35
Biometrics and Biometrics and Authentication Authentication Shivani Kirubanandan

Biometrics and Authentication Shivani Kirubanandan

  • View
    227

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Biometrics and Authentication Shivani Kirubanandan

Biometrics and Biometrics and AuthenticationAuthentication

Shivani Kirubanandan

Page 2: Biometrics and Authentication Shivani Kirubanandan

Lets Define !Lets Define !

“A biometric is a A biometric is a physiologicalphysiological or or behavioralbehavioral characteristic of a human characteristic of a human being that can being that can distinguishdistinguish one person one person from another and that theoretically can be from another and that theoretically can be used for used for identificationidentification or or verification verification of of identity.”identity.”

“A biometric is a A biometric is a physiologicalphysiological or or behavioralbehavioral characteristic of a human characteristic of a human being that can being that can distinguishdistinguish one person one person from another and that theoretically can be from another and that theoretically can be used for used for identificationidentification or or verification verification of of identity.”identity.”

Page 3: Biometrics and Authentication Shivani Kirubanandan

Biometrics as AuthenticationBiometrics as Authentication

Authentication depends onAuthentication depends on• What you haveWhat you have• What you know What you know • What you ARE !What you ARE !

Authentication depends onAuthentication depends on• What you haveWhat you have• What you know What you know • What you ARE !What you ARE !

Page 4: Biometrics and Authentication Shivani Kirubanandan

Why Biometrics?Why Biometrics?

• Identity thefts • Something you know can be

stolen• Predicted or hacked• Reliability on manual verification

• Identity thefts • Something you know can be

stolen• Predicted or hacked• Reliability on manual verification

Page 5: Biometrics and Authentication Shivani Kirubanandan

Application CategoriesApplication Categories

Biometric applications available Biometric applications available today are categorized into 2 sectorstoday are categorized into 2 sectors

• Psychological: Iris, Fingerprints, Hand, Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionRetinal and Face recognition

• Behavioral: Voice, Typing pattern, Behavioral: Voice, Typing pattern, SignatureSignature

Biometric applications available Biometric applications available today are categorized into 2 sectorstoday are categorized into 2 sectors

• Psychological: Iris, Fingerprints, Hand, Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionRetinal and Face recognition

• Behavioral: Voice, Typing pattern, Behavioral: Voice, Typing pattern, SignatureSignature

Page 6: Biometrics and Authentication Shivani Kirubanandan

Biometric Authentication ProcessBiometric Authentication Process

• Acquisition• Creation of Master characteristics• Storage of Master characteristics• Acquisition(s)• Comparison• Decision

• Acquisition• Creation of Master characteristics• Storage of Master characteristics• Acquisition(s)• Comparison• Decision

Page 7: Biometrics and Authentication Shivani Kirubanandan

The metrics of BiometricsThe metrics of Biometrics

• FTE – Failure To Enroll• FTA – Failure To Accept• FAR – False Acceptance Rates• FRR – False Reject Rates

• FTE – Failure To Enroll• FTA – Failure To Accept• FAR – False Acceptance Rates• FRR – False Reject Rates

Page 8: Biometrics and Authentication Shivani Kirubanandan

Essential parametersEssential parameters

• Liveness testing• Tamper resistance• Secure communication• Security Threshold level• Fall back node

• Liveness testing• Tamper resistance• Secure communication• Security Threshold level• Fall back node

Page 9: Biometrics and Authentication Shivani Kirubanandan

Fingerprint recognitionFingerprint recognition

• Divides print into loops, whorls and arch

• Calculates minutiae points (ridge endings)

• Comparisons • authentication

• Divides print into loops, whorls and arch

• Calculates minutiae points (ridge endings)

• Comparisons • authentication

Page 10: Biometrics and Authentication Shivani Kirubanandan

Fingerprint techniquesFingerprint techniques

• Optical

• Capacitive

• Thermal

• Ultrasonic

• Optical

• Capacitive

• Thermal

• Ultrasonic

Page 11: Biometrics and Authentication Shivani Kirubanandan

DisadvantagesDisadvantages

• Racial issues• Dirt , grime and wounds • Placement of finger• Too big a database to process• Can be spoofed –liveness important!

• Racial issues• Dirt , grime and wounds • Placement of finger• Too big a database to process• Can be spoofed –liveness important!

Page 12: Biometrics and Authentication Shivani Kirubanandan

Hand GeometryHand Geometry

• Geometry of users hands • More reliable than fingerprinting• Balance in performance and

usability

• Geometry of users hands • More reliable than fingerprinting• Balance in performance and

usability

Page 13: Biometrics and Authentication Shivani Kirubanandan

DisadvantageDisadvantage

• Very large scanners • Very large scanners

Page 14: Biometrics and Authentication Shivani Kirubanandan

Retinal ScanningRetinal Scanning

• Scans retina into database • User looks straight into retinal

reader• Scan using low intensity light• Very efficient – cant be spoofed!

• Scans retina into database • User looks straight into retinal

reader• Scan using low intensity light• Very efficient – cant be spoofed!

Page 15: Biometrics and Authentication Shivani Kirubanandan

DisadvantagesDisadvantages

• User has to look “directly” • FTE ratio high in this biometric• Acceptability concerns

– Light exposure– Hygiene

• User has to look “directly” • FTE ratio high in this biometric• Acceptability concerns

– Light exposure– Hygiene

Page 16: Biometrics and Authentication Shivani Kirubanandan

Iris ScannerIris Scanner

• Scans unique pattern of iris• Iris is colored and visible from far• No touch required• Overcomes retinal scanner issues• Contact lenses an issue?

• Scans unique pattern of iris• Iris is colored and visible from far• No touch required• Overcomes retinal scanner issues• Contact lenses an issue?

Page 17: Biometrics and Authentication Shivani Kirubanandan

Face recognitionFace recognition

• User faces camera

• Neutral expression required

• Apt lighting and position

• Algorithms for processing

• Decision

• User faces camera

• Neutral expression required

• Apt lighting and position

• Algorithms for processing

• Decision

Page 18: Biometrics and Authentication Shivani Kirubanandan

Issues with Face Recognition?Issues with Face Recognition?

Page 19: Biometrics and Authentication Shivani Kirubanandan
Page 20: Biometrics and Authentication Shivani Kirubanandan

IssuesIssues

• Identification across expression• FRR or FAR fluctuate• Easily spoofed• Tougher usability• High Environmental impact

• Identification across expression• FRR or FAR fluctuate• Easily spoofed• Tougher usability• High Environmental impact

Page 21: Biometrics and Authentication Shivani Kirubanandan

BehavioralBehavioral

• Voice• Signature• Typing pattern

• Voice• Signature• Typing pattern

Page 22: Biometrics and Authentication Shivani Kirubanandan

Voice RecognitionVoice Recognition• Speech input

– Frequency– Duration – Cadence

• Neutral tone • User friendly

• Speech input – Frequency– Duration – Cadence

• Neutral tone • User friendly

Page 23: Biometrics and Authentication Shivani Kirubanandan

DisadvantagesDisadvantages

• Local acoustics• Background noise• Device quality• Illness , emotional behavior• Time consuming enrollment• Large processing template

• Local acoustics• Background noise• Device quality• Illness , emotional behavior• Time consuming enrollment• Large processing template

Page 24: Biometrics and Authentication Shivani Kirubanandan

Signature RecognitionSignature Recognition

• Signature measures (dynamic)– Speed– Velocity– Pressure • Captures images (static)• High user acceptance

• Signature measures (dynamic)– Speed– Velocity– Pressure • Captures images (static)• High user acceptance

Page 25: Biometrics and Authentication Shivani Kirubanandan

Issues Issues

• Signature variable with– Age, illness, emotions• Requires high quality hardware• High FRR as signatures are very dynamic

• Signature variable with– Age, illness, emotions• Requires high quality hardware• High FRR as signatures are very dynamic

Page 26: Biometrics and Authentication Shivani Kirubanandan

Typing Patterns Typing Patterns

• User typing pattern– Speed– Press and Release Rate• Unique patterns are generated• comparisons

• User typing pattern– Speed– Press and Release Rate• Unique patterns are generated• comparisons

Page 27: Biometrics and Authentication Shivani Kirubanandan

IssuesIssues

• Not very scalable

• FRR is high

• Can be spoofed – by simple technology (recorders)

• Not very scalable

• FRR is high

• Can be spoofed – by simple technology (recorders)

Page 28: Biometrics and Authentication Shivani Kirubanandan

Usability issues in BiometricsUsability issues in Biometrics

• User acceptability• Knowledge of technology• Familiarity with biometric

characteristic• Experience with device

• User acceptability• Knowledge of technology• Familiarity with biometric

characteristic• Experience with device

Page 29: Biometrics and Authentication Shivani Kirubanandan

Usability issues…Usability issues…

• Environment of use• Transaction criticality • Time consuming tasks

• Environment of use• Transaction criticality • Time consuming tasks

Page 30: Biometrics and Authentication Shivani Kirubanandan

Biometric solutionsBiometric solutions

• Educate• Train• Explain Interfaces• Use Trainers• Supervised Playtime

• Educate• Train• Explain Interfaces• Use Trainers• Supervised Playtime

Page 31: Biometrics and Authentication Shivani Kirubanandan

General issuesGeneral issues

• FTE posses problem• Biometric characteristics are not

encrypted• Trust on input device• Cannot authenticate computers!• Privacy attack?!

• FTE posses problem• Biometric characteristics are not

encrypted• Trust on input device• Cannot authenticate computers!• Privacy attack?!

Page 32: Biometrics and Authentication Shivani Kirubanandan

Current applicationsCurrent applications

• Banks • Immigration facilities across USA• IDwidget – interesting research• Eyegaze at Stanford

• Banks • Immigration facilities across USA• IDwidget – interesting research• Eyegaze at Stanford

Page 33: Biometrics and Authentication Shivani Kirubanandan

Class taskClass task

• Sell your biometric productCase1A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?

• Sell your biometric productCase1A bank needs an appropriate authentication mechanism to allow remote user transactions. What kind of multifactor system would you sell them?

Page 34: Biometrics and Authentication Shivani Kirubanandan

Class task…Class task…

Case 2: • Suggest certain areas in which

biometrics would prove disastrous• Note- You may suggest a particular

combination of biometrics which may be disastrous to security and privacy

Case 2: • Suggest certain areas in which

biometrics would prove disastrous• Note- You may suggest a particular

combination of biometrics which may be disastrous to security and privacy

Page 35: Biometrics and Authentication Shivani Kirubanandan

Thank You!!Thank You!!