DOC PREVIEW
UCF COT 4810 - Security Implications Of Biometrics

This preview shows page 1-2-3-4 out of 13 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Security Implications of BiometricsWhat is it?Examples of BiometricsComparison of BiometricsFacial Recognition PrimerReal WorldFujistu’s Palm Vein BiometricAttacks and More ProblemsMythBustersSummarySourcesQuestionsSlide 13Colin DoughertyWhat is it?Oldest form of identificationUnique identifiers…not secrets!Examples of BiometricsPhysiological FaceFingerprintIris and RetinalHand VeinsDNA BehavioralVoiceSignatureComparison of BiometricsUniqueness Permanence Collectability Performance CircumventionFacial Recognition PrimerPrincipal components analysisViisage’s “EigenFaces”Real WorldError RatesFalse PositivesFalse NegativesAirport BiometricsFace RecognitionFujistu’s Palm Vein Biometric Infrared RaysFalse Negative = 0.01%False Positive = 0.00008%Attacks and More ProblemsVerify accuracy and input correctlyReplay AttacksHuman RiskPoor Failure Cancelable BiometricsMythBustersDefeat a Fingerprint ScannerCopy of the fingerprint etched in latex.Ballistics gel copy of the fingerprint.Paper copy the fingerprint.SummarySecurity is in layersBiometrics have strengthsBiometrics have weaknessesBiometrics are unique identifiers not secrets!SourcesSecrets & Lies, Digital Security in a Networked World. Bruce Schneier. John Wiley & Sons, 2000 Jonathan Kent. BBC News, Kuala Lumpur: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm Worcester Polytechnic Institute. Viisage http://www.wpi.edu/News/Transformations/2002Spring/recognition.htmlQuestionsWhat are two ways of comparing different Biometrics?Fill in the blank: Biometrics are unique identifiers not ___________!Colin


View Full Document

UCF COT 4810 - Security Implications Of Biometrics

Documents in this Course
Spoofing

Spoofing

25 pages

CAPTCHA

CAPTCHA

18 pages

Load more
Download Security Implications Of Biometrics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security Implications Of Biometrics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security Implications Of Biometrics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?