Biometrics

23
BIOMETRICS Presented by: Anoop Sathyan S7 EC

Transcript of Biometrics

Page 1: Biometrics

BIOMETRICS

Presented by:Anoop SathyanS7 EC

Page 2: Biometrics

Motivation

Authentication – the process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa

Conventional authentication methods• Something that you "have“ – key, magnetic

card or smartcard• Something that you " know “ – PIN or

password Biometric authentication uses personal

features• Something that you " are "

Page 3: Biometrics

History

In mid 19th century Alphonse Bertillon, practiced idea of identifying criminals based on body measurements

In late 19th century, distinctiveness of Fingerprint discovered

Much developed in 20th Century Now it is being used in a number of

civilian application

Page 4: Biometrics

Requirements

Basic• Universality• Distinctiveness• Permanence• Collectability

Practically• Performance• Acceptability• Circumvention

Page 5: Biometrics

What is Biometrics???

Bio = Life and Metrics = To Measure Physiological or Behavioral based

person recognition• Physiological - Fingerprints, Retinal & Iris

Pattern, Hand & Finger Geometry, Facial Recognition

• Behavioral – Voice Patterns, Signature Details entered into a Database Compared with entered Details All this is controlled by a Master

computer

Page 6: Biometrics

Enrolment & Modes Of Operation

Enrolment

Modes:• Verification Mode• Identification Mode

Page 7: Biometrics

Verification Mode

Does this biometric data belongs to him???

One-to-One Comparison

Page 8: Biometrics

Identification Mode

Whose biometric data is this??? One-to-Many Comparison

Page 9: Biometrics

Biometric System Errors

Two types of Errors:• False Match: Biometric Measurement from

two different persons to be from same person

• False Non-Match: Biometric Measurement from same person to be from two different persons

Page 10: Biometrics

Various Biometric Devices

DNA Fingerprinting Vein Thermogram Face Recognition Fingerprint Hand & Finger Geometry Iris Scan Retina Scan Signature Verification Voice Recognition

Page 11: Biometrics

DNA Fingerprinting

0.1% DNA would be unique for a person Identical Twins have same DNA Benefits:

• Accurate Weakness:

• Not in Real-Time• Physical sample should be taken

Used in Forensic Application, Paternity Determination, etc.

Page 12: Biometrics

Vein Thermogram

Pattern of Blood Veins is unique, even for twins

When exposed to IR rays, veins appear black

Merits: • Can be done only if person is alive• Difficult to forge

Weakness: Much time consuming, Challenging in uncontrolled Environments

Page 13: Biometrics

Face Recognition

Location & Shape of Facial Attributes – eyes, eye brows, nose, lips, etc

Thermogram can also be used Merits: Can be taken from distance Demerits: Can’t be used for

identification but can be used for verification

Application: Entry to restricted areas & buildings, banks, military areas, airport, etc

Page 14: Biometrics

Fingerprint

Pattern of Ridges & Valleys on the surface of Fingertip

Fingerprint of Identical Twins are different, even it differs from finger to finger

Benefits: Easy to Use, Cheap, Small Size, Low Power, etc

Weakness: Distorts due to Ageing, Cuts, Burns, etc

Used in Cell Phones, Notebook computers, USB Flash Drives, ATM, etc

Page 15: Biometrics

Hand & Finger Geometry

Shape & Size of Palm, Lengths & Widths of the fingers, & Characteristics of Skin

Merits: Very Simple, Easy to Use, Cheap, etc

Weakness: Lack of Accuracy, Large size of scanner, etc

Application: Attendance, Access to Restricted Areas, Hospitals, Airports, etc

Page 16: Biometrics

Iris Scan

Scans over 200 points of the Iris Merits:

• Not affected by Glasses, Contact Lens, even Surgery

• Twins also have different iris• Easier to detect Artificial Irises

Demerits: User should Remain Still, Expensive

Used in ID Cards, Passports, Border Control, Restricted Areas

Page 17: Biometrics

Retinal Scan

Blind Vessels at the Back of the Eye have Unique Pattern

Even our two eyes have different Pattern

Scanner reads the Blood Vessel Pattern Merits: Error rate is very less Weakness: Slow, Can reveal some

Medical Conditions e.g.: Hypertension Used in environment requiring

Maximum Security

Page 18: Biometrics

SignatureVerification

Physical Activity of Signing: Stroke Order, Pressure applied & Speed measured

Most insecure form of Biometric Device• Professional Forgers can fool the system• People may not sign in identical manner

Used in providing access to Documents, Banking Services, etc

Page 19: Biometrics

VoiceRecognition

Based on Shape & Size of Vocal Tracts, Mouth, Nasal Cavity and Lips

Two types of system:• Text-dependent Systems• Text-independent Systems

Demerits: Sensitive to noise, Not appropriate for large scale application

Used in Phone Based Applications

Page 20: Biometrics

Limitations Of Unimodal Biometric Systems

Noise in Sensed DataIntra-class VariationsDistinctivenessNon-universalitySpoof Attacks

Page 21: Biometrics

Multimodal Biometric Systems

Multiple Sensors Multiple Biometrics Multiple Units of Same Biometric Multiple Snapshots of the Same

Biometric Multiple Matchers E.g.: Fusion (captures fingerprint, iris &

face features)

Page 22: Biometrics

Conclusion

Biometric technology has great potential

There are many biometric products around, based on different biometric technologies

Shortcomings of biometric systems due to • manufacturers ignorance of security

concerns• lack of quality control

Page 23: Biometrics

THANK YOUAny Questions???