SlideShare a Scribd company logo
Franck Franchin
1
Franck Franchin - © 2013
 Automated process to identity and authenticate
humans based on one or more physical or
behavioral traits
 Based on assessment that each human being is
unique and that this uniqueness allows
identification
2
Franck Franchin - © 2013
 You have to prove who you are ?
◦ Something you know: PIN, password...
◦ Something you have: key, token, card...
◦ Something you are: a biometric…
 Biometrics encompass:
◦ Voice
◦ Fingerprint & Palmprint
◦ Facial Recognition
◦ Eye (iris, retinal patterns)
◦ Vein
 Because it can be fooled, it should be implemented into
2-factor or 3-factor authentication
3
Franck Franchin - © 2013
 Unique ID
 Third Authentication Factor
 Hard to forge by basic hackers
 Forget, Loss, Stealth and Borrow most difficult…
 Allows to know WHO did WHAT, WHERE and
WHEN
 Unequivocally link to acting person
(accountability)
4
Franck Franchin - © 2013
 Success Rate Issue (dirt for finger, diabete for
eye, flu for voice)
 Privacy
 Revocation
 Cost
 Permanence risk (resistance to ageing)
 Acceptability by people
5
Franck Franchin - © 2013
 Physiological
◦ fingerprint recognition
◦ palm print recognition
◦ palm geometry
◦ facial recognition
◦ voice recognition
◦ retinal scans
◦ iris scans
 Behavorial
◦ typing rhythm/patterns (keystroke)
◦ accents and speaking rhythms
◦ gait (locomotion behavior)
◦ writing speed and pressure (signature matching)
6
Franck Franchin - © 2013
 Not two fingerprints are alike
 High level of acceptance by people
 Template easily generated from minutiae points
and/or ridges and/or valleys
 Different types of sensors : thermal, optical,
capacitance, minutiae-based
7
Franck Franchin - © 2013
 Ability of discriminating identical twins with same
DNA
 Low level of acceptance by people
 Relatively expensive (processing power and
storage)
8
Franck Franchin - © 2013
 Police
 Immigration
 ATM
 School (library, lunch, …)
 Payment in Stores
 Site Access Control
9
Franck Franchin - © 2013
 Enrollment
◦ Samples of the biometric are captured and processed
◦ Unique features of these samples are extracted and
computed which generates a ‘template’
◦ From this template, it’s not possible to go back to the
original biometric
 Authentication or Identification
◦ The biometrics system captures the biometric of the ’live
biometric’ and searches for a match against its database
of templates
 Revocation
10
Franck Franchin - © 2013
 Biometrics matching process is based on
threshold detection - False acceptances/rejections
 Sensor tolerance
 Anonymation information loss (for some
algorythms)
 Some people categories always rejected (twins,
aged people) ?
 Attended or unattended system (fake/dead
finger) ?
11
Franck Franchin - © 2013
 Aside IT regular vulnerabilities and risks,
biometrics solutions are sensitive to specific
threats :
◦ Attack to the biometric sensor
◦ Spoofing (cutoff finger, gummy finger, photography of iris
pattern)
◦ Mimicry (signature and voice)
◦ Eavesdropping or man-in-the middle between the sensor
and the template repository
◦ Template insertion using compromise IT or admin !
12
Franck Franchin - © 2013
 How to protect the biometric template ?
◦ Hashing : template are protected, revokable and rewable
◦ But one has to prove it’s impossible to get back to the original key
(one-way function cyphering)
◦ The best solution : public-key encryption which cyphers templates
and deciphers only during access control
◦ Mix architectures involve session keys too (public-key and private
key schemes)
 Innovative ways
◦ During the enrollment process, combining the biometric image
with a digital key to create a secure block of data. Key can be
then retrieved using the biometric ! (but the key is independent of
the biometric, mathematically speaking !)
13
Franck Franchin - © 2013
 Once compromise, a biometric trait wouldn’t be reused –
hence if someone copy your finger, the only way to
revoke your finger would be to cut it ? Hum…
 Physical biometric is different from store template !
 If your password is lost or compromised, you have to
change your password AND the password access
control storage…
 In biometrics, you can’t change your ‘pwd’ (aka your
biometric) but you can revoke the stored encrypted
template
14

More Related Content

Viewers also liked

Cryptographie quantique
Cryptographie quantiqueCryptographie quantique
Cryptographie quantique
Franck Franchin
 
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures CritiquesCours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
Franck Franchin
 
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationaleles Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
cours fsjes
 
Monnaie
MonnaieMonnaie
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Franck Franchin
 
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de rechercheIntelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
Mohamed Heny SELMI
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSAHouda Elmoutaoukil
 
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corrigesCours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
Habiba MEZYANI
 
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaireInitiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
Actions-Finance
 
Comptabilite-analytique
 Comptabilite-analytique Comptabilite-analytique
Comptabilite-analytiqueMejdoubi Amal
 
Cours de finances_publiques-1
Cours de finances_publiques-1Cours de finances_publiques-1
Cours de finances_publiques-1rajaa224
 
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésCours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
Franck Franchin
 
Exercices d analyse financière
Exercices d analyse financièreExercices d analyse financière
Exercices d analyse financière
Abde LLatif
 
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’informationAudit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Abbes Rharrab
 
Le Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’EntrepriseLe Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’Entreprise
claude wastiaux
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
Franck Franchin
 
Compta analyt cours exercices
Compta analyt cours exercicesCompta analyt cours exercices
Compta analyt cours exercicesGEANT_ATLAS
 
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
HB1-Sela
 
Alphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQLAlphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQL
Alphorm
 

Viewers also liked (20)

Cryptographie quantique
Cryptographie quantiqueCryptographie quantique
Cryptographie quantique
 
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures CritiquesCours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
 
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationaleles Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
 
Monnaie
MonnaieMonnaie
Monnaie
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
 
Speak English
Speak EnglishSpeak English
Speak English
 
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de rechercheIntelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
 
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corrigesCours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
 
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaireInitiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
 
Comptabilite-analytique
 Comptabilite-analytique Comptabilite-analytique
Comptabilite-analytique
 
Cours de finances_publiques-1
Cours de finances_publiques-1Cours de finances_publiques-1
Cours de finances_publiques-1
 
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésCours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
 
Exercices d analyse financière
Exercices d analyse financièreExercices d analyse financière
Exercices d analyse financière
 
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’informationAudit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
 
Le Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’EntrepriseLe Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’Entreprise
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
 
Compta analyt cours exercices
Compta analyt cours exercicesCompta analyt cours exercices
Compta analyt cours exercices
 
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
 
Alphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQLAlphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQL
 

Similar to Biometrics - Basics

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
Biometrics
BiometricsBiometrics
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics system
Darshan Parate
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometric
BiometricBiometric
Biometric
NikhilKumar1203
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
Kalyanam Kiran
 

Similar to Biometrics - Basics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics system
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometric
BiometricBiometric
Biometric
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 

Recently uploaded

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Biometrics - Basics

  • 2. Franck Franchin - © 2013  Automated process to identity and authenticate humans based on one or more physical or behavioral traits  Based on assessment that each human being is unique and that this uniqueness allows identification 2
  • 3. Franck Franchin - © 2013  You have to prove who you are ? ◦ Something you know: PIN, password... ◦ Something you have: key, token, card... ◦ Something you are: a biometric…  Biometrics encompass: ◦ Voice ◦ Fingerprint & Palmprint ◦ Facial Recognition ◦ Eye (iris, retinal patterns) ◦ Vein  Because it can be fooled, it should be implemented into 2-factor or 3-factor authentication 3
  • 4. Franck Franchin - © 2013  Unique ID  Third Authentication Factor  Hard to forge by basic hackers  Forget, Loss, Stealth and Borrow most difficult…  Allows to know WHO did WHAT, WHERE and WHEN  Unequivocally link to acting person (accountability) 4
  • 5. Franck Franchin - © 2013  Success Rate Issue (dirt for finger, diabete for eye, flu for voice)  Privacy  Revocation  Cost  Permanence risk (resistance to ageing)  Acceptability by people 5
  • 6. Franck Franchin - © 2013  Physiological ◦ fingerprint recognition ◦ palm print recognition ◦ palm geometry ◦ facial recognition ◦ voice recognition ◦ retinal scans ◦ iris scans  Behavorial ◦ typing rhythm/patterns (keystroke) ◦ accents and speaking rhythms ◦ gait (locomotion behavior) ◦ writing speed and pressure (signature matching) 6
  • 7. Franck Franchin - © 2013  Not two fingerprints are alike  High level of acceptance by people  Template easily generated from minutiae points and/or ridges and/or valleys  Different types of sensors : thermal, optical, capacitance, minutiae-based 7
  • 8. Franck Franchin - © 2013  Ability of discriminating identical twins with same DNA  Low level of acceptance by people  Relatively expensive (processing power and storage) 8
  • 9. Franck Franchin - © 2013  Police  Immigration  ATM  School (library, lunch, …)  Payment in Stores  Site Access Control 9
  • 10. Franck Franchin - © 2013  Enrollment ◦ Samples of the biometric are captured and processed ◦ Unique features of these samples are extracted and computed which generates a ‘template’ ◦ From this template, it’s not possible to go back to the original biometric  Authentication or Identification ◦ The biometrics system captures the biometric of the ’live biometric’ and searches for a match against its database of templates  Revocation 10
  • 11. Franck Franchin - © 2013  Biometrics matching process is based on threshold detection - False acceptances/rejections  Sensor tolerance  Anonymation information loss (for some algorythms)  Some people categories always rejected (twins, aged people) ?  Attended or unattended system (fake/dead finger) ? 11
  • 12. Franck Franchin - © 2013  Aside IT regular vulnerabilities and risks, biometrics solutions are sensitive to specific threats : ◦ Attack to the biometric sensor ◦ Spoofing (cutoff finger, gummy finger, photography of iris pattern) ◦ Mimicry (signature and voice) ◦ Eavesdropping or man-in-the middle between the sensor and the template repository ◦ Template insertion using compromise IT or admin ! 12
  • 13. Franck Franchin - © 2013  How to protect the biometric template ? ◦ Hashing : template are protected, revokable and rewable ◦ But one has to prove it’s impossible to get back to the original key (one-way function cyphering) ◦ The best solution : public-key encryption which cyphers templates and deciphers only during access control ◦ Mix architectures involve session keys too (public-key and private key schemes)  Innovative ways ◦ During the enrollment process, combining the biometric image with a digital key to create a secure block of data. Key can be then retrieved using the biometric ! (but the key is independent of the biometric, mathematically speaking !) 13
  • 14. Franck Franchin - © 2013  Once compromise, a biometric trait wouldn’t be reused – hence if someone copy your finger, the only way to revoke your finger would be to cut it ? Hum…  Physical biometric is different from store template !  If your password is lost or compromised, you have to change your password AND the password access control storage…  In biometrics, you can’t change your ‘pwd’ (aka your biometric) but you can revoke the stored encrypted template 14