Biometric authentication
-
Upload
mahtabrasheed195 -
Category
Documents
-
view
640 -
download
4
Transcript of Biometric authentication
Biometric Authentication
Muhammad Usman 122
Mahtab Rasheed 145
Usman Ali Butt 112
Waseem Khan 107
NUST,SEECS Pakistan
Introduction
Biometric Authentication:-
“ Biometric
Authentication is any process that validates
the identity of a user who wishes to sign
into a system by measuring some intrinsic
characteristic of that user”
Introduction
• Word biometric is derived from Greek words
bios mean life and metrics mean measure
• Therefore biometric authentication is defined
measuring of physiological or behavioral
properties related to particular entity to verify
or authenticate the entity.
Quick Look at History
• During the construction of great Pyramid Khufu workers
need to be authenticated for allowance
• 14th century in china, they use to save palm and foot
prints on clay blocks
• In 1890 a Persian police man Alphonse Bertillon provided
the basics to recognize the fingerprints
• 1892 Francis developed a classified system for finger
prints
• In 1896 Based on Bertillon study Aziz-ul-Haq developed
first systematic finger prints system for Edward Henry ,a
colonial of British Army in Bengal, India.
Quick Look at History
• 1936 Frank Burch gave a concept of using Iris
patterns for the recognition of an individual
• 1960 work on face recognition and voice
recognition
• 1965 automated system for signature
recognition
• Rapid development in biometric authentication
in 70’s
Quick Look at History
• 1985 patent for hand identification
• 1995 iris prototype become available as a
commercial product
• 1996 hand geometry used in Olympic games
held in Atlanta.
• First major success.
Quick Look at History
• 2000,first face recognition commercial product
• 2000,first research paper on vascular patterns
for recognition
• Modern biometrics based on computing have
developed now.
Importance of Biometric
Authentication
• Security is becoming important in business and
every field of life
• Fraud detection
• A person can claim multiple identities to get
more resources
• Biometric properties cannot be stolen unlike
passwords and keys
• After 9/11 rapid development on Biometric
Authentication
Types of Biometric Authentication
Biometric applications available today are
categorized into 2 sectors
• Physiological: Iris, Fingerprints, Hand Geometry,
Retinal ,Face recognition etc.
• Behavioral: Voice, Typing pattern etc.
Physiological Biometrics
Authentication
• A biometrics which use a physical trait, such
as a fingerprint, iris, hand or face for
recognition. The physical trait is analyzed,
measured and digitally stored.
Fingerprint Authentication
• Divides print into loops, whorls and arch
• Calculates minutiae points (ridge endings)
• Comparisons
• Authentication
Disadvantages
• Dirt , grime and wounds
• Placement of finger
• Too big a database to process
• Can be spoofed
Hand Geometry
• Geometry of users hands
• More reliable than fingerprinting
• Balance in performance and usability
• Very large scanners
Retinal Scanning
• Scans retina(the innermost coat of the back
part of the eye) into database
• User looks straight into retinal reader
• It checks the pattern of blood vessels of eye
retina.
• Scan using low intensity light
• Very efficient – cant be spoofed!
• User has to look “directly”
Iris Scanning
• Scans unique pattern of iris the colored ring of
muscle
• Iris is colored and visible from far
• No touch required
• The patterns of one person's two eyes are
quite different from each other and even
genetically identical twins have different iris
patterns.
• Contact lenses an issue
Face Recognition
• User faces camera
• Neutral expression required
• Appropriate lighting and position
• Algorithms for processing
Other Physiological Biometrics
• Palm print
• Hand vein
• DNA
• Thermal imaging
• Ear shape
• Human Odor Recognition
• Fingernail bed
Palm Print
• Palm print verification is a slightly different
implementation of the fingerprint technology.
Hand Vein
• Hand vein geometry is based on the fact that
the vein pattern is distinctive for various
individuals.
DNA
• DNA (Deoxyribose Neucleic Acid)
authentication is very popular at present and
requires a form of tissue, blood or other bodily
sample.
Behavioral Biometrics
• Biometrics that is based on a behavioral trait of
an individual.
• Acquired over time by an individual.
• A reflection of an individual’s psychology.
Types Of Behavioral Biometric
• Signature Recognition.
• Voice Recognition.
• Typing Patterns
• Gaits
Signature Recognition
• Automatically scanning a person's signature
and matching it electronically against a
library of known signatures.
How it works
• Speed
• Direction
• Pressure
• Acceleration
• length of the strokes
• Dynamics number of strokes and their duration
Advantages
• Unique style of doing Signature.
• One does not know how to write signature
even after looking at it.
Disadvantages
• Signature variable with Age, illness, emotions
• Requires high quality hardware
• High FRR as signatures are very dynamic
• Low Accuracy.
Voice Recognition
• A Biometric identification by electronically
recording and graphically representing a
person's voice.
Voice Recognition
• Voice prints : The unique characteristic of individual.
• User’s voice print is stored in database.
• Enroll by speaking some phrases.
• System Compares the voiceprints.
• Speech input
• Speaking style
• Pitch
• Frequency
• Natural tone
Disadvantages
• Background noise
• Device quality
• Illness , emotional behavior
• Time consuming enrollment
• Large processing template
Typing Patterns
• A method of verifying the identity of an
individual by their typing rhythm.
• System can verify the user at the log-on stage
or it can Continuously monitor the typist.
Typing Patterns
• User typing pattern
• Different characteristics
• Speed ( time durations between the keystrokes )
• Press and Release Rate
• Frequency of errors (use of backspace)
• Use of num pad
• Order in which user presses shift key to get capital letters
• Unique patterns are generated
• Comparisons
• Cheap
• Continuously check the user
Disadvantages
• For recognition a large amount of keystroke
data is needed
• Unnecessary comparisons with all existing
users
• Not very scalable
• FRR is high (Speed and Frequency of errors
can vary)
• Can be spoofed – by simple technology
(recorders)
Gaits
• Gait is an attractive biometric feature for
human identification at a distance.
• Gait is a particular way or manner
of moving on foot.
• Movements of a person's
various body parts over time
Advantages
• Perceivable at a distance
• Non-contact
• Non-invasive ( without interfering human
body)
• Can identify among a group of people
General Look on Biometrics
Iris
• Strengths
Very stable over time
Uniqueness
• Weakness
Requires user training
Dependant on a single vendor’s technology
General Look on Biometrics
• Iris
• Usability
Information security access control,
especially for Federal Institutions and
government agencies.
General Look on Biometrics
Fingerprint
• Strengths
Small template (less than 500 bytes)
Small sensors
• Weakness
Physical contact required
• Usability
Physical access control
Association with criminal justice
General Look on Biometrics
Voice
• Strengths
Low training
Microphone can be built into PC or mobile device
• Weaknesses
Changes with time, illness stress or injury
Large template unsuitable for recognition
• Usability
Mobile phones
Telephone banking
General Look on Biometrics
Signatures
• Strengths
• High user acceptance
Minimal training
• Weaknesses
Unstable over time
Occasional erratic variability
Enrollment takes times
• Usability
Portable devices with stylus input
General Look on Biometrics
Face
• Strengths
Universally present
• Weaknesses
Cannot distinguish identical siblings
Religious or cultural prohibitions
• Usability
Physical access control
General Look on Biometrics
Hand
• Strengths
Small template (approximately 10 bytes)
Unaffected by skin condition
• Weaknesses
Physical size of acquisition device
Physical contact required
• Usability
Physical access control
Time and attendance
Conclusion
• All authentication methods are prone to errors. Nevertheless, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user
• Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication
• Biometric systems are not foolproof; they can be compromised by:
Submission of another person’s biometric
Submission of enrollee’s biometric with the user under duress or incapacitated
• A prudent balance between Security and Privacy needs to be achieved
References
• Biometrics History published by NSTC
subcommittee on Biometrics
date:7 August 2006
www.biometrics.gov
• Biometric Authentication
Technology and Evaluation –
Term Project CS574
Spring 2003
San Diego State University
Uwe Bubeck Dina Sanchez
References
• Biometrics and Authentication slides of
Shivani Kirubanandan
• Authentication: Overview slides of Paul Bui
• Biometric Authentication Systems
by Zdeneˇk Rˇ íha and Václav Matyáš FIMU
Report Series November 2000