Upload
ayla
View
89
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Biometrics A tool for Information Security. Authors: Anil K. Jain , Arun Ross and Sharath Pankanti. Presented By: Payas Gupta. Outline. Today’s security related concerns Commonly used Biometrics Variance in Biometrics Operation of Biometrics Systems Attacks on Biometric System - PowerPoint PPT Presentation
Citation preview
Authors:Anil K. Jain , Arun Ross and Sharath Pankanti
Presented By: Payas Gupta
OutlineToday’s security related concernsCommonly used BiometricsVariance in BiometricsOperation of Biometrics SystemsAttacks on Biometric SystemMulti Biometric SystemsLevel of fusion in Biometric Systems
Today’s Security related QuestionsIs she really who she claims to be?
Is this person authorized to use this facility?
Is he in the watch list posted by the government?
Biometrics,Science of recognizing an individual based on his or her physical or behavioral traits
Paper is all aboutExamining applications where biometrics can
solve issues pertaining to information security
Enumerating the fundamental challenges encountered by biometric systems in real-world applications
Discussing solutions to address the problems of scalability and security in large-scale authentication systems
Commonly Used BiometricsIn this paper Others, widely used
Research Going on…Heart Beat
Galvanic Skin Conductivity
Pulse Rate
Brain tissues
Respiration
DNA
FaceLocation and shape of facial attributes
Eyes, eyebrows, nose, lips and chinGlobal Analysis of face as weighted
combination of no. of canonical faces.
Disadvantages:Face could be an image (photograph)Difficult to locate the face if there is oneDifficult to match from any poseTemplate Update Problem
FingerprintPattern of ridges and valleys on fingertipFingerprint scanner, cheap approx. $30Fingerprint of Identical twins are different
Disadvantage:Large computation resource when in
identification mode
Hand GeometryHuman Hand
Shape and size of palmLength and widths of fingersRelatively easy to useInexpensiveEnvironmental conditions do not affect
DisadvantageNot very distinctiveIndividual jewelry Limitation in dexterity (e.g. Arthritis)
IrisIris, is bounded by pupil and the white portion of
eyeHigh accuracy and speedEach Iris is believed to be distinctiveAbility to detect artificial Irises (contact lenses).Low FAR but could be high FRR
Disadvantages:Considerable user participationexpensive
KeystrokeHypothesis
Behavioral biometriceach person types on keyboard in a characteristic
way.Not unique, but sufficiently different that permits
identity verification
Disadvantage:typing patterns change substantially between
consecutive instances of typing the password different style of keyboard
SignatureThe way a person sign
Excepted all throughout the worldBehavioral BiometricPossibility of changing in emotional and
physical conditions.
Disadvantage:Professional forgers may be able to reproduce
signatures that fool the system.
VoicePhysical + Behavioral BiometricDepends on:
Shape and size of vocal tracts, mouth, nasal cavities and lips
Disadvantages:Physical part are invariant from each otherBut, behavioral part changes from age,
emotional state and medical conditions (cold).Background noise
Major Problem
Inconsistent Presentation
Irreproducible Presentation
Imperfect Representation Acquisition
Feature set
Preprocess Extract Features
Raw Biometric Processed
Compare and Validate
Functionalities of a Biometric systemVerification
“Is this person truly John Doe?”
Identification “Is this person in the database?”
Screening “Is this a wanted person?”
Matcher AccuracyFMR (False Match Rate)
Incorrectly declares a successful matchFNMR (False non Match Rate)
Incorrectly declares failure of match FTE (Failure to Enroll)
% of times users are not able to enroll to the system
FTC (Failure to Capture)% of times, device fails to capture the sample
Zero effort attacksIntruder: sufficiently similar biometric traits to a
legitimate userProblem under examination
Determine the probability that any two (or more) individuals may have sufficiently similar fingerprints in a given target population
Given a sample fingerprint, determine the probability of finding a sufficiently similar fingerprint in a target population
Given two fingerprints from two different fingers, determine the probability that they are sufficiently similar.
Adversary AttacksPhysical traits can be obtained from face,
fingerprints.
Other Attacks…Circumvention
Fraudulent access to the system, tamper the sensitive data
RepudiationBank clerk Modify the customer record, and claim
that intruder spoof his biometric traitCollusion
Administrator may deliberately modify biometricCoercion
at gunpoint, grant him access to the system.Denial of Service (DoS)
A server can be bombarded with a large number of bogus requests
Vulnerabilities in Biometric System
Sensor Application DeviceMatcherFeature
Extractor
Stored Template
s
Fake Biometric
Override Feature Extractor
Override final DecisionOverride Matcher
Synthesized Feature Vector
Replay Old Data
Intercept the channel
Modify Template
Y/N
MultiBiometric systemsOne can have the fusion of multiple
biometrics, to get a high amount of accuracy.
Feature Level Score LevelDecision Level
Accept/Reject
Accept/Reject
Feature Extracti
on Module
Decision Module
Matching
Module
Matching
Module
Templates
Templates
Feature Extracti
on Module
Feature Set
Feature Set
Accept/Reject
Feature Extracti
on Module
Matching
Module
Matching
Module
Templates
Templates
Feature Extracti
on Module
Feature Set
Feature Set
Summary and ConclusionMore reliable than current passwords
Cannot be easily sharedMisplace and forged
A well implemented biometric system with sufficient privacy safeguards may be a further basis of resistance.
Multibiometric systems have received much attention in recent researches.Speech + faceFace +fingerMultiple fingers of users
Cont…The complexity of biometric system depends
onAccuracyScaleSize of the databaseUsability