An Kit Biometrics

Embed Size (px)

Citation preview

  • 7/30/2019 An Kit Biometrics

    1/34

    Security That WorksBIOMETRICS

    Made By:-

    AKSHAY DUGGAL

    MCA(3RD SEM)

  • 7/30/2019 An Kit Biometrics

    2/34

    DEFINITION

    The term Biometric is derived from the Greek wordsbio(= life) and metric (= to measure).

    "Biometric" technology, which can recognize people from

    their fingerprints, eyes or other bodily characteristics,is becoming cheaper and more powerful.

    In IT, biometrics refers to technologies for measuringand analyzing human body characteristics for

    authentication purposes.

  • 7/30/2019 An Kit Biometrics

    3/34

    BEING DIGITAL

    Modern computer based biometric systems are employedfor two basic functions.

    The first is identification- a one to many comparison.

    The second is verification -a one to one comparison.

  • 7/30/2019 An Kit Biometrics

    4/34

    BIOMETRIC METHODS

    Static(also called physiological)measurement of apart of a persons anatomy.

    FOR EXAMPLE:

    FingerprintRetinal scanIris scanHand geometry

    ((contd))

  • 7/30/2019 An Kit Biometrics

    5/34

    ((contd))

    BIOMETRIC METHODS

    Dynamic(also called behavioural) measurement of anaction performed by a person.

    FOR EXAMPLE:

    SignatureSpeakerKeystroke dynamics

  • 7/30/2019 An Kit Biometrics

    6/34

    Working of biometrics

    Although biometric technologies differ, they all work in asimilar fashion:

    The user submits a sample that is an identifiable,unprocessed image or recording of the physiological or

    behavioral biometric via an acquisition device (forexample, a scanner or camera).

    This biometric is then processed to extract informationabout distinctive features to create a trial template or

    verification template.

    Templates are large number sequences. The trialtemplate is the users password.

  • 7/30/2019 An Kit Biometrics

    7/34

  • 7/30/2019 An Kit Biometrics

    8/34

    Iris Technology

    This recognition method uses the iris of the eye - colored area

    that surrounds the pupil.

    Iris patterns are unique.

    The iris patterns are obtained through a video-based image

    acquisition system. .

    The technology work well in both verification andidentification modes

  • 7/30/2019 An Kit Biometrics

    9/34

    Iris structure

  • 7/30/2019 An Kit Biometrics

    10/34

    Algorithms For Biometrics

    Algorithm - a series of directives that tell a biometricsystem how to interpret a specific problem.

    Algorithms have a number of steps and are used by the

    biometric system to determine if a biometric sample and

    record is a match

  • 7/30/2019 An Kit Biometrics

    11/34

    Daugmans Algorithm For Iris

    Technology

    In Daugman's algorithms, most

    amplitude information is discarded

    2048 bits representing an iris pattern

    consist of phase information .

    Discarding the amplitude information

    ensures that the template remains largely

    unaffected by changes in illumination

    For identification or verification a

    template created by imaging an iris iscompared to stored template(s) in a

    database. .

  • 7/30/2019 An Kit Biometrics

    12/34

    Contd..

    Hamming distance is found by appyling xor

    gate between two strings.

    Eg.

    String A 1101

    String B 1001Result 0100

    If the Hamming distance is below the decision

    threshold, a positive identification has

    effectively been made .

    http://en.wikipedia.org/wiki/Hamming_distancehttp://en.wikipedia.org/wiki/Hamming_distance
  • 7/30/2019 An Kit Biometrics

    13/34

    Contd..

    In image processing, a Gabor filter

    is a linear filterused for edge

    detection.

    They have been found to be

    particularly appropriate for texturerepresentation and discrimination.

    In the spatial domain, a 2D Gabor

    filter is a function.

    http://en.wikipedia.org/wiki/Image_processinghttp://en.wikipedia.org/wiki/Linear_filterhttp://en.wikipedia.org/wiki/Linear_filterhttp://en.wikipedia.org/wiki/Image_processing
  • 7/30/2019 An Kit Biometrics

    14/34

    ContdThe iris is encoded to a unique set of 2048 bits whichserve as the fundamental identication of that person's

    particular iris.

    These iris bit codes can be stored in a database

    Then compared to uniquely identify a person. The size of2048 is sufficiently largeto store the data of several individuals

    We wish to extract phase information from the iris asopposed to amplitude information . We use Gabor filtersto extract this

  • 7/30/2019 An Kit Biometrics

    15/34

    BIOMETRIC TECHNOLOGIES

    Fingerprint Biometrics

    Hand geometry reading

    Retinal scan

    Iris scan

    Face recognition

    Signature recognition

    Voice recognition

  • 7/30/2019 An Kit Biometrics

    16/34

    FINGERPRINT BIOMETRICS

    Fingerprints are the most widely used biometric.

    Ink based fingerprints have been in use for over acentury, but in recent years they have gone digital.

    This can be compared with a database in seconds andwith an extraordinary degree of accuracy.

    Fingerprints have the advantage of being cheaper and

    simpler than most other biometrics, and account foraround 40% of the market. ((contd))

  • 7/30/2019 An Kit Biometrics

    17/34

    finger should be put

    here

    ((contd.))

  • 7/30/2019 An Kit Biometrics

    18/34

    ADVANTAGES & DISADVANTAGES OF

    FINGERPRINT BIOMETRICS

    ADVANTAGESMature technology.Easy to use /nonintrusive .High accuracy(comparableto PIN authentication).Long-term stability.multiple fingers.

    Comparatively low cost

    DISADVANTAGESInability to enrollsome users

    Affected by skincondition

    Sensor may get dirty

  • 7/30/2019 An Kit Biometrics

    19/34

    HAND GEOMETRY READING

    Hand geometrysystems are already used to controlaccess and verify identities at many airports, offices,factories, schools, hospitals, nuclear power plants and highsecurity government buildings.

    They are also used in "time and attendance" systems, inwhich shift workers clock on and off using their handprintspreventing time card fraud through "buddy punching".

    ((contd))

  • 7/30/2019 An Kit Biometrics

    20/34

    ((Contd.))

    HAND GEOMETRY MACHINE

  • 7/30/2019 An Kit Biometrics

    21/34

    ADVANTAGES & DISADVANTAGES OF HAND

    GEOMETRY

    ADVANTAGESMature Technology

    Non-intrusive

    High User Acceptance

    DISADVANTAGESLow accuracy

    High cost

    Relatively large readers

  • 7/30/2019 An Kit Biometrics

    22/34

    RETINAL SCAN

    Retinal scanning analyses the layer of blood vessels at theback of the eye. The user looks through a small openingin the device at a small green light. The user must keeptheir head still and eye focused on the light for severalseconds during which time the device will verify his identity.This process takes about 10 to 15 seconds total.

    Retina scan is used almost exclusively in high-end securityapplications. It is used for controlling access to areas or

    rooms in military installations, power plants, and the likethat are considered high risk security areas.

    ((contd))

  • 7/30/2019 An Kit Biometrics

    23/34

    ((contd))

    RETINAL SCAN

    User looks inthe device at asmall green light

  • 7/30/2019 An Kit Biometrics

    24/34

    ADVANTAGES & DISADVANTAGESOF

    RETINAL SCANNING

    ADVANTAGESPotential for highaccuracy

    Long term stability

    Feature is protectedfrom variations

    Genetic Independence

    DISADVANTAGESDifficult to use intrusive

    High sensor cost

    Preceived health threat

  • 7/30/2019 An Kit Biometrics

    25/34

    FACE RECOGNITION

    It works by analysing a video image or photograph andidentifying the positions of several dozen fixed"nodal points" on a person's face. These nodal points, mostlybetween the forehead and the upper lip.

    Facial recognitionis becoming more widespread becauseit can make use of existing cameras and existing databasesof facial images from driving licences and passports.

    Facial recognitioncan also operate "passively" i.e.,without people realising they are being scanned. It can thushelp to spot terrorists at airports ,metro stations and manyother places. ((contd))

  • 7/30/2019 An Kit Biometrics

    26/34

    ((contd))FACE RECOGNITION SYSTEM

  • 7/30/2019 An Kit Biometrics

    27/34

    ADVANTAGES & DISADVANTAGES OF FACE

    RECOGNITION

    ADVANTAGES

    Low cost

    Non-intrusive

    Ability to operatecovertly

    DISADVANTAGES

    Low accuracy

    Identical twins attack

    Potential for privacyabuse

    Affected by appearance& environment

  • 7/30/2019 An Kit Biometrics

    28/34

    SIGNATURE RECOGNITION

    Ahandwritten signaturecan also be a biometric,because how you sign your name is a "behavioral"characteristic.

    As pen based computers and personal organisers becomemore popular, the hardware required to capture asignature is increasingly available.

    Several firms are usingsignature recognitionas a

    friendly biometric that can be introduced whereversignatures are already used

    ((contd))

  • 7/30/2019 An Kit Biometrics

    29/34

    ((contd))

    ELECTRONIC PEN FOR SIGNATURE PURPOSE

  • 7/30/2019 An Kit Biometrics

    30/34

    ADVANTAGES & DISADVANTAGES OF

    SIGNATURE RECOGNITION

    ADVANTAGES

    Widely accepted

    Non-Intrusive

    No record of thesignature

    DISADVANTAGES

    Signatureinconsistencies

    Difficult to use

    Problem of trivialsignatures

  • 7/30/2019 An Kit Biometrics

    31/34

    VOICE RECOGNITION

    Another form of biometric that does not require specialequipment isvoice recognitionwhich works by analysingan individual's fundamental vocal characteristics.

    But while this technology is cheap, it is less reliable than

    other biometrics, particularly when only a few seconds ofspeech are available.

    The market share of voice recognition has fallen over

    the past two years, while that of facial recognition hasgrown.

    ((contd))

  • 7/30/2019 An Kit Biometrics

    32/34

    ADVANTAGES & DISADVANTAGES OF VIOCE

    RECOGNITION

    ADVANTAGES

    Use simple micro phone

    East to use/non-

    intrusive/hands free

    No negative association

    DISADVANTAGES

    Pre-recorded attack

    Affected by background

    voiceLow accuracy

    Variability of voice ((illor drunk))

  • 7/30/2019 An Kit Biometrics

    33/34

    Biometrics hold for Privacy

    Increased Security

    Biometric cannot be lost, stolen or forgotten; it cannotbe written down and stolen.

    By implementing biometrics organizations can positivelyverify users identities, improving personal accountability.

    In conjunction with smart cards biometrics can

    provide strong security for Public Key Infrastructure(PKI).

  • 7/30/2019 An Kit Biometrics

    34/34

    ConclusionAll authentication methods are prone to errors.Nevertheless, reliable user authentication must ensure

    that an attacker cannot have mallicious access

    Biometrics is uniquely bound to individuals and mayoffer organizations a stronger method ofauthentication.

    Biometric systems are not foolproof; they can becompromised by:

    Submission of another persons biometric

    .