SlideShare a Scribd company logo
1 of 40
CSCI E-170: Computer
Security, Privacy and Usability
Hour #2: Biometrics
Biometrics
Something that you know
Something that you have
Something that you are
Uses of Biometrics:
Simple:
 Verification – Is this who he claims to be?
 Identification – who is this?
Advanced:
 Detecting multiple identities
 Patrolling public spaces
Why the Interest in Biometrics?
Convenient
Passwords are not user-friendly
Perceived as more secure
 May actually be more secure
 May be useful as a deterrent
Passive identification
Verification
Compare a sample against a single
stored template
Typical application: voice lock
?
Identification
Search a sample against a database of
templates.
Typical application: identifying
fingerprints
?
Bertillion System of Anthropomorphic
Measurement
Alphonse Bertillion Appointed to
Prefecture of Police in 1877 as
Records Clerk
Biometrics to give harsher sentences to
repeat offenders
Measurements:
 Head size
 Fingers
 Distance between eyes
 Scars
 Etc…
Key advance: Classification System
Discredited in 1903: Will West was not William West
http://www.cmsu.edu/cj/alphonse.htm
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Fingerprints (ca. 1880-)
Henry Faulds letter to Nature (1880)
 Fingerprints might be useful for crime
scene investigations
W. J. Herschel letter to Nature (1880)
 Had been using fingerprints in India for 20
years; suggested a universal registration
system to establish identity and prevent
impersonations
Fingerprints after Faulds…
Pudd’nhead Wilson, Mark Twain (Century
Magazine, 1893)
Prints quickly become tool of police.
Manual card systems:
 10 point classification
 Scaling problems in the mid 1970s.
AFIS introduced in the 1980s
 Solves back murder cases
 Cuts burglary rates in San Francisco, other cities.
VoiceKey (ca. 1989)
Access Control System
 Z80 Microprocessor
 PLC coding
 40 stored templates
 4-digit PINs
False negative rate: 0-25%
False positive rate: 0%*
“Airplane”
Biometrics Today
Fingerprints
Retina Prints
Face Prints
DNA Identification
Voice Prints
Palm Prints
Handwriting Analysis
Etc…
Biometrics In Practice…
Inherently not democratic
Always have a back door
Discrimination function tradeoffs:
 Low false negatives => high false positives
 Low false positives => high false negatives
Policy Issues That Effect
Biometrics:
Strong identification may not be
necessary or appropriate in many
circumstances
 Voters may be scared off if forced to give a
fingerprint
Authorization can be granted to the
individual or to the template.
 It is frequently not necessary to identify an
individual with a name.
Biometrics and Privacy
Long association of biometrics with
crime-fighting
Biometrics collected for one purpose
can be used for another
Accuracy Rates:
False Match Rate (FMR)
Single False Match Rate vs. System False
Match Rate
 If the FMR is 1/10,000 but you have 10,000
templates on file — odds of a match are very high
False Nonmatch Rate (FNR)
Failure-to-Enroll (FTE) rate
Ability to Verify (ATV) rate:
 % of user population that can be verified
 ATV = (1-FTE)(1-FNMR)
Other Issues:
Stability of Characteristic ofver Lifetime
Suitability for Logical and Physical
Access
Difficulty of Usage
Biometrics in Detail
Finger-scan
A live acquisition of a person’s
fingerprint.
Image Acquisition  Image
Processing  Template Creation
 Template Matching
Acquisition Devices:
 Glass plate
 Electronic
 Ultrasound
Fingerprint SWAD
Strengths:
 Fingerprints don’t change over
time
 Widely believed fingerprints are
unique
Weaknesses:
 Scars
Attacks:
 Surgery to alter or remove
prints
 Finger Decapitation
 “Gummy fingers”
 Corruption of the database
Defenses:
 Measure physical properties of
a live finger (pulse)
Facial Scan
Based on video
Images
Templates can be
based on previously-
recorded images
Technologies:
 Eigenface Approach
 Feature Analysis
(Visionics)
 Neural Network
Facial Scan: SWAD
Strengths:
 Database can be built from driver’s license records, visas, etc.
 Can be applied covertly (surveillance photos). (Super Bowl 2001)
 Few people object to having their photo taken
Weaknesses:
 No real scientific validation
Attacks:
 Surgery
 Facial Hair
 Hats
 Turning away from the camera
Defenses:
 Scanning stations with mandated poses
Iris Scan
Image Acquisition  Image
Processing  Template Creation
 Template Matching
Uses to date:
 Physical access control
 Computer authentication
Iris Scan: SWAD
Strengths:
 300+ characteristics; 200 required for match
Weaknesses:
 Fear
 Discomfort
 Proprietary acquisition device
 Algorithms may not work on all individuals
 No large databases
Attacks:
 Surgery (Minority Report )
Defenses:
Voice Identification
Scripted vs. non-scripted
Voice: SWAD
Strengths:
 Most systems have audio hardware
 Works over the telephone
 Can be done covertly
 Lack of negative perception
Weaknesses:
 Background noise (airplanes)
 No large database of voice samples
Attacks:
 Tape recordings
 Identical twins / soundalikes
Defenses:
Hand Scan
Typical systems measure 90
different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
Primarily for access control:
 Machine rooms
 Olympics
Strengths:
 No negative connotations –
non-intrusive
 Reasonably robust systems
Weaknesses:
 Accuracy is limited; can only be
used for 1-to-1 verification
 Bulky scanner
Oddballs
Retina Scan
 Very popular in the 1980s military; not
used much anymore.
Facial Thermograms
Vein identification
Scent Detection
Gait recognition
DNA Identification
RFLP - Restriction
Fragment Length
Polymorphism
Widely accepted for
crime scenes
Twin problem
Behavior Biometrics:
Handwriting (static & dynamic)
Keystroke dynamics
Classifying Biometrics
Template Size
Biometric Approx Template Size
Voice 70k – 80k
Face 84 bytes – 2k
Signature 500 bytes – 1000 bytes
Fingerprint 256 bytes – 1.2k
Hand Geometry 9 bytes
Iris 256 bytes – 512 bytes
Retina 96 bytes
Passive vs. Active
Passive:
 Latent fingerprints
 Face recognition
 DNA identification
Active
 Fingerprint reader
 Voice recognition (?)
 Iris identification (?)
Knowing vs. Unknowing
Knowing:
 Fingerprint reader
 Hand geometry
 Voice prints*
 Iris prints (?)
Unknowing:
 Latent fingerprints
Body Present vs. Body Absent
Performance-based
biometrics
Voice print
Hand Geometry
Facial Thermograms
Iris Prints
Fingerprint
DNA Identification
Template: Copy or Summary
Copy
 Original fingerprint
 Original DNA sample
Summary
 Iris Prints
 Voice Prints
 DNA RFLPs
Racial Clustering?
Inherited?
Racial Clustering
 DNA fingerprints
No Racial Clustering
 Fingerprints?
 Iris prints
Racial Clustering?
Inherited?
Racial Clustering
 DNA fingerprints
No Racial Clustering
 Fingerprints?
 Iris prints
System Design and Civil
Liberties
Biometric Verification
 Is biometric verified locally or sent over a
network?
Biometric Template:
 Matches a name?
 “Simson L. Garfinkel”
 Matches a right?
 “May open the door.”
Identity Card
Card has:
 Biometric
 Digital Signature?
 Database Identifier?
Central Database
has:
 Biometric?
 Biometric Template?
Biometric Encryption
Big problems:
 Biometrics are noisy
 Need for “error correction”
Potential Problems:
 Encryption with a 10-bit key?
 Are some “corrected” values more likely than
others?
 What happens when the person changes --- you
still need a back door.

More Related Content

Similar to L05-biometrics best for the lresentation

Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
Jerry Ruggieri
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
stuimrozsm
 
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
Authentication V.Vinotha II M.Sc computer science Bon secours college for womenAuthentication V.Vinotha II M.Sc computer science Bon secours college for women
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
vinothav3
 

Similar to L05-biometrics best for the lresentation (20)

How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric
Biometric Biometric
Biometric
 
Biometrics authentication
Biometrics   authenticationBiometrics   authentication
Biometrics authentication
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
Authentication V.Vinotha II M.Sc computer science Bon secours college for womenAuthentication V.Vinotha II M.Sc computer science Bon secours college for women
Authentication V.Vinotha II M.Sc computer science Bon secours college for women
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 

Recently uploaded

Bhakti and Sufi Traditions from 8th to 18 th Century.pptx
Bhakti and Sufi Traditions from 8th to 18 th Century.pptxBhakti and Sufi Traditions from 8th to 18 th Century.pptx
Bhakti and Sufi Traditions from 8th to 18 th Century.pptx
kashvis
 
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
yulianti213969
 
Riya Chand Birth Certificate.pdfsssssssssssssssss
Riya Chand Birth Certificate.pdfsssssssssssssssssRiya Chand Birth Certificate.pdfsssssssssssssssss
Riya Chand Birth Certificate.pdfsssssssssssssssss
prakash164267
 
NON-COMMUNICABLE DISEASES.pptx...........
NON-COMMUNICABLE DISEASES.pptx...........NON-COMMUNICABLE DISEASES.pptx...........
NON-COMMUNICABLE DISEASES.pptx...........
CydeizelMercado1
 
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptxEngineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
DanielRemache4
 
Captain america painting competition -- 13
Captain america painting competition -- 13Captain america painting competition -- 13
Captain america painting competition -- 13
Su Yan-Jen
 
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klatenobat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
siskavia95
 
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
avy6anjnd
 
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptxLESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
matthewmirafuentes
 

Recently uploaded (20)

Bhakti and Sufi Traditions from 8th to 18 th Century.pptx
Bhakti and Sufi Traditions from 8th to 18 th Century.pptxBhakti and Sufi Traditions from 8th to 18 th Century.pptx
Bhakti and Sufi Traditions from 8th to 18 th Century.pptx
 
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
obat aborsi wonogiri wa 081336238223 jual obat aborsi cytotec asli di wonogir...
 
Crystal Trophy with Yellow Eagle at Clazz Trophy Malaysia | #1 Reliable Troph...
Crystal Trophy with Yellow Eagle at Clazz Trophy Malaysia | #1 Reliable Troph...Crystal Trophy with Yellow Eagle at Clazz Trophy Malaysia | #1 Reliable Troph...
Crystal Trophy with Yellow Eagle at Clazz Trophy Malaysia | #1 Reliable Troph...
 
VIP ℂall Girls Bardoli 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Servi...
VIP ℂall Girls Bardoli 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Servi...VIP ℂall Girls Bardoli 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Servi...
VIP ℂall Girls Bardoli 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Servi...
 
VIP ℂall Girls Hazira 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂ...
VIP ℂall Girls Hazira 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂ...VIP ℂall Girls Hazira 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂ...
VIP ℂall Girls Hazira 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂ...
 
Reading 8 Artworks about books and readers
Reading 8 Artworks about books and readersReading 8 Artworks about books and readers
Reading 8 Artworks about books and readers
 
Theoretical Framework- Explanation with Flow Chart.docx
Theoretical Framework- Explanation with Flow Chart.docxTheoretical Framework- Explanation with Flow Chart.docx
Theoretical Framework- Explanation with Flow Chart.docx
 
Riya Chand Birth Certificate.pdfsssssssssssssssss
Riya Chand Birth Certificate.pdfsssssssssssssssssRiya Chand Birth Certificate.pdfsssssssssssssssss
Riya Chand Birth Certificate.pdfsssssssssssssssss
 
NON-COMMUNICABLE DISEASES.pptx...........
NON-COMMUNICABLE DISEASES.pptx...........NON-COMMUNICABLE DISEASES.pptx...........
NON-COMMUNICABLE DISEASES.pptx...........
 
DeFeliceKitley_Resume_BFAVCDGraduated2024
DeFeliceKitley_Resume_BFAVCDGraduated2024DeFeliceKitley_Resume_BFAVCDGraduated2024
DeFeliceKitley_Resume_BFAVCDGraduated2024
 
SB_ Dragons Riders of Berk_ Rough_ RiverPhan (2024)
SB_ Dragons Riders of Berk_ Rough_ RiverPhan (2024)SB_ Dragons Riders of Berk_ Rough_ RiverPhan (2024)
SB_ Dragons Riders of Berk_ Rough_ RiverPhan (2024)
 
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptxEngineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
Engineering Major for College_ Environmental Health Engineering by Slidesgo.pptx
 
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
 
Captain america painting competition -- 13
Captain america painting competition -- 13Captain america painting competition -- 13
Captain america painting competition -- 13
 
Digital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic PrintsDigital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic Prints
 
VIP ℂall Girls Surat 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂe...
VIP ℂall Girls Surat 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂe...VIP ℂall Girls Surat 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂe...
VIP ℂall Girls Surat 8527049040 WhatsApp AnyTime Best Surat ℂall Girl Serviℂe...
 
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klatenobat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
obat aborsi Klaten wa 082135199655 jual obat aborsi cytotec asli di Klaten
 
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
 
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptxLESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
 
"Echoes of Majesty: Navigating Lesotho's Rich Tapestry of History"
"Echoes of Majesty: Navigating Lesotho's Rich Tapestry of History""Echoes of Majesty: Navigating Lesotho's Rich Tapestry of History"
"Echoes of Majesty: Navigating Lesotho's Rich Tapestry of History"
 

L05-biometrics best for the lresentation

  • 1. CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics
  • 2. Biometrics Something that you know Something that you have Something that you are
  • 3. Uses of Biometrics: Simple:  Verification – Is this who he claims to be?  Identification – who is this? Advanced:  Detecting multiple identities  Patrolling public spaces
  • 4. Why the Interest in Biometrics? Convenient Passwords are not user-friendly Perceived as more secure  May actually be more secure  May be useful as a deterrent Passive identification
  • 5. Verification Compare a sample against a single stored template Typical application: voice lock ?
  • 6. Identification Search a sample against a database of templates. Typical application: identifying fingerprints ?
  • 7. Bertillion System of Anthropomorphic Measurement Alphonse Bertillion Appointed to Prefecture of Police in 1877 as Records Clerk Biometrics to give harsher sentences to repeat offenders Measurements:  Head size  Fingers  Distance between eyes  Scars  Etc… Key advance: Classification System Discredited in 1903: Will West was not William West http://www.cmsu.edu/cj/alphonse.htm QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 8. Fingerprints (ca. 1880-) Henry Faulds letter to Nature (1880)  Fingerprints might be useful for crime scene investigations W. J. Herschel letter to Nature (1880)  Had been using fingerprints in India for 20 years; suggested a universal registration system to establish identity and prevent impersonations
  • 9. Fingerprints after Faulds… Pudd’nhead Wilson, Mark Twain (Century Magazine, 1893) Prints quickly become tool of police. Manual card systems:  10 point classification  Scaling problems in the mid 1970s. AFIS introduced in the 1980s  Solves back murder cases  Cuts burglary rates in San Francisco, other cities.
  • 10. VoiceKey (ca. 1989) Access Control System  Z80 Microprocessor  PLC coding  40 stored templates  4-digit PINs False negative rate: 0-25% False positive rate: 0%* “Airplane”
  • 11. Biometrics Today Fingerprints Retina Prints Face Prints DNA Identification Voice Prints Palm Prints Handwriting Analysis Etc…
  • 12. Biometrics In Practice… Inherently not democratic Always have a back door Discrimination function tradeoffs:  Low false negatives => high false positives  Low false positives => high false negatives
  • 13. Policy Issues That Effect Biometrics: Strong identification may not be necessary or appropriate in many circumstances  Voters may be scared off if forced to give a fingerprint Authorization can be granted to the individual or to the template.  It is frequently not necessary to identify an individual with a name.
  • 14. Biometrics and Privacy Long association of biometrics with crime-fighting Biometrics collected for one purpose can be used for another
  • 15. Accuracy Rates: False Match Rate (FMR) Single False Match Rate vs. System False Match Rate  If the FMR is 1/10,000 but you have 10,000 templates on file — odds of a match are very high False Nonmatch Rate (FNR) Failure-to-Enroll (FTE) rate Ability to Verify (ATV) rate:  % of user population that can be verified  ATV = (1-FTE)(1-FNMR)
  • 16. Other Issues: Stability of Characteristic ofver Lifetime Suitability for Logical and Physical Access Difficulty of Usage
  • 18. Finger-scan A live acquisition of a person’s fingerprint. Image Acquisition  Image Processing  Template Creation  Template Matching Acquisition Devices:  Glass plate  Electronic  Ultrasound
  • 19. Fingerprint SWAD Strengths:  Fingerprints don’t change over time  Widely believed fingerprints are unique Weaknesses:  Scars Attacks:  Surgery to alter or remove prints  Finger Decapitation  “Gummy fingers”  Corruption of the database Defenses:  Measure physical properties of a live finger (pulse)
  • 20. Facial Scan Based on video Images Templates can be based on previously- recorded images Technologies:  Eigenface Approach  Feature Analysis (Visionics)  Neural Network
  • 21. Facial Scan: SWAD Strengths:  Database can be built from driver’s license records, visas, etc.  Can be applied covertly (surveillance photos). (Super Bowl 2001)  Few people object to having their photo taken Weaknesses:  No real scientific validation Attacks:  Surgery  Facial Hair  Hats  Turning away from the camera Defenses:  Scanning stations with mandated poses
  • 22. Iris Scan Image Acquisition  Image Processing  Template Creation  Template Matching Uses to date:  Physical access control  Computer authentication
  • 23. Iris Scan: SWAD Strengths:  300+ characteristics; 200 required for match Weaknesses:  Fear  Discomfort  Proprietary acquisition device  Algorithms may not work on all individuals  No large databases Attacks:  Surgery (Minority Report ) Defenses:
  • 25. Voice: SWAD Strengths:  Most systems have audio hardware  Works over the telephone  Can be done covertly  Lack of negative perception Weaknesses:  Background noise (airplanes)  No large database of voice samples Attacks:  Tape recordings  Identical twins / soundalikes Defenses:
  • 26. Hand Scan Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure Primarily for access control:  Machine rooms  Olympics Strengths:  No negative connotations – non-intrusive  Reasonably robust systems Weaknesses:  Accuracy is limited; can only be used for 1-to-1 verification  Bulky scanner
  • 27. Oddballs Retina Scan  Very popular in the 1980s military; not used much anymore. Facial Thermograms Vein identification Scent Detection Gait recognition
  • 28. DNA Identification RFLP - Restriction Fragment Length Polymorphism Widely accepted for crime scenes Twin problem
  • 29. Behavior Biometrics: Handwriting (static & dynamic) Keystroke dynamics
  • 31. Template Size Biometric Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • 32. Passive vs. Active Passive:  Latent fingerprints  Face recognition  DNA identification Active  Fingerprint reader  Voice recognition (?)  Iris identification (?)
  • 33. Knowing vs. Unknowing Knowing:  Fingerprint reader  Hand geometry  Voice prints*  Iris prints (?) Unknowing:  Latent fingerprints
  • 34. Body Present vs. Body Absent Performance-based biometrics Voice print Hand Geometry Facial Thermograms Iris Prints Fingerprint DNA Identification
  • 35. Template: Copy or Summary Copy  Original fingerprint  Original DNA sample Summary  Iris Prints  Voice Prints  DNA RFLPs
  • 36. Racial Clustering? Inherited? Racial Clustering  DNA fingerprints No Racial Clustering  Fingerprints?  Iris prints
  • 37. Racial Clustering? Inherited? Racial Clustering  DNA fingerprints No Racial Clustering  Fingerprints?  Iris prints
  • 38. System Design and Civil Liberties Biometric Verification  Is biometric verified locally or sent over a network? Biometric Template:  Matches a name?  “Simson L. Garfinkel”  Matches a right?  “May open the door.”
  • 39. Identity Card Card has:  Biometric  Digital Signature?  Database Identifier? Central Database has:  Biometric?  Biometric Template?
  • 40. Biometric Encryption Big problems:  Biometrics are noisy  Need for “error correction” Potential Problems:  Encryption with a 10-bit key?  Are some “corrected” values more likely than others?  What happens when the person changes --- you still need a back door.