Bio Metrics 3
-
Upload
er-amar-kumar -
Category
Documents
-
view
218 -
download
0
Transcript of Bio Metrics 3
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 1/14
Seminar On
Biometrics-Based Authentication
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 3/14
Why biometrics?
Biometrics is concerned with identifying a person
based on his or her physiological or behavioral
characteristics.
Biometrics are unique human feature such asfinger prints, hand geometry, face and iris or
retinal patterns, DNA and voice.
Being the intrinsic properties of an individual,these are difficult to surreptitiously duplicate and
nearly impossible to share.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 4/14
Where it is needed?
Reliable user authentication is becomingan increasingly important task in the Web-
enabled world. The value of reliable user
authentication is not limited to justcomputer or network access. Many other
applications in everyday life also require
user authentication, such as banking, e-
commerce, and physical access control to
computer resources, and could benefit from
enhanced security.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 5/14
Consequences of insecure
authentication• The consequences of an insecure
authentication system in a corporate or
enterprise environment can be catastrophic,and may include loss of confidential
information, denial of service, and
compromised data integrity.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 6/14
Advantages
• Biometric readings, which range from several
hundred bytes to over a megabyte, have theadvantage that their information content is usuallyhigher than that of a password or a pass phrase.Simply extending the length of passwords to getequivalent bit strength presents significant usability problems. It is nearly impossible to remember a 2K phrase, and it would take an annoyingly long time to
type such a phrase (especially without errors).Fortunately, automated biometrics can provide thesecurity advantages of long passwords whileretaining the speed and characteristic simplicity of
short passwords.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 7/14
Human traits used for authenticationTRAITS METHOD
Fingerprints The patterns of friction ridges and valleys on an individual’s
fingerprints.
Face An image of the person’s face is captured in the visible spectrumusing the infrared patterns of the facial heat emission.
Speech An acoustics of speech differ between individual.
Iris pattern Iris of the eye is the colored area surrounding the pupil. it is uniqueand are obtained through a video based image acquisition system.
Hand and finger
geometry
Physical characteristics such as the length, width, thickness, and
surface area of the hands are measured using a system.
Signature This involves the dynamic analysis of a signature to authenticate a person. The measured parameters are speed, pressure, and angle used
by a person when signing a document.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 8/14
What it involves
Biometrics based authentication involves the following stepsi. Signal acquisition from the user
ii. A invariant template is stored in the database.
iii. A template is derived from the newly acquired signaliv. The corresponding template is retrieved from the database
and is matched with the present template. The matcher
arrives at a decision based on the closeness of the two
templates by taking into account geometry and other acquisition variables.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 9/14
Finger print authentication• Fingerprints are a distinctive feature and remain invariant over the
lifetime of a subject, except for cuts and bruises. A fingerprint
impression is acquired, typically using an inkless scanner. Severalsuch scanning technologies are available. A typical scanner digitizes the fingerprint impression at 500 dots per inch (dpi) with256 gray levels per pixel. The digital image of the fingerprintincludes several unique features in terms of ridge bifurcations and
ridge endings, collectively referred to as minutiae.
• The next step is to locate these features in the fingerprint image,using an automatic feature extraction algorithm. Each feature is
commonly represented by its location (x, y) and the ridgedirection at that location (). Due to the elasticity of the humanskin, the relationship between minutiae may be randomlydistorted from one impression to the next.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 10/14
Finger print authentication
• In the final stage, the matcher subsystem attempts toarrive at a degree of similarity between the two sets of features after compensating for the rotation, translation,and scale. This imilarity is often expressed as a score.
Based on this score, a final decision of match or no-match is made. A decision threshold is first selected. If the score is below the threshold, the fingerprints aredetermined not to match; if the score is above thethreshold, a correct match is declared. Often the score is
simply a count of the number of the minutiae that are incorrespondence.
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 11/14
Vulnerable to attack
• Presenting fake biometrics at the sensor • Resubmitting previously stored digitized biometrics
signals
• Tampering with the biometric feature representation• Corrupting the matcher
• Attacking the channel between the stored templatesand the matcher
• Overriding the final decision
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 12/14
Override the attack
• Encrypted communication can eliminate at least
remote attacks• The matcher and the database reside at a secure
location
• Use data-hiding techniques to embed additionalinformation directly in compressed fingerprint images.
• Create on-line fingerprint authentication systems for commercial transactions that are secure against replay
attacks• The digital signature of a submitted signal can be usedto check only for its integrity
8/14/2019 Bio Metrics 3
http://slidepdf.com/reader/full/bio-metrics-3 13/14
conclusion
• Biometrics-based authentication has many
usability advantages over traditional systems such
as passwords.• The greatest strength of biometrics, the fact that
the biometrics does not change over time, is at the
same time its greatest liability. Once a set of
biometric data has been compromised, it iscompromised forever.