BIOMETRIC TECHNOLOGY PRESENTED BY
BESSY BASIL S3 CS ROLL NO:52
Biometrics
Descriptions • Biometrics: Science of identifying, or verifying the identity of, a person based on physiological or behavioral characteristics
CHARACTERISTICS USED • • • • • •
Fingerprints Voiceprints Facial features Writing patterns Iris patterns Hand geometry
Why use biometrics? Traditionally… • What you have – keys, badges, ID cards • What you know – username/password, PIN, combination, personal info. (SSN, DOB, etc.) BIOMETRICS… • What you are – Convenience (can’t lose it or forget it) – Helps combat identity theft, workplace fraud, etc. – National security (Iraq, Afghanistan, US borders) – Personal security (protects personal property)
How is biometrics used? • • • • •
ATM Retail Purchases Airports Criminals Cold Cases – Afghan girl
• Commercial – Laptops, PCs – Home and Car locks
HOW IT WORKS – The hardware captures the salient human characteristic – The software interprets the resulting data and determines acceptability.
What is a Biometric Identification System(BIS)? How do you build such a System?
• A Biometric Identification System is:
– A combination of multiple components build into a turn-key, endto-end Integrated system which at core for one or multiple biometrics solves the two main problems of: • Image Processing and Template Extraction and, • Search and Matching;
• plus – The full range of business and customer operation requirements for the target market application; • Criminal Justice Information Systems, (AFIS) • Civil Identity Management, (National ID Card, Voter Registration, Passport/Visa, Driver License) • Commercial market, (Cybersecurity
Descriptions • Authorization: Permission or approval.
Authentication: Validating or figuring out the identity of a person.
Authentication There are 3 traditional way of verifying the identity of a person: • Possessions (keys, passports, smartcards , …) • Knowledge Secret (passwords, pass phrases, …) Non-secret (user Id, mothers maiden name, favorite color) • Biometrics Physiological (fingerprints, face, iris, …) Behavioral (walking, keystroke pattern, talking, …)
Authentication • The 3 modes of authentication are sometimes combined – User id + password – ATM card + password – Passport + face picture and signiture
Authentication There are two different authentication methods in biometrics • Verification: Is he/she the person who claims he/she is? Works with id + biometrics. Thus it is based on a combination of modes. • Identification: Who is this person? Uses only the biometrics and searches the entire database
Biometric Identification Biometric identification is based only on biometric credentials.
Biometric Identification Biometric identification system can be used in two different modes Positive identification • Authorization of a group without id
• Negative identification • Most Wanted List
Biometric Verification Biometric verification differs from biometric identification in that the presented biometric is only compared with a single enrolled biometric entity which matches the input id
Biometric Enrollment Process of registering subjects in biometric database Positive Enrollment: • To create a database of eligible subjects • Biometric samples and other credentials are stored in the database. An id (or a smart card) is issued to the subject.
Negative Enrollment: • To create a database of ineligible subjects • Often without subject cooperation or even knowledge
Biometric System Security • Possible Security Concerns: – Biometric information is presented when the owner is not present. – Hacking the scanner, feature extractor, matcher, database, and any other possible module in the system.
Descriptions • Authorization: Permission to access a resource • Access Control: A mechanism for limiting the use of some resource to authorized users • Access Control List: A data structure associated with a resource that specifies the authorized users and the conditions for their access • Authenticate: To determine that something is genuine; to determine reliably the identity of the communicating party • Authentication: Permission to access a resource
Passwords versus Biometrics • Passwords: Exact match • Biometrics: Probabilistic match – FAR, FRR
Benefits of Biometric Technologies • Verification of identity upon apprehension of a suspect • Identification of potential suspects from forensic biometric-based evidence • Identification of persons of law enforcement interest in public places • Border control • Risk management
Benefits of Biometric Technologies • • • • • •
Fraud prevention Identification theft Program administration File matching Perimeter security Access to secure systems
What are biometric downfalls? • Privacy concerns – biometric traits are publicly known • Unauthorized use – functionality creep (medical data • Biometric crimes – kidnapping and theft of body parts. Spoofing or faking biometrics traits.
RELEVANCE • The Indian government to new biometric identification cards to every citizen of the nation that holds 1.2 billion people. •
This new database will help the Indian government collect taxable income.
• cost -- seven billion pounds ($11.45 billion) and it will be operated by the Unique Identification Authority, which is a new government department in India. • According to Mr.Nandan Nilekani, it will take up to eighteen months to issue these new identification cards however
FINGERPRINT PC LOCK
FINGERPRINT DOOR LOCK
IRIS SCAN IMAGE