Overview on Biometrics by Ch.Ravikumar & Priya N

Preview:

DESCRIPTION

Overview on biometrics

Citation preview

Topic: BIOMETRICS

Presented By:-Ch Ravikumar T.E.ENTC

Priya N T.E.ENTC

Contents

1.Defination

2.Generic Biometric

System

3.Types of biometrics

4.Biometric System

Vulnerabilities

5.Security Approaches

Biometrics

“It is a physiological or behavioral

characteristic of a human being that can

distinguish one person from another and

that theoretically can be used for

identification or verification of identity.”

Who are you? Prove it.

Generic Biometric System

EnrollmentBiometrics

Sensor

IdentificationBiometrics

Sensor

Feature Extractor

Feature Extractor

Feature Matcher

Template

Database

Types of biometrics

Face Recognition

• A face image can be

acquired using a

normal, off-the-shelf

camera

• Easy to accept by

the public

• Cost is rather low

Finger Printing

• Used in forensics

more than

100 years

• Optical, capacitive

readers

• Liveness detection

Finger Printing

Hand Geometry

•Captured using a

CCD camera, or LED

•Orthographic

Scanning

•The system is often

bulky

Eyes:Iris,Retina

• Extracts features

from the colored

tissue surrounding

the pupil.

• Monochrome

camera with visible

and near infra red

light

• Liveness detection

DNA

• Deoxyribonucliec

Acid

• Contains Genetic

information

• Differentiated

using base pairs

Keystrokes

• No special

hardware

Required

• Transparent

capture

Voice

• Speaker recognition uses

a microphone to record

the voice

• Your voice can vary with

age, illness and

emotions

• Interesting with the

increasing use of mobile

phones

Biometric System Vulnerabilities

Biometric System

Vulnerabilities

Adversary Attacks

SpoofingTemplate database leakage

Intrinsic

Limitations

Intrinsic Limitations

• False Non-

Match

• False match

• Zero effort

attack

Adversary Attacks

• Caused due to

negligence of

authorized persons

• An adversary

exploiting the

system security

using insiders

• Direct attack on the

sensors

Spoof Attacks

Template Database leakage

• Biometric template information becomes

available to an adversary

• Easier to recover by using reverse

engineering

Security Approaches

• Biometric Feature Transformations

• Cryptosystems

FUTURE METHODS

Face recognition through blood vessels

FUTURE METHODS

Brainwave recognition

Any Questions……