N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR...
-
Upload
cleopatra-samantha-clarke -
Category
Documents
-
view
217 -
download
0
Transcript of N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR...
New Security Approaches
Biometric Technologies are Coming of Age
ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY
Traditional Security Approaches
Magnetic cards/PinsHuman guards
Usernames/passwordsLocks & keys
Traditional security systems are highly
secured
Un
Biometrics......
Computerized methods of instantly recognizing people based on unique physical or behavioral characteristics
Tasks of Biometric Technologies: Identification Captures a person’s
biometric information and looks for a match
Answers question “Who are you?”
Answers question “Are you the one we are looking for?”
Types of Biometrics
Biometrics
Behavioral biometrics Physical biometricVoice recognition
Signature verification
Keystroke dynamics
Finger printing
Face recognitionIris scanning
Retina scanning
Hand geometry
1.Behavioral biometrics
Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification.
e.g. Voice recognition Signature verification Keystroke dynamics
1.1 Voice recognition
Here voice of person is stored in the database as a password.
When the same voice with same pitch is recognized then a match will occur.
1.2 Signature verification
the signature of the person is stored in the database.
When the same signature is found means a match occurs then that is accepted.
1.3 Keystroke dynamics
Here the speed of typing or writing is measured and stored in a database.
When a perfect match occurs with the typing speed then accepted.
2 Physical biometric
Physical biometrics measures the inherent physical characteristics on an individual .
2.1 Fingerprinting Finger printing takes an image
(either using ink or a digital scan) of a person's fingertips and records its characteristics.
Whorls, arches, and loops are recorded along with the patterns of ridges, furrows, and minutiae. This information may then be processed or stored as an image or as an encoded computer algorithm to be compared with other fingerprint records for finding the match.
Fingerprinting Devices
2.2 Face recognition Facial recognition analyzes the
characteristics of a person's face images input through a digital video camera.
It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges.
These measurements are retained in a database and used as a comparison when a user stands before the camera.
2.3 Iris scanning Iris scans analyze the features that
exist in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.
The scans use a regular video camera style and can be done from further away than a retinal scan.
It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.
2.4Retina scanning Retinal scanning analyses the
layer of blood vessels at the back of the eye.
Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy.
It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. Whether the accuracy can outweigh the public discomfort is yet to be seen.
2.5 Hand geometry
Hand goemetry involves the measurement and analysis of the shape of one's hand.
It is a fairly simple procedure and is surprisingly accurate.
Though it requires special hardware to use, it can be easily integrated into other devices or systems.
Biometrics Comparison
CostAccuracy
Intrusiveness
Fingerprinting
Hand geometry
Voice recognition
Iris scanning
Retina scanning
Face recognition
Future Biometrics
Instant DNA testing Brain wave scanning
Instant DNA testing
DNA are the genetic materials which controls the characteristic of every living organism.
DNA test is made for various purposes like crime detection,paternityness.
Brain wave scanning A scanner measures brain
responses to a stimuli. When one is asked a
question which one knows the true answer, that answer comes first to mind automatically. Even if the individual has already prepared and rehearsed a lie, it is still necessary to think past the true answer and access the lie. This extra activity is easily measured on a brain scan..
Advantage of biometrics
Increase security - Provide a convenient and low-cost additional tier of security .
Reduce fraud by employing hard-to-forge technologies and materials. Eliminate problems caused by lost IDs or forgotten passwords by using
physiological attributes . Unequivocally link an individual to transaction Reduce password administration costs. Offer significant cost savings or increasing
When will biometric technologies by available Available now from a
number of vendors Fingerprinting devices sell
for around $75 Iris scanning devices start
at around $200 Face recognition systems
start at around $10,000 Prices expected to continue
falling by as much as 50% by 2012.
Who is involved with biometrics locally? JK paper mill uses finger
printing technology for their engineers .
IBM and lenevo installed fingerprinting for time and attendance monitoring
NASA experiments with using biometrics to allow engineers to control space flights from home computers
Compaq offers several fingerprinting devices
Conclusion…
In the context of ever increasing technology which we apply in our day today life, Security is of outmost importance which can easily and efficiently be solved by the application of biometric technology.
Biometric is a unique and measurable characteristic of a human being used to identify an individual. A key characteristic of a biometric access system is that it must operate in real-time. As Biometrics uses our body parts or our behavior for security purpose.
So we can conclude that “Person’s security exists
As long as person lives”
Your questions are welcome!