+ All Categories
Home > Documents > Biometric Authentication Security

Biometric Authentication Security

Date post: 07-Apr-2018
Category:
Upload: brainser-sharma
View: 223 times
Download: 0 times
Share this document with a friend

of 14

Transcript
  • 8/4/2019 Biometric Authentication Security

    1/14

    Biometrics

    (Authentication & Security)

    Umesh Sharma

  • 8/4/2019 Biometric Authentication Security

    2/14

    Lets Define !

    A biometric is a physiological or behavioral

    characteristic of a human being that can distinguish

    one person from another and that theoretically can be

    used for identification orverification of identity.Authentication depends on

    What you have

    What you know

    What you ARE !

  • 8/4/2019 Biometric Authentication Security

    3/14

    Why Biometrics?

    Identity thefts

    Something you know can be stolen

    Predicted or hacked

    Reliability on manual verification

    Biometric applications available today arecategorized into 2 sectors

    Psychological: Iris, Fingerprints, Hand, Retinal andFace recognition

    Behavioral: Voice, Typing pattern, Signature

  • 8/4/2019 Biometric Authentication Security

    4/14

    The metrics of Biometrics

    FTE Failure To Enroll

    FTA Failure To Accept

    FAR False Acceptance Rates

    FRR False Reject Rates

  • 8/4/2019 Biometric Authentication Security

    5/14

    BIOMETRIC PROCESS

    Capture

    Process

    Capture

    Process

    COMPARE

    STORE

    ENROLLMENT

    VERIFICATION

    NO MATCH

    MATCH

  • 8/4/2019 Biometric Authentication Security

    6/14

    Fingerprint recognition

    Divides print into loops, whorls and arch

    Calculates minutiae points (ridge endings)

    Comparisons

    Authentication

    Disadvantages

    Racial issues

    Dirt , grime and wounds

    Placement of finger Too big a database to process

    Can be spoofed liveness important!

  • 8/4/2019 Biometric Authentication Security

    7/14

  • 8/4/2019 Biometric Authentication Security

    8/14

    Retinal Scanning

    Scans retina into database

    User looks straight into retinal reader

    Scan using low intensity light

    Very efficient cant be spoofed!

    Disadvantages

    User has to look directly

    FTE ratio high in this biometric Acceptability concerns

    Light exposure

    Hygiene

  • 8/4/2019 Biometric Authentication Security

    9/14

    Face recognition User faces camera

    Neutral expression required

    Apt lighting and position

    Algorithms for processing

    Decision

    Issues

    Identification across expression

    FRR or FAR fluctuate Easily spoofed

    Tougher usability

    High Environmental impact

  • 8/4/2019 Biometric Authentication Security

    10/14

    Voice Recognition Speech input

    Frequency Duration Cadence

    Neutral tone User friendly

    Disadvantages Local acoustics Background noise

    Device quality Illness , emotional behavior Time consuming enrollment Large processing template

  • 8/4/2019 Biometric Authentication Security

    11/14

    Signature Recognition Signature measures (dynamic)

    Speed

    Velocity

    Pressure

    Captures images (static)

    High user acceptance

    Issues

    Signature variable with Age, illness, emotions

    Requires high quality hardware

    High FRR as signatures are very dynamic

  • 8/4/2019 Biometric Authentication Security

    12/14

    Typing Patterns

    User typing pattern Speed

    Press and Release Rate

    Unique patterns are generated

    Comparisons

    Issues

    Not very scalable

    FRR is high

    Can be spoofed by simple technology(recorders)

  • 8/4/2019 Biometric Authentication Security

    13/14

    Reference

    Wikipedia

    Biometrics by(Jacob)

    Biometrics- Authentication by(Miller)

  • 8/4/2019 Biometric Authentication Security

    14/14

    Thank You!!


Recommended