DOC PREVIEW
UTD CS 6V81 - Lecture #4 Introduction to Biometrics

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction to BiometricsOutlineWhat is Biometrics?What is the Process?Why Biometrics?Why Biometrics? (Continued)Slide 7Why Biometrics? (Concluded)Biometrics ResourcesBiometrics Resources: What is academia doing?Biometrics Resources: What is Industry doing?Biometrics Resources: What is Government doing?Activities of NISTActivities of NIST (Continued)Activities of NIST (Concluded)What is Secure Biometrics?Security VulnerabilitiesSecurity and Privacy for BiometricsRevisiting Topics CoveredSlide 20Outline of the Course (Continued)Slide 22Slide 23Outline of the Course (Concluded)Some Exploratory Research Areas not coveredSome Useful Reference BooksIntroduction to BiometricsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #4Introduction to BiometricsAugust 31, 2005OutlineIntroduction to Biometrics-What is Biometrics?-What is the Process?-Why Biometrics?Biometrics ResourcesWhat is Secure BiometricsRevisiting Topics to be coveredSome exploratory research areasSome useful reference booksWhat is Biometrics?Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristicFeatures measured: Face, Fingerprints, Hand geometry, handwriting, Iris, Retinal, Vein and VoiceIdentification and personal certification solutions for highly secure applicationsNumerous applications: medical, financial, child care, computer access etc.What is the Process?Three-steps: Capture-Process-VerificationCapture: A raw biometric is captured by a sensing device such as fingerprint scanner or video cameraProcess: The distinguishing characteristics are extracted from the raw biometrics sample and converted into a processed biometric identifier record-Called biometric sample or templateVerification and Identification-Matching the enrolled biometric sample against a single record; is the person really what he claims to be?-Matching a biometric sample against a database of identifiersWhy Biometrics?Biometrics replaces Traditional Authentication MethodsProvides better securityMore convenientBetter accountabilityApplications on Fraud detection and Fraud deterrenceDual purpose-Cyber Security and National SecurityWhy Biometrics? (Continued)Authentication mechanisms often used are User ID and PasswordsHowever password mechanisms have vulnerabilities-Stealing passwords etc.Biometrics systems are less prone to attacksNeed sophisticated techniques for attacks-Cannot steal facial features and fingerprints-Need sophisticated image processing techniques for modifying facial featuresWhy Biometrics? (Continued)Biometrics systems are more convenientNeed not have multiple passwords or difficult passwords-E.g., characters, numbers and special symbols-Need not remember passwordsNeed not carry any cards or tokensBetter accountability-Can determine who accessed the system with less complexityWhy Biometrics? (Concluded)Dual Purpose-Cyber Security and National SecurityAccess to computer systems and networksFraud detection-Who has intruded the system?-Who has entered the building-Surveillance and monitoringFraud Deterrence-Because of biometrics systems, people are nervous to commit crimes-Stealing from supermarkets and shops, etc.Biometrics ResourcesBiometrics Consortium is the major resource-www.biometrics.orgAnother Resource-http://www.biometricsinfo.org/Has Information on-Who is doing whatAcademia, Industry and Government-White papers on Biometrics technologiesFingerprint detection, facial recognition, Iris scanning, - - - -Biometrics Resources: What is academia doing?Michigan State University-Developing algorithms for fingerprint detection, etc.West Virginia University-Forensic identification initiativeSan Jose State University -Mathematical conceptsBiometrics Resources: What is Industry doing?Focus is on building faster and cheaper devicesMore accuracy, less false positives and negativesIncorporating biometrics into mobile devices, SmartcardsBiometrics in healthcare: delivering medication to correct patientsBiometrics in child care: Children are picked up by those authorizedProtecting digital content-Ensuring that voice and video are not alteredVendors: http://www.biometricsinfo.org/vendors.htmBiometrics Resources: What is Government doing?NSA (National Security Agency)-Research on protecting critical information systemsDoD (Department of Defense)-Biometrics Management Office-Provide Armed forces access to Biometrics systems for combat operationsINS/DHS (Department of Homeland Security; Immigration and Nationalization Service)-Biometrics technologies at AirportsNIST (National Institute of Standards and Technologies)-Major player in BiometricsActivities of NISTMeasurements, Testing and Standards is NIST’s missionFocus on Biometrics StandardsActivities-Biometrics Consortium-Common Biometric Exchange File Format-Biometric Interoperability, Performance and Assurance Working Group-BioAPI Consortium-Various StandardsActivities of NIST (Continued)Biometrics Consortium is the Government focal point for research, development and testing of Biometric products and technologiesCommon Biometric Exchange File Format is a product of the consortium to develop common fingerprint template formatsBiometrics Interoperability working group promotes common definitions and concepts for exchanging information between national and international partnersBioAPI consortium develops common Application Programming Interfaces for biometrics technologiesActivities of NIST (Concluded)NIST is developing standards for the following:-Finger image format for data Interchange-Face image format for data interchange-Iris image format for data interchange-Signature image format for data interchangeNIST is working with International standards organizations for joint standards-ISO (International Standards Organization)What is Secure Biometrics?Study the attacks of biometrics systems-Modifying fingerprints-Modifying facial featuresDevelop a security policy and model for the system-Application independent and Application specific policies-Enforce Security constraintsEntire face is classified but the nose can be displayed -Develop a formal model-Formalize the policyDesign the system and identify security critical components-Reference monitor for biometrics systemsSecurity VulnerabilitiesType 1 attack: present fake biometric such


View Full Document

UTD CS 6V81 - Lecture #4 Introduction to Biometrics

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #4 Introduction to Biometrics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #4 Introduction to Biometrics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #4 Introduction to Biometrics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?