biometrics techniques
Post on 25-Jun-2015
399 Views
Preview:
DESCRIPTION
TRANSCRIPT
BIOMETRICS TECHNIQUESPresented To:Dr.Ayman Taha
Presented By:Noha Hesham & Moataz Mahmoud
2
OUTLINEIntroduction
User Authentication Approaches What is Biometrics
Biometrics techniques Requirements for an ideal biometric Different Types of biometrics techniques Different biometrics techniques concept Biometric techniques factors of evaluation Comparison of biometric techniques Biometrics Identification & Verification
Biometrics System StagesFingerprint TechnologyFingerprint Threats
3
INTRODUCTION
User Authentication Approaches
Use Something that you KnowEx. Password, PINCan be Forgotten
Use Something that you haveEx. Credit Card, Keys
Can Be lost
Automated measurement of Physiological and/or behavioral characteristics to Determine or authenticate identity
4
Automated measurement of Physiological and/or behavioral characteristics to Determine or authenticate identity Automated measurement
No human involvement. Comparison takes place in Real-Time
Physiological and/or behavioral characteristics Behavioral as User speaks, typing on keyboard, name signature. Physiological as Fingerprint, Hand, Eyes, Face
Determine or authenticate identity
INTRODUCTION “WHAT IS BIOMETRICS”
Identification Systems Verification Systems
1. Who am I?2. Determine Identity
1. Am I who I claim to be?2. Authenticate Identity
5
Requirements for an ideal biometricUniversality
Each person should have the characteristicUniqueness
No two persons should have same characteristicPermanence
The characteristic should not changePerformance
Accuracy, speed, robustness, resource requirementsAcceptability
Extend to people willing to accept a characteristicFaked protection
How easy is to fool the system by fraudulent methods
BIOMETRICS TECHNIQUES
6
Different Type of biometrics techniques
Identification and verification: Fingerprint scan Face recognition ( Facial scan ) Retina scan Iris scan
Verification only: Hand Geometry Keystroke Dynamics Mouse Dynamics Gait Dynamics ( how people walk ) Voice Print Signature
BIOMETRICS TECHNIQUES
7
Different biometrics techniques concept
1. Fingerprint scan:Measures unique characteristics in a fingerprint (minutiae) Crossover Core Bifurcations Ridge ending Island Delta Pore
BIOMETRICS TECHNIQUES
8
Different biometrics techniques concept
2. Facial scan:Uses off-the-shelf camera to measure the following facial features: Distance between the eyes. Distance between the eyes and nose ridge. Angle of a cheek. Slope of the nose. Facial Temperatures.
BIOMETRICS TECHNIQUES
9
Different biometrics techniques concept
3. Retina scan:Measures unique characteristics of the retina : Blood vessel patterns Vein patterns
BIOMETRICS TECHNIQUES
10
Different biometrics techniques concept
4. Iris scan:Measures unique characteristics of the iris : Ridges (rings) Furrows Striations (freckles)
BIOMETRICS TECHNIQUES
11
Different biometrics techniques concept
5. Hand Geometry scan:Measures the top and side of the hand, not the Palm
Hand Geometry. Most widely used technique for physical access. INSPASS System
BIOMETRICS TECHNIQUES
12
Different biometrics techniques concept
6. Keystroke Dynamics:Measures the time between strokes and duration of key pressed.
Used in systems with keyboards.
BIOMETRICS TECHNIQUES
13
Different biometrics techniques concept
7. Mouse Dynamics:Researched and identified mouse movement categories and features.
• Mouse Movement Categories • Mouse Trajectory ( Path )
System wake up Move and click Highlight Drag and drop
• Mouse Click• Mouse wheel spin or scroll• Mouse activity time
BIOMETRICS TECHNIQUES
14
Different biometrics techniques concept
8. Gait Dynamics:Recognize persons with the use of a standard cameras in any conditions.
Particularly studied it may enable identification at distance
BIOMETRICS TECHNIQUES
15
Different biometrics techniques concept
9. Voice Print:Measures the sound waves of human speech.
user talks to a microphone a passphrase. Voice print is compared to a previous one
BIOMETRICS TECHNIQUES
16
Different biometrics techniques concept
10. Signature verification:Measures speed, pressure, stroke order an image of signature.
Non-repudiation. The movement of the pen during the signing process rather
than the static image of the signature. Detect pen pressure, the sound the pen makes, Speed …etc
BIOMETRICS TECHNIQUES
17
Different biometrics techniques concept
11. Palm vain recognition:Measures the structure of the blood veins in a palm hand.
Near-infrared light detect an iron-containing pigment in hemoglobin.
Pigments absorb the near-infrared light and reduce the reflection rate causing the veins to appear as a black pattern
BIOMETRICS TECHNIQUES
18
Biometric techniques factors of evaluation False Acceptance Rate (FAR)
The system incorrectly declares Acceptance
False Rejection Rate (FRR) The system incorrectly declares failure
Failure To Enroll Rate (FTE) The percentage of data input that fails to input to the system
Ability To Verify (AVT) AVT = (1 - FTE)(1 - FRR)
BIOMETRICS TECHNIQUES
19
Relation Between FAR & FRR
BIOMETRICS TECHNIQUES
20
Comparison of biometric techniquesMarket Share
BIOMETRICS TECHNIQUES
21
Comparison of biometric techniquesCharacteristics
BIOMETRICS TECHNIQUES
22
Comparison of biometric techniquesRequirements
BIOMETRICS TECHNIQUES
23
BIOMETRICS TECHNIQUESComparison of biometric techniques
24
Comparison of biometric techniques
BIOMETRICS TECHNIQUES
Technique Strengths Weaknesses
Fingerprint Mature technologyHighly accurateLow cost, Small size, becoming widely
Users can create high FRRSome persons dislike contact with device
Face Widely acceptable to users, low cost No direct contactPassive monitoring possible
Less accurate than other methods
Retina Highly accurate Inconvenient for persons with glasses Dislike contact with device and light beam
Iris Highly accurateWorks with glassesAcceptable to users than retina
New technologyCost, although but is changing
Hand Accurate and flexibleWidely acceptable to users
User interface is bulkyDislike contact with device
Voice Usable over telephone systemGood for remote access
Less accuracySubject to background noise
Signature Widely acceptable to users Less accuracyNot widely used yetbut has potential with PDAs
25
Biometrics Identification & Verification
BIOMETRICS TECHNIQUES
26
Biometrics Identification & Verification Verification, or 1-to-1:
Matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token).
Identification, or 1-to-Many: Identifies a person from the entire enrolled population.
BIOMETRICS TECHNIQUES
27
Biometrics System Stages
BIOMETRICS TECHNIQUES
28
Fingerprint TechnologyLight reflects from the surface of the prism where the finger is not in contact with it, while it penetrates the surface of the prism where the finger touches the surface of the prism. The resulting image goes through a lens into a video camera or sensor.
BIOMETRICS TECHNIQUES
Light source
Finger
Video Camera (CCD)
LensPrism
29
Fingerprint Technology
Arches Loops Whorl
Bridge Dot Ridge Ending Bifurcation Enclosure
Minutia types
BIOMETRICS TECHNIQUES
30
Fingerprint Information
BIOMETRICS TECHNIQUES
31
Fingerprint ThreatsMatsumoto’s Technique
BIOMETRICS TECHNIQUES
32
Fingerprint ThreatsMatsumoto’s Technique You can place the “gummy finger” over your real
finger. Observers aren’t likely to detect it when you use it on a fingerprint reader.
BIOMETRICS TECHNIQUES
top related