an organization’s already strong defence in depth. Biometrics, especially in conjunction with passwords or passcards, offers the level of security that we need at this stage in the development of information security…