Bio Metrics 3

14
 Seminar On  Biometrics-Based Authentication

Transcript of Bio Metrics 3

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 1/14

 Seminar On 

 Biometrics-Based Authentication

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 2/14

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 3/14

Why biometrics?

Biometrics is concerned with identifying a person

 based on his or her physiological or behavioral

characteristics.

Biometrics are unique human feature such asfinger prints, hand geometry, face and iris or 

retinal patterns, DNA and voice.

Being the intrinsic properties of an individual,these are difficult to surreptitiously duplicate and

nearly impossible to share.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 4/14

Where it is needed?

Reliable user authentication is becomingan increasingly important task in the Web-

enabled world. The value of reliable user 

authentication is not limited to justcomputer or network access. Many other 

applications in everyday life also require

user authentication, such as banking, e-

commerce, and physical access control to

computer resources, and could benefit from

enhanced security.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 5/14

Consequences of insecure

authentication• The consequences of an insecure

authentication system in a corporate or 

enterprise environment can be catastrophic,and may include loss of confidential

information, denial of service, and

compromised data integrity.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 6/14

Advantages

• Biometric readings, which range from several

hundred bytes to over a megabyte, have theadvantage that their information content is usuallyhigher than that of a password or a pass phrase.Simply extending the length of passwords to getequivalent bit strength presents significant usability problems. It is nearly impossible to remember a 2K  phrase, and it would take an annoyingly long time to

type such a phrase (especially without errors).Fortunately, automated biometrics can provide thesecurity advantages of long passwords whileretaining the speed and characteristic simplicity of 

short passwords.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 7/14

Human traits used for authenticationTRAITS METHOD  

Fingerprints The patterns of friction ridges and valleys on an individual’s

fingerprints.

Face An image of the person’s face is captured in the visible spectrumusing the infrared patterns of the facial heat emission.

Speech An acoustics of speech differ between individual.

Iris pattern Iris of the eye is the colored area surrounding the pupil. it is uniqueand are obtained through a video based image acquisition system.

Hand and finger 

geometry

Physical characteristics such as the length, width, thickness, and

surface area of the hands are measured using a system.

Signature This involves the dynamic analysis of a signature to authenticate a person. The measured parameters are speed, pressure, and angle used

 by a person when signing a document.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 8/14

What it involves

Biometrics based authentication involves the following stepsi. Signal acquisition from the user 

ii. A invariant template is stored in the database.

iii. A template is derived from the newly acquired signaliv. The corresponding template is retrieved from the database

and is matched with the present template. The matcher 

arrives at a decision based on the closeness of the two

templates by taking into account geometry and other acquisition variables.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 9/14

Finger print authentication• Fingerprints are a distinctive feature and remain invariant over the

lifetime of a subject, except for cuts and bruises. A fingerprint

impression is acquired, typically using an inkless scanner. Severalsuch scanning technologies are available. A typical scanner digitizes the fingerprint impression at 500 dots per inch (dpi) with256 gray levels per pixel. The digital image of the fingerprintincludes several unique features in terms of ridge bifurcations and

ridge endings, collectively referred to as minutiae.

• The next step is to locate these features in the fingerprint image,using an automatic feature extraction algorithm. Each feature is

commonly represented by its location (x, y) and the ridgedirection at that location (). Due to the elasticity of the humanskin, the relationship between minutiae may be randomlydistorted from one impression to the next.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 10/14

Finger print authentication

• In the final stage, the matcher subsystem attempts toarrive at a degree of similarity between the two sets of features after compensating for the rotation, translation,and scale. This imilarity is often expressed as a score.

Based on this score, a final decision of match or no-match is made. A decision threshold is first selected. If the score is below the threshold, the fingerprints aredetermined not to match; if the score is above thethreshold, a correct match is declared. Often the score is

simply a count of the number of the minutiae that are incorrespondence.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 11/14

Vulnerable to attack 

• Presenting fake biometrics at the sensor • Resubmitting previously stored digitized biometrics

signals

• Tampering with the biometric feature representation• Corrupting the matcher 

• Attacking the channel between the stored templatesand the matcher 

• Overriding the final decision

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 12/14

Override the attack 

• Encrypted communication can eliminate at least

remote attacks• The matcher and the database reside at a secure

location

• Use data-hiding techniques to embed additionalinformation directly in compressed fingerprint images.

• Create on-line fingerprint authentication systems for commercial transactions that are secure against replay

attacks• The digital signature of a submitted signal can be usedto check only for its integrity

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 13/14

conclusion

• Biometrics-based authentication has many

usability advantages over traditional systems such

as passwords.• The greatest strength of biometrics, the fact that

the biometrics does not change over time, is at the

same time its greatest liability. Once a set of 

 biometric data has been compromised, it iscompromised forever.

8/14/2019 Bio Metrics 3

http://slidepdf.com/reader/full/bio-metrics-3 14/14