Biometrics

  • Uploaded by: dagini
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Biometrics as PDF for free.

More details

  • Words: 821
  • Pages: 26
BIOMETRIC TECHNOLOGY PRESENTED BY

BESSY BASIL S3 CS ROLL NO:52

Biometrics

Descriptions • Biometrics: Science of identifying, or verifying the identity of, a person based on physiological or behavioral characteristics

CHARACTERISTICS USED • • • • • •

Fingerprints Voiceprints Facial features Writing patterns Iris patterns Hand geometry

Why use biometrics? Traditionally… • What you have – keys, badges, ID cards • What you know – username/password, PIN, combination, personal info. (SSN, DOB, etc.) BIOMETRICS… • What you are – Convenience (can’t lose it or forget it) – Helps combat identity theft, workplace fraud, etc. – National security (Iraq, Afghanistan, US borders) – Personal security (protects personal property)

How is biometrics used? • • • • •

ATM Retail Purchases Airports Criminals Cold Cases – Afghan girl

• Commercial – Laptops, PCs – Home and Car locks

HOW IT WORKS – The hardware captures the salient human characteristic – The software interprets the resulting data and determines acceptability.

What is a Biometric Identification System(BIS)? How do you build such a System?

• A Biometric Identification System is:

– A combination of multiple components build into a turn-key, endto-end Integrated system which at core for one or multiple biometrics solves the two main problems of: • Image Processing and Template Extraction and, • Search and Matching;

• plus – The full range of business and customer operation requirements for the target market application; • Criminal Justice Information Systems, (AFIS) • Civil Identity Management, (National ID Card, Voter Registration, Passport/Visa, Driver License) • Commercial market, (Cybersecurity

Descriptions • Authorization: Permission or approval.

Authentication: Validating or figuring out the identity of a person. 

Authentication There are 3 traditional way of verifying the identity of a person: • Possessions (keys, passports, smartcards , …) • Knowledge Secret (passwords, pass phrases, …) Non-secret (user Id, mothers maiden name, favorite color) • Biometrics Physiological (fingerprints, face, iris, …) Behavioral (walking, keystroke pattern, talking, …)

Authentication • The 3 modes of authentication are sometimes combined – User id + password – ATM card + password – Passport + face picture and signiture

Authentication There are two different authentication methods in biometrics • Verification: Is he/she the person who claims he/she is? Works with id + biometrics. Thus it is based on a combination of modes. • Identification: Who is this person? Uses only the biometrics and searches the entire database

Biometric Identification Biometric identification is based only on biometric credentials.

Biometric Identification Biometric identification system can be used in two different modes Positive identification • Authorization of a group without id

• Negative identification • Most Wanted List

Biometric Verification Biometric verification differs from biometric identification in that the presented biometric is only compared with a single enrolled biometric entity which matches the input id

Biometric Enrollment Process of registering subjects in biometric database Positive Enrollment: • To create a database of eligible subjects • Biometric samples and other credentials are stored in the database. An id (or a smart card) is issued to the subject.

Negative Enrollment: • To create a database of ineligible subjects • Often without subject cooperation or even knowledge

Biometric System Security • Possible Security Concerns: – Biometric information is presented when the owner is not present. – Hacking the scanner, feature extractor, matcher, database, and any other possible module in the system.

Descriptions • Authorization: Permission to access a resource • Access Control: A mechanism for limiting the use of some resource to authorized users • Access Control List: A data structure associated with a resource that specifies the authorized users and the conditions for their access • Authenticate: To determine that something is genuine; to determine reliably the identity of the communicating party • Authentication: Permission to access a resource

Passwords versus Biometrics • Passwords: Exact match • Biometrics: Probabilistic match – FAR, FRR

Benefits of Biometric Technologies • Verification of identity upon apprehension of a suspect • Identification of potential suspects from forensic biometric-based evidence • Identification of persons of law enforcement interest in public places • Border control • Risk management

Benefits of Biometric Technologies • • • • • •

Fraud prevention Identification theft Program administration File matching Perimeter security Access to secure systems

What are biometric downfalls? • Privacy concerns – biometric traits are publicly known • Unauthorized use – functionality creep (medical data • Biometric crimes – kidnapping and theft of body parts. Spoofing or faking biometrics traits.

RELEVANCE • The Indian government to new biometric identification cards to every citizen of the nation that holds 1.2 billion people. •

This new database will help the Indian government collect taxable income.

• cost -- seven billion pounds ($11.45 billion) and it will be operated by the Unique Identification Authority, which is a new government department in India. • According to Mr.Nandan Nilekani, it will take up to eighteen months to issue these new identification cards however

FINGERPRINT PC LOCK

FINGERPRINT DOOR LOCK

IRIS SCAN IMAGE

Related Documents

Biometrics
May 2020 7
Biometrics
June 2020 6
Biometrics
July 2020 6
Biometrics
June 2020 6
Biometrics
July 2020 8
Biometrics Sj
June 2020 7

More Documents from ""

Biometrics
July 2020 8