Upload
anshul-katara
View
219
Download
0
Embed Size (px)
Citation preview
7/30/2019 An Kit Biometrics
1/34
Security That WorksBIOMETRICS
Made By:-
AKSHAY DUGGAL
MCA(3RD SEM)
7/30/2019 An Kit Biometrics
2/34
DEFINITION
The term Biometric is derived from the Greek wordsbio(= life) and metric (= to measure).
"Biometric" technology, which can recognize people from
their fingerprints, eyes or other bodily characteristics,is becoming cheaper and more powerful.
In IT, biometrics refers to technologies for measuringand analyzing human body characteristics for
authentication purposes.
7/30/2019 An Kit Biometrics
3/34
BEING DIGITAL
Modern computer based biometric systems are employedfor two basic functions.
The first is identification- a one to many comparison.
The second is verification -a one to one comparison.
7/30/2019 An Kit Biometrics
4/34
BIOMETRIC METHODS
Static(also called physiological)measurement of apart of a persons anatomy.
FOR EXAMPLE:
FingerprintRetinal scanIris scanHand geometry
((contd))
7/30/2019 An Kit Biometrics
5/34
((contd))
BIOMETRIC METHODS
Dynamic(also called behavioural) measurement of anaction performed by a person.
FOR EXAMPLE:
SignatureSpeakerKeystroke dynamics
7/30/2019 An Kit Biometrics
6/34
Working of biometrics
Although biometric technologies differ, they all work in asimilar fashion:
The user submits a sample that is an identifiable,unprocessed image or recording of the physiological or
behavioral biometric via an acquisition device (forexample, a scanner or camera).
This biometric is then processed to extract informationabout distinctive features to create a trial template or
verification template.
Templates are large number sequences. The trialtemplate is the users password.
7/30/2019 An Kit Biometrics
7/34
7/30/2019 An Kit Biometrics
8/34
Iris Technology
This recognition method uses the iris of the eye - colored area
that surrounds the pupil.
Iris patterns are unique.
The iris patterns are obtained through a video-based image
acquisition system. .
The technology work well in both verification andidentification modes
7/30/2019 An Kit Biometrics
9/34
Iris structure
7/30/2019 An Kit Biometrics
10/34
Algorithms For Biometrics
Algorithm - a series of directives that tell a biometricsystem how to interpret a specific problem.
Algorithms have a number of steps and are used by the
biometric system to determine if a biometric sample and
record is a match
7/30/2019 An Kit Biometrics
11/34
Daugmans Algorithm For Iris
Technology
In Daugman's algorithms, most
amplitude information is discarded
2048 bits representing an iris pattern
consist of phase information .
Discarding the amplitude information
ensures that the template remains largely
unaffected by changes in illumination
For identification or verification a
template created by imaging an iris iscompared to stored template(s) in a
database. .
7/30/2019 An Kit Biometrics
12/34
Contd..
Hamming distance is found by appyling xor
gate between two strings.
Eg.
String A 1101
String B 1001Result 0100
If the Hamming distance is below the decision
threshold, a positive identification has
effectively been made .
http://en.wikipedia.org/wiki/Hamming_distancehttp://en.wikipedia.org/wiki/Hamming_distance7/30/2019 An Kit Biometrics
13/34
Contd..
In image processing, a Gabor filter
is a linear filterused for edge
detection.
They have been found to be
particularly appropriate for texturerepresentation and discrimination.
In the spatial domain, a 2D Gabor
filter is a function.
http://en.wikipedia.org/wiki/Image_processinghttp://en.wikipedia.org/wiki/Linear_filterhttp://en.wikipedia.org/wiki/Linear_filterhttp://en.wikipedia.org/wiki/Image_processing7/30/2019 An Kit Biometrics
14/34
ContdThe iris is encoded to a unique set of 2048 bits whichserve as the fundamental identication of that person's
particular iris.
These iris bit codes can be stored in a database
Then compared to uniquely identify a person. The size of2048 is sufficiently largeto store the data of several individuals
We wish to extract phase information from the iris asopposed to amplitude information . We use Gabor filtersto extract this
7/30/2019 An Kit Biometrics
15/34
BIOMETRIC TECHNOLOGIES
Fingerprint Biometrics
Hand geometry reading
Retinal scan
Iris scan
Face recognition
Signature recognition
Voice recognition
7/30/2019 An Kit Biometrics
16/34
FINGERPRINT BIOMETRICS
Fingerprints are the most widely used biometric.
Ink based fingerprints have been in use for over acentury, but in recent years they have gone digital.
This can be compared with a database in seconds andwith an extraordinary degree of accuracy.
Fingerprints have the advantage of being cheaper and
simpler than most other biometrics, and account foraround 40% of the market. ((contd))
7/30/2019 An Kit Biometrics
17/34
finger should be put
here
((contd.))
7/30/2019 An Kit Biometrics
18/34
ADVANTAGES & DISADVANTAGES OF
FINGERPRINT BIOMETRICS
ADVANTAGESMature technology.Easy to use /nonintrusive .High accuracy(comparableto PIN authentication).Long-term stability.multiple fingers.
Comparatively low cost
DISADVANTAGESInability to enrollsome users
Affected by skincondition
Sensor may get dirty
7/30/2019 An Kit Biometrics
19/34
HAND GEOMETRY READING
Hand geometrysystems are already used to controlaccess and verify identities at many airports, offices,factories, schools, hospitals, nuclear power plants and highsecurity government buildings.
They are also used in "time and attendance" systems, inwhich shift workers clock on and off using their handprintspreventing time card fraud through "buddy punching".
((contd))
7/30/2019 An Kit Biometrics
20/34
((Contd.))
HAND GEOMETRY MACHINE
7/30/2019 An Kit Biometrics
21/34
ADVANTAGES & DISADVANTAGES OF HAND
GEOMETRY
ADVANTAGESMature Technology
Non-intrusive
High User Acceptance
DISADVANTAGESLow accuracy
High cost
Relatively large readers
7/30/2019 An Kit Biometrics
22/34
RETINAL SCAN
Retinal scanning analyses the layer of blood vessels at theback of the eye. The user looks through a small openingin the device at a small green light. The user must keeptheir head still and eye focused on the light for severalseconds during which time the device will verify his identity.This process takes about 10 to 15 seconds total.
Retina scan is used almost exclusively in high-end securityapplications. It is used for controlling access to areas or
rooms in military installations, power plants, and the likethat are considered high risk security areas.
((contd))
7/30/2019 An Kit Biometrics
23/34
((contd))
RETINAL SCAN
User looks inthe device at asmall green light
7/30/2019 An Kit Biometrics
24/34
ADVANTAGES & DISADVANTAGESOF
RETINAL SCANNING
ADVANTAGESPotential for highaccuracy
Long term stability
Feature is protectedfrom variations
Genetic Independence
DISADVANTAGESDifficult to use intrusive
High sensor cost
Preceived health threat
7/30/2019 An Kit Biometrics
25/34
FACE RECOGNITION
It works by analysing a video image or photograph andidentifying the positions of several dozen fixed"nodal points" on a person's face. These nodal points, mostlybetween the forehead and the upper lip.
Facial recognitionis becoming more widespread becauseit can make use of existing cameras and existing databasesof facial images from driving licences and passports.
Facial recognitioncan also operate "passively" i.e.,without people realising they are being scanned. It can thushelp to spot terrorists at airports ,metro stations and manyother places. ((contd))
7/30/2019 An Kit Biometrics
26/34
((contd))FACE RECOGNITION SYSTEM
7/30/2019 An Kit Biometrics
27/34
ADVANTAGES & DISADVANTAGES OF FACE
RECOGNITION
ADVANTAGES
Low cost
Non-intrusive
Ability to operatecovertly
DISADVANTAGES
Low accuracy
Identical twins attack
Potential for privacyabuse
Affected by appearance& environment
7/30/2019 An Kit Biometrics
28/34
SIGNATURE RECOGNITION
Ahandwritten signaturecan also be a biometric,because how you sign your name is a "behavioral"characteristic.
As pen based computers and personal organisers becomemore popular, the hardware required to capture asignature is increasingly available.
Several firms are usingsignature recognitionas a
friendly biometric that can be introduced whereversignatures are already used
((contd))
7/30/2019 An Kit Biometrics
29/34
((contd))
ELECTRONIC PEN FOR SIGNATURE PURPOSE
7/30/2019 An Kit Biometrics
30/34
ADVANTAGES & DISADVANTAGES OF
SIGNATURE RECOGNITION
ADVANTAGES
Widely accepted
Non-Intrusive
No record of thesignature
DISADVANTAGES
Signatureinconsistencies
Difficult to use
Problem of trivialsignatures
7/30/2019 An Kit Biometrics
31/34
VOICE RECOGNITION
Another form of biometric that does not require specialequipment isvoice recognitionwhich works by analysingan individual's fundamental vocal characteristics.
But while this technology is cheap, it is less reliable than
other biometrics, particularly when only a few seconds ofspeech are available.
The market share of voice recognition has fallen over
the past two years, while that of facial recognition hasgrown.
((contd))
7/30/2019 An Kit Biometrics
32/34
ADVANTAGES & DISADVANTAGES OF VIOCE
RECOGNITION
ADVANTAGES
Use simple micro phone
East to use/non-
intrusive/hands free
No negative association
DISADVANTAGES
Pre-recorded attack
Affected by background
voiceLow accuracy
Variability of voice ((illor drunk))
7/30/2019 An Kit Biometrics
33/34
Biometrics hold for Privacy
Increased Security
Biometric cannot be lost, stolen or forgotten; it cannotbe written down and stolen.
By implementing biometrics organizations can positivelyverify users identities, improving personal accountability.
In conjunction with smart cards biometrics can
provide strong security for Public Key Infrastructure(PKI).
7/30/2019 An Kit Biometrics
34/34
ConclusionAll authentication methods are prone to errors.Nevertheless, reliable user authentication must ensure
that an attacker cannot have mallicious access
Biometrics is uniquely bound to individuals and mayoffer organizations a stronger method ofauthentication.
Biometric systems are not foolproof; they can becompromised by:
Submission of another persons biometric
.