23
Topic: BIOMETRICS Presented By:- Ch Ravikumar T.E.ENTC Priya N T.E.ENTC

Overview on Biometrics by Ch.Ravikumar & Priya N

Embed Size (px)

DESCRIPTION

Overview on biometrics

Citation preview

Page 1: Overview on Biometrics by Ch.Ravikumar & Priya N

Topic: BIOMETRICS

Presented By:-Ch Ravikumar T.E.ENTC

Priya N T.E.ENTC

Page 2: Overview on Biometrics by Ch.Ravikumar & Priya N

Contents

1.Defination

2.Generic Biometric

System

3.Types of biometrics

4.Biometric System

Vulnerabilities

5.Security Approaches

Page 3: Overview on Biometrics by Ch.Ravikumar & Priya N

Biometrics

“It is a physiological or behavioral

characteristic of a human being that can

distinguish one person from another and

that theoretically can be used for

identification or verification of identity.”

Who are you? Prove it.

Page 4: Overview on Biometrics by Ch.Ravikumar & Priya N

Generic Biometric System

EnrollmentBiometrics

Sensor

IdentificationBiometrics

Sensor

Feature Extractor

Feature Extractor

Feature Matcher

Template

Database

Page 5: Overview on Biometrics by Ch.Ravikumar & Priya N

Types of biometrics

Page 6: Overview on Biometrics by Ch.Ravikumar & Priya N

Face Recognition

• A face image can be

acquired using a

normal, off-the-shelf

camera

• Easy to accept by

the public

• Cost is rather low

Page 7: Overview on Biometrics by Ch.Ravikumar & Priya N

Finger Printing

• Used in forensics

more than

100 years

• Optical, capacitive

readers

• Liveness detection

Page 8: Overview on Biometrics by Ch.Ravikumar & Priya N

Finger Printing

Page 9: Overview on Biometrics by Ch.Ravikumar & Priya N

Hand Geometry

•Captured using a

CCD camera, or LED

•Orthographic

Scanning

•The system is often

bulky

Page 10: Overview on Biometrics by Ch.Ravikumar & Priya N

Eyes:Iris,Retina

• Extracts features

from the colored

tissue surrounding

the pupil.

• Monochrome

camera with visible

and near infra red

light

• Liveness detection

Page 11: Overview on Biometrics by Ch.Ravikumar & Priya N

DNA

• Deoxyribonucliec

Acid

• Contains Genetic

information

• Differentiated

using base pairs

Page 12: Overview on Biometrics by Ch.Ravikumar & Priya N

Keystrokes

• No special

hardware

Required

• Transparent

capture

Page 13: Overview on Biometrics by Ch.Ravikumar & Priya N

Voice

• Speaker recognition uses

a microphone to record

the voice

• Your voice can vary with

age, illness and

emotions

• Interesting with the

increasing use of mobile

phones

Page 14: Overview on Biometrics by Ch.Ravikumar & Priya N

Biometric System Vulnerabilities

Biometric System

Vulnerabilities

Adversary Attacks

SpoofingTemplate database leakage

Intrinsic

Limitations

Page 15: Overview on Biometrics by Ch.Ravikumar & Priya N

Intrinsic Limitations

• False Non-

Match

• False match

• Zero effort

attack

Page 16: Overview on Biometrics by Ch.Ravikumar & Priya N

Adversary Attacks

• Caused due to

negligence of

authorized persons

• An adversary

exploiting the

system security

using insiders

• Direct attack on the

sensors

Page 17: Overview on Biometrics by Ch.Ravikumar & Priya N

Spoof Attacks

Page 18: Overview on Biometrics by Ch.Ravikumar & Priya N

Template Database leakage

• Biometric template information becomes

available to an adversary

• Easier to recover by using reverse

engineering

Page 19: Overview on Biometrics by Ch.Ravikumar & Priya N

Security Approaches

• Biometric Feature Transformations

• Cryptosystems

Page 20: Overview on Biometrics by Ch.Ravikumar & Priya N

FUTURE METHODS

Face recognition through blood vessels

Page 21: Overview on Biometrics by Ch.Ravikumar & Priya N

FUTURE METHODS

Brainwave recognition

Page 22: Overview on Biometrics by Ch.Ravikumar & Priya N

Any Questions……

Page 23: Overview on Biometrics by Ch.Ravikumar & Priya N