32
BIOMETRICS TECHNIQUES Presented To:Dr.Ayman Taha Presented By:Noha Hesham & Moataz Mahmoud

Biometrics techniques

Embed Size (px)

DESCRIPTION

Different Biometrics techniques and devices

Citation preview

Page 1: Biometrics techniques

BIOMETRICS TECHNIQUESPresented To:Dr.Ayman Taha

Presented By:Noha Hesham & Moataz Mahmoud

Page 2: Biometrics techniques

2

OUTLINEIntroduction

User Authentication Approaches What is Biometrics

Biometrics techniques Requirements for an ideal biometric Different Types of biometrics techniques Different biometrics techniques concept Biometric techniques factors of evaluation Comparison of biometric techniques Biometrics Identification & Verification

Biometrics System StagesFingerprint TechnologyFingerprint Threats

Page 3: Biometrics techniques

3

INTRODUCTION

User Authentication Approaches

Use Something that you KnowEx. Password, PINCan be Forgotten

Use Something that you haveEx. Credit Card, Keys

Can Be lost

Automated measurement of Physiological and/or behavioral characteristics to Determine or authenticate identity

Page 4: Biometrics techniques

4

Automated measurement of Physiological and/or behavioral characteristics to Determine or authenticate identity Automated measurement

No human involvement. Comparison takes place in Real-Time

Physiological and/or behavioral characteristics Behavioral as User speaks, typing on keyboard, name signature. Physiological as Fingerprint, Hand, Eyes, Face

Determine or authenticate identity

INTRODUCTION “WHAT IS BIOMETRICS”

Identification Systems Verification Systems

1. Who am I?2. Determine Identity

1. Am I who I claim to be?2. Authenticate Identity

Page 5: Biometrics techniques

5

Requirements for an ideal biometricUniversality

Each person should have the characteristicUniqueness

No two persons should have same characteristicPermanence

The characteristic should not changePerformance

Accuracy, speed, robustness, resource requirementsAcceptability

Extend to people willing to accept a characteristicFaked protection

How easy is to fool the system by fraudulent methods

BIOMETRICS TECHNIQUES

Page 6: Biometrics techniques

6

Different Type of biometrics techniques

Identification and verification: Fingerprint scan Face recognition ( Facial scan ) Retina scan Iris scan

Verification only: Hand Geometry Keystroke Dynamics Mouse Dynamics Gait Dynamics ( how people walk ) Voice Print Signature

BIOMETRICS TECHNIQUES

Page 7: Biometrics techniques

7

Different biometrics techniques concept

1. Fingerprint scan:Measures unique characteristics in a fingerprint (minutiae) Crossover Core Bifurcations Ridge ending Island Delta Pore

BIOMETRICS TECHNIQUES

Page 8: Biometrics techniques

8

Different biometrics techniques concept

2. Facial scan:Uses off-the-shelf camera to measure the following facial features: Distance between the eyes. Distance between the eyes and nose ridge. Angle of a cheek. Slope of the nose. Facial Temperatures.

BIOMETRICS TECHNIQUES

Page 9: Biometrics techniques

9

Different biometrics techniques concept

3. Retina scan:Measures unique characteristics of the retina : Blood vessel patterns Vein patterns

BIOMETRICS TECHNIQUES

Page 10: Biometrics techniques

10

Different biometrics techniques concept

4. Iris scan:Measures unique characteristics of the iris : Ridges (rings) Furrows Striations (freckles)

BIOMETRICS TECHNIQUES

Page 11: Biometrics techniques

11

Different biometrics techniques concept

5. Hand Geometry scan:Measures the top and side of the hand, not the Palm

Hand Geometry. Most widely used technique for physical access. INSPASS System

BIOMETRICS TECHNIQUES

Page 12: Biometrics techniques

12

Different biometrics techniques concept

6. Keystroke Dynamics:Measures the time between strokes and duration of key pressed.

Used in systems with keyboards.

BIOMETRICS TECHNIQUES

Page 13: Biometrics techniques

13

Different biometrics techniques concept

7. Mouse Dynamics:Researched and identified mouse movement categories and features.

• Mouse Movement Categories • Mouse Trajectory ( Path )

System wake up Move and click Highlight Drag and drop

• Mouse Click• Mouse wheel spin or scroll• Mouse activity time

BIOMETRICS TECHNIQUES

Page 14: Biometrics techniques

14

Different biometrics techniques concept

8. Gait Dynamics:Recognize persons with the use of a standard cameras in any conditions.

Particularly studied it may enable identification at distance

BIOMETRICS TECHNIQUES

Page 15: Biometrics techniques

15

Different biometrics techniques concept

9. Voice Print:Measures the sound waves of human speech.

user talks to a microphone a passphrase. Voice print is compared to a previous one

BIOMETRICS TECHNIQUES

Page 16: Biometrics techniques

16

Different biometrics techniques concept

10. Signature verification:Measures speed, pressure, stroke order an image of signature.

Non-repudiation. The movement of the pen during the signing process rather

than the static image of the signature. Detect pen pressure, the sound the pen makes, Speed …etc

BIOMETRICS TECHNIQUES

Page 17: Biometrics techniques

17

Different biometrics techniques concept

11. Palm vain recognition:Measures the structure of the blood veins in a palm hand.

Near-infrared light detect an iron-containing pigment in hemoglobin.

Pigments absorb the near-infrared light and reduce the reflection rate causing the veins to appear as a black pattern

BIOMETRICS TECHNIQUES

Page 18: Biometrics techniques

18

Biometric techniques factors of evaluation False Acceptance Rate (FAR)

The system incorrectly declares Acceptance

False Rejection Rate (FRR) The system incorrectly declares failure

Failure To Enroll Rate (FTE) The percentage of data input that fails to input to the system

Ability To Verify (AVT) AVT = (1 - FTE)(1 - FRR)

BIOMETRICS TECHNIQUES

Page 19: Biometrics techniques

19

Relation Between FAR & FRR

BIOMETRICS TECHNIQUES

Page 20: Biometrics techniques

20

Comparison of biometric techniquesMarket Share

BIOMETRICS TECHNIQUES

Page 21: Biometrics techniques

21

Comparison of biometric techniquesCharacteristics

BIOMETRICS TECHNIQUES

Page 22: Biometrics techniques

22

Comparison of biometric techniquesRequirements

BIOMETRICS TECHNIQUES

Page 23: Biometrics techniques

23

BIOMETRICS TECHNIQUESComparison of biometric techniques

Page 24: Biometrics techniques

24

Comparison of biometric techniques

BIOMETRICS TECHNIQUES

Technique Strengths Weaknesses

Fingerprint Mature technologyHighly accurateLow cost, Small size, becoming widely

Users can create high FRRSome persons dislike contact with device

Face Widely acceptable to users, low cost No direct contactPassive monitoring possible

Less accurate than other methods

Retina Highly accurate Inconvenient for persons with glasses Dislike contact with device and light beam

Iris Highly accurateWorks with glassesAcceptable to users than retina

New technologyCost, although but is changing

Hand Accurate and flexibleWidely acceptable to users

User interface is bulkyDislike contact with device

Voice Usable over telephone systemGood for remote access

Less accuracySubject to background noise

Signature Widely acceptable to users Less accuracyNot widely used yetbut has potential with PDAs

Page 25: Biometrics techniques

25

Biometrics Identification & Verification

BIOMETRICS TECHNIQUES

Page 26: Biometrics techniques

26

Biometrics Identification & Verification Verification, or 1-to-1:

Matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token).

Identification, or 1-to-Many: Identifies a person from the entire enrolled population.

BIOMETRICS TECHNIQUES

Page 27: Biometrics techniques

27

Biometrics System Stages

BIOMETRICS TECHNIQUES

Page 28: Biometrics techniques

28

Fingerprint TechnologyLight reflects from the surface of the prism where the finger is not in contact with it, while it penetrates the surface of the prism where the finger touches the surface of the prism. The resulting image goes through a lens into a video camera or sensor.

BIOMETRICS TECHNIQUES

Light source

Finger

Video Camera (CCD)

LensPrism

Page 29: Biometrics techniques

29

Fingerprint Technology

Arches Loops Whorl

Bridge Dot Ridge Ending Bifurcation Enclosure

Minutia types

BIOMETRICS TECHNIQUES

Page 30: Biometrics techniques

30

Fingerprint Information

BIOMETRICS TECHNIQUES

Page 31: Biometrics techniques

31

Fingerprint ThreatsMatsumoto’s Technique

BIOMETRICS TECHNIQUES

Page 32: Biometrics techniques

32

Fingerprint ThreatsMatsumoto’s Technique You can place the “gummy finger” over your real

finger. Observers aren’t likely to detect it when you use it on a fingerprint reader.

BIOMETRICS TECHNIQUES