DOC PREVIEW
Biometrics and Authentication

This preview shows page 1-2-16-17-18-34-35 out of 35 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Biometrics and AuthenticationLets Define !Biometrics as AuthenticationWhy Biometrics?Application CategoriesBiometric Authentication ProcessThe metrics of BiometricsEssential parametersFingerprint recognitionFingerprint techniquesDisadvantagesHand GeometryDisadvantageRetinal ScanningSlide 15Iris ScannerFace recognitionIssues with Face Recognition?Slide 19IssuesBehavioralVoice RecognitionSlide 23Signature RecognitionIssuesTyping PatternsSlide 27Usability issues in BiometricsUsability issues…Biometric solutionsGeneral issuesCurrent applicationsClass taskClass task…Thank You!!Biometrics and Biometrics and AuthenticationAuthenticationShivani KirubanandanLets Define !Lets Define ! “A biometric is a A biometric is a physiologicalphysiological or or behavioralbehavioral characteristic of a human characteristic of a human being that can being that can distinguishdistinguish one person one person from another and that theoretically can be from another and that theoretically can be used for used for identificationidentification or or verification verification of of identity.”identity.” “A biometric is a A biometric is a physiologicalphysiological or or behavioralbehavioral characteristic of a human characteristic of a human being that can being that can distinguishdistinguish one person one person from another and that theoretically can be from another and that theoretically can be used for used for identificationidentification or or verification verification of of identity.”identity.”Biometrics as AuthenticationBiometrics as AuthenticationAuthentication depends onAuthentication depends on•What you haveWhat you have•What you know What you know •What you ARE !What you ARE !Authentication depends onAuthentication depends on•What you haveWhat you have•What you know What you know •What you ARE !What you ARE !Why Biometrics?Why Biometrics?•Identity thefts •Something you know can be stolen•Predicted or hacked•Reliability on manual verification•Identity thefts •Something you know can be stolen•Predicted or hacked•Reliability on manual verificationApplication CategoriesApplication CategoriesBiometric applications available Biometric applications available today are categorized into 2 sectorstoday are categorized into 2 sectors•Psychological: Iris, Fingerprints, Hand, Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionRetinal and Face recognition•Behavioral: Voice, Typing pattern, Behavioral: Voice, Typing pattern, SignatureSignatureBiometric applications available Biometric applications available today are categorized into 2 sectorstoday are categorized into 2 sectors•Psychological: Iris, Fingerprints, Hand, Psychological: Iris, Fingerprints, Hand, Retinal and Face recognitionRetinal and Face recognition•Behavioral: Voice, Typing pattern, Behavioral: Voice, Typing pattern, SignatureSignatureBiometric Authentication ProcessBiometric Authentication Process•Acquisition•Creation of Master characteristics•Storage of Master characteristics•Acquisition(s)•Comparison•Decision•Acquisition•Creation of Master characteristics•Storage of Master characteristics•Acquisition(s)•Comparison•DecisionThe metrics of BiometricsThe metrics of Biometrics•FTE – Failure To Enroll•FTA – Failure To Accept•FAR – False Acceptance Rates•FRR – False Reject Rates•FTE – Failure To Enroll•FTA – Failure To Accept•FAR – False Acceptance Rates•FRR – False Reject RatesEssential parametersEssential parameters•Liveness testing•Tamper resistance•Secure communication•Security Threshold level•Fall back node•Liveness testing•Tamper resistance•Secure communication•Security Threshold level•Fall back nodeFingerprint recognitionFingerprint recognition•Divides print into loops, whorls and arch•Calculates minutiae points (ridge endings)•Comparisons •authentication•Divides print into loops, whorls and arch•Calculates minutiae points (ridge endings)•Comparisons •authenticationFingerprint techniquesFingerprint techniques•Optical•Capacitive•Thermal•Ultrasonic•Optical•Capacitive•Thermal•UltrasonicDisadvantagesDisadvantages•Racial issues•Dirt , grime and wounds •Placement of finger•Too big a database to process•Can be spoofed –liveness important!•Racial issues•Dirt , grime and wounds •Placement of finger•Too big a database to process•Can be spoofed –liveness important!Hand GeometryHand Geometry•Geometry of users hands •More reliable than fingerprinting•Balance in performance and usability•Geometry of users hands •More reliable than fingerprinting•Balance in performance and usabilityDisadvantageDisadvantage•Very large scanners •Very large scannersRetinal ScanningRetinal Scanning•Scans retina into database •User looks straight into retinal reader•Scan using low intensity light•Very efficient – cant be spoofed!•Scans retina into database •User looks straight into retinal reader•Scan using low intensity light•Very efficient – cant be spoofed!DisadvantagesDisadvantages•User has to look “directly” •FTE ratio high in this biometric•Acceptability concerns–Light exposure–Hygiene•User has to look “directly” •FTE ratio high in this biometric•Acceptability concerns–Light exposure–HygieneIris ScannerIris Scanner•Scans unique pattern of iris•Iris is colored and visible from far•No touch required•Overcomes retinal scanner issues•Contact lenses an issue?•Scans unique pattern of iris•Iris is colored and visible from far•No touch required•Overcomes retinal scanner issues•Contact lenses an issue?Face recognitionFace recognition•User faces camera•Neutral expression required•Apt lighting and position•Algorithms for processing•Decision•User faces camera•Neutral expression required•Apt lighting and position•Algorithms for processing•DecisionIssues with Face Recognition?Issues with Face Recognition?IssuesIssues•Identification across expression•FRR or FAR fluctuate•Easily spoofed•Tougher usability•High Environmental impact •Identification across expression•FRR or FAR fluctuate•Easily spoofed•Tougher usability•High Environmental impactBehavioralBehavioral•Voice•Signature•Typing pattern•Voice•Signature•Typing patternVoice RecognitionVoice Recognition•Speech input


Biometrics and Authentication

Download Biometrics and Authentication
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Biometrics and Authentication and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Biometrics and Authentication 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?