35
Authors: Anil K. Jain , Arun Ross and Sharath Pankanti Presented By: Payas Gupta

Biometrics A tool for Information Security

  • Upload
    ayla

  • View
    89

  • Download
    2

Embed Size (px)

DESCRIPTION

Biometrics A tool for Information Security. Authors: Anil K. Jain , Arun Ross and Sharath Pankanti. Presented By: Payas Gupta. Outline. Today’s security related concerns Commonly used Biometrics Variance in Biometrics Operation of Biometrics Systems Attacks on Biometric System - PowerPoint PPT Presentation

Citation preview

Page 1: Biometrics A tool for Information Security

Authors:Anil K. Jain , Arun Ross and Sharath Pankanti

Presented By: Payas Gupta

Page 2: Biometrics A tool for Information Security

OutlineToday’s security related concernsCommonly used BiometricsVariance in BiometricsOperation of Biometrics SystemsAttacks on Biometric SystemMulti Biometric SystemsLevel of fusion in Biometric Systems

Page 3: Biometrics A tool for Information Security

Today’s Security related QuestionsIs she really who she claims to be?

Is this person authorized to use this facility?

Is he in the watch list posted by the government?

Biometrics,Science of recognizing an individual based on his or her physical or behavioral traits

Page 4: Biometrics A tool for Information Security

Paper is all aboutExamining applications where biometrics can

solve issues pertaining to information security

Enumerating the fundamental challenges encountered by biometric systems in real-world applications

Discussing solutions to address the problems of scalability and security in large-scale authentication systems

Page 5: Biometrics A tool for Information Security

Commonly Used BiometricsIn this paper Others, widely used

Page 6: Biometrics A tool for Information Security

Research Going on…Heart Beat

Galvanic Skin Conductivity

Pulse Rate

Brain tissues

Respiration

DNA

Page 7: Biometrics A tool for Information Security

FaceLocation and shape of facial attributes

Eyes, eyebrows, nose, lips and chinGlobal Analysis of face as weighted

combination of no. of canonical faces.

Disadvantages:Face could be an image (photograph)Difficult to locate the face if there is oneDifficult to match from any poseTemplate Update Problem

Page 8: Biometrics A tool for Information Security

FingerprintPattern of ridges and valleys on fingertipFingerprint scanner, cheap approx. $30Fingerprint of Identical twins are different

Disadvantage:Large computation resource when in

identification mode

Page 9: Biometrics A tool for Information Security

Hand GeometryHuman Hand

Shape and size of palmLength and widths of fingersRelatively easy to useInexpensiveEnvironmental conditions do not affect

DisadvantageNot very distinctiveIndividual jewelry Limitation in dexterity (e.g. Arthritis)

Page 10: Biometrics A tool for Information Security

IrisIris, is bounded by pupil and the white portion of

eyeHigh accuracy and speedEach Iris is believed to be distinctiveAbility to detect artificial Irises (contact lenses).Low FAR but could be high FRR

Disadvantages:Considerable user participationexpensive

Page 11: Biometrics A tool for Information Security

KeystrokeHypothesis

Behavioral biometriceach person types on keyboard in a characteristic

way.Not unique, but sufficiently different that permits

identity verification

Disadvantage:typing patterns change substantially between

consecutive instances of typing the password different style of keyboard

Page 12: Biometrics A tool for Information Security

SignatureThe way a person sign

Excepted all throughout the worldBehavioral BiometricPossibility of changing in emotional and

physical conditions.

Disadvantage:Professional forgers may be able to reproduce

signatures that fool the system.

Page 13: Biometrics A tool for Information Security

VoicePhysical + Behavioral BiometricDepends on:

Shape and size of vocal tracts, mouth, nasal cavities and lips

Disadvantages:Physical part are invariant from each otherBut, behavioral part changes from age,

emotional state and medical conditions (cold).Background noise

Page 14: Biometrics A tool for Information Security
Page 15: Biometrics A tool for Information Security

Major Problem

Page 16: Biometrics A tool for Information Security

Inconsistent Presentation

Page 17: Biometrics A tool for Information Security

Irreproducible Presentation

Page 18: Biometrics A tool for Information Security

Imperfect Representation Acquisition

Page 19: Biometrics A tool for Information Security
Page 20: Biometrics A tool for Information Security

Feature set

Preprocess Extract Features

Raw Biometric Processed

Compare and Validate

Page 21: Biometrics A tool for Information Security

Functionalities of a Biometric systemVerification

“Is this person truly John Doe?”

Identification “Is this person in the database?”

Screening “Is this a wanted person?”

Page 22: Biometrics A tool for Information Security

Matcher AccuracyFMR (False Match Rate)

Incorrectly declares a successful matchFNMR (False non Match Rate)

Incorrectly declares failure of match FTE (Failure to Enroll)

% of times users are not able to enroll to the system

FTC (Failure to Capture)% of times, device fails to capture the sample

Page 23: Biometrics A tool for Information Security
Page 24: Biometrics A tool for Information Security

Zero effort attacksIntruder: sufficiently similar biometric traits to a

legitimate userProblem under examination

Determine the probability that any two (or more) individuals may have sufficiently similar fingerprints in a given target population

Given a sample fingerprint, determine the probability of finding a sufficiently similar fingerprint in a target population

Given two fingerprints from two different fingers, determine the probability that they are sufficiently similar.

Page 25: Biometrics A tool for Information Security

Adversary AttacksPhysical traits can be obtained from face,

fingerprints.

Page 26: Biometrics A tool for Information Security

Other Attacks…Circumvention

Fraudulent access to the system, tamper the sensitive data

RepudiationBank clerk Modify the customer record, and claim

that intruder spoof his biometric traitCollusion

Administrator may deliberately modify biometricCoercion

at gunpoint, grant him access to the system.Denial of Service (DoS)

A server can be bombarded with a large number of bogus requests

Page 27: Biometrics A tool for Information Security

Vulnerabilities in Biometric System

Sensor Application DeviceMatcherFeature

Extractor

Stored Template

s

Fake Biometric

Override Feature Extractor

Override final DecisionOverride Matcher

Synthesized Feature Vector

Replay Old Data

Intercept the channel

Modify Template

Y/N

Page 28: Biometrics A tool for Information Security

MultiBiometric systemsOne can have the fusion of multiple

biometrics, to get a high amount of accuracy.

Page 29: Biometrics A tool for Information Security

Feature Level Score LevelDecision Level

Page 30: Biometrics A tool for Information Security

Accept/Reject

Page 31: Biometrics A tool for Information Security

Accept/Reject

Feature Extracti

on Module

Decision Module

Matching

Module

Matching

Module

Templates

Templates

Feature Extracti

on Module

Feature Set

Feature Set

Page 32: Biometrics A tool for Information Security

Accept/Reject

Feature Extracti

on Module

Matching

Module

Matching

Module

Templates

Templates

Feature Extracti

on Module

Feature Set

Feature Set

Page 33: Biometrics A tool for Information Security

Summary and ConclusionMore reliable than current passwords

Cannot be easily sharedMisplace and forged

A well implemented biometric system with sufficient privacy safeguards may be a further basis of resistance.

Multibiometric systems have received much attention in recent researches.Speech + faceFace +fingerMultiple fingers of users

Page 34: Biometrics A tool for Information Security

Cont…The complexity of biometric system depends

onAccuracyScaleSize of the databaseUsability

Page 35: Biometrics A tool for Information Security