N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR...

25
New Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY

Transcript of N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR...

Page 1: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

New Security Approaches

Biometric Technologies are Coming of Age

ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY

Page 2: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Traditional Security Approaches

Magnetic cards/PinsHuman guards

Usernames/passwordsLocks & keys

Page 3: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Traditional security systems are highly

secured

Un

Page 4: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Biometrics......

Computerized methods of instantly recognizing people based on unique physical or behavioral characteristics

Page 5: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Tasks of Biometric Technologies: Identification Captures a person’s

biometric information and looks for a match

Answers question “Who are you?”

Answers question “Are you the one we are looking for?”

Page 6: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Types of Biometrics

Biometrics

Behavioral biometrics Physical biometricVoice recognition

Signature verification

Keystroke dynamics

Finger printing

Face recognitionIris scanning

Retina scanning

Hand geometry

Page 7: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

1.Behavioral biometrics

Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification.

e.g. Voice recognition Signature verification Keystroke dynamics

Page 8: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

1.1 Voice recognition

Here voice of person is stored in the database as a password.

When the same voice with same pitch is recognized then a match will occur.

Page 9: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

1.2 Signature verification

the signature of the person is stored in the database.

When the same signature is found means a match occurs then that is accepted.

Page 10: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

1.3 Keystroke dynamics

Here the speed of typing or writing is measured and stored in a database.

When a perfect match occurs with the typing speed then accepted.

Page 11: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2 Physical biometric

Physical biometrics measures the inherent physical characteristics on an individual .

Page 12: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2.1 Fingerprinting Finger printing takes an image

(either using ink or a digital scan) of a person's fingertips and records its characteristics.

Whorls, arches, and loops are recorded along with the patterns of ridges, furrows, and minutiae. This information may then be processed or stored as an image or as an encoded computer algorithm to be compared with other fingerprint records for finding the match.

Fingerprinting Devices

Page 13: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2.2 Face recognition Facial recognition analyzes the

characteristics of a person's face images input through a digital video camera.

It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges.

These measurements are retained in a database and used as a comparison when a user stands before the camera.

Page 14: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2.3 Iris scanning Iris scans analyze the features that

exist in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.

The scans use a regular video camera style and can be done from further away than a retinal scan.

It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.

Page 15: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2.4Retina scanning Retinal scanning analyses the

layer of blood vessels at the back of the eye.

Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy.

It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. Whether the accuracy can outweigh the public discomfort is yet to be seen.

Page 16: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

2.5 Hand geometry

Hand goemetry involves the measurement and analysis of the shape of one's hand.

It is a fairly simple procedure and is surprisingly accurate.

Though it requires special hardware to use, it can be easily integrated into other devices or systems.

Page 17: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Biometrics Comparison

CostAccuracy

Intrusiveness

Fingerprinting

Hand geometry

Voice recognition

Iris scanning

Retina scanning

Face recognition

Page 18: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Future Biometrics

Instant DNA testing Brain wave scanning

Page 19: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Instant DNA testing

DNA are the genetic materials which controls the characteristic of every living organism.

DNA test is made for various purposes like crime detection,paternityness.

Page 20: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Brain wave scanning A scanner measures brain

responses to a stimuli. When one is asked a

question which one knows the true answer, that answer comes first to mind automatically. Even if the individual has already prepared and rehearsed a lie, it is still necessary to think past the true answer and access the lie. This extra activity is easily measured on a brain scan..

Page 21: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Advantage of biometrics

Increase security - Provide a convenient and low-cost additional tier of security .

Reduce fraud by employing hard-to-forge technologies and materials. Eliminate problems caused by lost IDs or forgotten passwords by using

physiological attributes . Unequivocally link an individual to transaction Reduce password administration costs. Offer significant cost savings or increasing

Page 22: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

When will biometric technologies by available Available now from a

number of vendors Fingerprinting devices sell

for around $75 Iris scanning devices start

at around $200 Face recognition systems

start at around $10,000 Prices expected to continue

falling by as much as 50% by 2012.

Page 23: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Who is involved with biometrics locally? JK paper mill uses finger

printing technology for their engineers .

IBM and lenevo installed fingerprinting for time and attendance monitoring

NASA experiments with using biometrics to allow engineers to control space flights from home computers

Compaq offers several fingerprinting devices

Page 24: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Conclusion…

In the context of ever increasing technology which we apply in our day today life, Security is of outmost importance which can easily and efficiently be solved by the application of biometric technology.

Biometric is a unique and measurable characteristic of a human being used to identify an individual. A key characteristic of a biometric access system is that it must operate in real-time. As Biometrics uses our body parts or our behavior for security purpose.

So we can conclude that “Person’s security exists

As long as person lives”

Page 25: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.

Your questions are welcome!