Security Implications of BiometricsWhat is it?Examples of BiometricsComparison of BiometricsFacial Recognition PrimerReal WorldFujistu’s Palm Vein BiometricAttacks and More ProblemsMythBustersSummarySourcesQuestionsSlide 13Colin DoughertyWhat is it?Oldest form of identificationUnique identifiers…not secrets!Examples of BiometricsPhysiological FaceFingerprintIris and RetinalHand VeinsDNA BehavioralVoiceSignatureComparison of BiometricsUniqueness Permanence Collectability Performance CircumventionFacial Recognition PrimerPrincipal components analysisViisage’s “EigenFaces”Real WorldError RatesFalse PositivesFalse NegativesAirport BiometricsFace RecognitionFujistu’s Palm Vein Biometric Infrared RaysFalse Negative = 0.01%False Positive = 0.00008%Attacks and More ProblemsVerify accuracy and input correctlyReplay AttacksHuman RiskPoor Failure Cancelable BiometricsMythBustersDefeat a Fingerprint ScannerCopy of the fingerprint etched in latex.Ballistics gel copy of the fingerprint.Paper copy the fingerprint.SummarySecurity is in layersBiometrics have strengthsBiometrics have weaknessesBiometrics are unique identifiers not secrets!SourcesSecrets & Lies, Digital Security in a Networked World. Bruce Schneier. John Wiley & Sons, 2000 Jonathan Kent. BBC News, Kuala Lumpur: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm Worcester Polytechnic Institute. Viisage http://www.wpi.edu/News/Transformations/2002Spring/recognition.htmlQuestionsWhat are two ways of comparing different Biometrics?Fill in the blank: Biometrics are unique identifiers not ___________!Colin
View Full Document