Upload
burhan-allah-saiyed
View
224
Download
0
Embed Size (px)
Citation preview
8/9/2019 Bio Metrics- Biological Security Measures
1/35
8/9/2019 Bio Metrics- Biological Security Measures
2/35
Biometrics
Definition:
The science and technologywhich is used to measure andanalyze biological data is calledBiometrics.
In IT Perspective:
The technologies whichmeasure and analyze specifichuman characteristics
Source: SearchSecurity.com
8/9/2019 Bio Metrics- Biological Security Measures
3/35
Types of Biometrics
Behavioral Biometrics:
Characteristics which oneacquires naturally over a periodof time
Speech recognition- analyzingones vocal behavior
Signature- analyzing onessignature dynamics
Keystroke- measuring the timespacing between words
8/9/2019 Bio Metrics- Biological Security Measures
4/35
Speech Recognition
How it works:
Person producesactual sounds
which are recorded
Follow some sort ofscript or code tokeep a standard
voice pattern record
Voice patternidentified bymicrophones
statistical profiles are
created by comparingvarious voice samples todetermine any repeating
patterns
Live voice sample submitted forverification is compared to thestatistical profiles created
Source: findbiometrics.com (An Application of Biometric Technology: Voice Recognition)
8/9/2019 Bio Metrics- Biological Security Measures
5/35
Speech Recognition
Benefits:
Ability to use existing phonelines
Low perceived invasiveness
Can be automated
Disadvantages:
High false non-matching rates
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
6/35
Speech Recognition
Application:
Physical Access Entry
Where remote identification is
requiredFinancial Transactions (accessing ones
accounts, funds transfer, billpayments)
Credit Card Processing (addresschanges notification, balance
transfers, loss prevention)
Source: findbiometrics.com (An Application of Biometric Technology: Voice Recognition)
8/9/2019 Bio Metrics- Biological Security Measures
7/35
Signature Biometrics
Works in 3 Stages: Enrollment: Using a graphical user
interface and a digital pen and tablet,the user provides a required number
of signatures as samples to becompared with. Signature Profile Creation and
Handling: Sample signaturesconverted into templates.
Signature Verification: Comparescurrent signature to pre-setsignature. The server continues tolearn and fine-tune the users profile.
Source: Eyenetwatch.com
8/9/2019 Bio Metrics- Biological Security Measures
8/35
Signature Biometrics
Benefits:
Difficult to mimic the behaviorof signing
Low False Acceptance Rates People used to signing
documents, non-intrusiveapproach
Disadvantages:
People may not always sign in aconsistent manner
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
9/35
Signature Biometrics
Application:
Provides Access to documents
Contract/ Agreement executionAcknowledgement of goods or
services received
Banking services
Postal carriers in developedcountries using Signaturebiometrics to keep records.
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
10/35
Keystroke
Working:
Instead of using signatures, as in previous
case, users are required to punch in theirusername and passwords 15 times.
This is to make the findings moreconsistent.
Source: Findbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
11/35
Keystroke
The distinctive, behavioralcharacteristics measured by KeystrokeRecognition include:
The cumulative typing speed;
The time that elapses between consecutivekeystrokes;
The time that each key is held down;
The frequency of the individual in usingother keys on the keyboard, such as the
number pad or function keys;
The sequence utilized by the individual whenattempting to type a capital letter
8/9/2019 Bio Metrics- Biological Security Measures
12/35
Keystroke
Applications:
Used mainly for verificationpurposes after authenticationhas been carried out usingsome other method.
Source: Eyenetwatch.com
8/9/2019 Bio Metrics- Biological Security Measures
13/35
Types of Biometrics
Physical Biometrics:
Measuring ones physically inherent conditions.Basically used for identification or verification.
Bertillonage - measuring body lengths (no longer used)
Fingerprint - analyzing fingertip patterns
Facial Recognition - measuring facial characteristics
Hand Geometry - measuring the shape of the hand
Iris Scan - analyzing features of colored ring of the eye Retinal Scan - analyzing blood vessels in the eye
Vascular Patterns - analyzing vein patterns
DNA - analyzing genetic makeup
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
14/35
Fingerprint Scanner
Probably the oldest biometric technique (FBIrecording ten finger templates as early as1970, though fingerprints identified unique in1684).
How it Works: Fingerprint made up of ridges and furrows. Fingerprint scanner captures image of fingerprint. Converts picture using complex algorithms into
maps of minutiae points. Reads ridge characteristic and plots an x/y co-
ordinate. These co-ordinates are stored rather than the
complete image, to save space.
Source: EyenetWatch.com
8/9/2019 Bio Metrics- Biological Security Measures
15/35
Fingerprint Scanner
Benefits:
Easy to use
Cheap Small in size
Low power
Non-intrusive
Large databases alreadyavailable (abroad)
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
16/35
Fingerprint Scanner
Application:
Used in IT security (flash drives,notebooks, mobile phones)
Used in Sensor Technologies inthe Healthcare Industry
Used in door locks for access
control Used in network applications
Source: Eyenetwatch.com
8/9/2019 Bio Metrics- Biological Security Measures
17/35
Facial Recognition
The Process:
User faces camera System locates the users face and
perform matches against claimedidentity from database
To prevent fake face or mold,
users are now required to smile,blink or move in a way that ishuman verifying
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
18/35
Facial Recognition
Benefits:
Not intrusive, no physicalcontact required
Can be done from a distance
Disadvantages:
More suited for authentication
rather than identification Civil liberties issue
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
19/35
Facial Recognition
Application:
Used mainly as a potential toolfor averting terrorism attacks,and for other law enforcementpurposes.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
20/35
Hand Geometry
On its own, hand geometry biometrics are notreliable for identification purposes- can be used witha combination of other biometrics for verification
purposes however. The Process:
User places hands on surface which hasguidance pegs on it.
Hand is then aligned by the pegs so thedevice can read hand attributes.
Device checks its database for matches.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
21/35
Hand Geometry
Benefits: Easy to use Small amount of data required to
uniquely identify a user
Low failure to enroll rates Non intrusive
Disadvantages: Lack of accuracy, cant be used for
identification Size of the scanner Expensive as compared to finger scanner Injuries to hand fairly common
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
22/35
Hand Geometry
Used in (actual places wherein application):
International Airports,
Day care centers,
Blood banks,
Welfare agencies,
Hospitals, Immigration facilities.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
23/35
Iris Scanner
Analyzes the eye colored tissues surrounding the pupil. More than 200 points which can be used for comparison
purpose. Can be used for identification as well as verification.
Process: Person aligns himself in such a way that
he can see his own eyes reflection. The scanner captures the iris image and
compares with images stored indatabase
To avoid fake eyes from being used,light may be shone by machine and pupildilation observed.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
24/35
Iris Scanner
Benefits:
Highly accurate, no known falsecase
Not intrusive, no physicalcontact required
Disadvantages:
User has to face somediscomfort as he has to staysteady for time period
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
25/35
Iris Scanner
Uses:
Law enforcementagencies, LancasterCounty Prison used irisscanner for lawenforcement purposesfor the first time.
International Airports
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
26/35
Retinal Scanner
The difference between iris and retinal scanner is thatretinal scanner analyzes the layers of blood vessels atthe back of the eye. Also unlike iris, retinal scannerrequires user to remove glasses.
The process:A person brings his eye close to the
device and peers through a smallopening.
User focuses on a small green dotwhile keeping head absolutely still
and waiting for verification. Since there is no way to replicate a
retina, extra precautionary measuresneed not be taken.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
27/35
Retinal Scanner
Benefits:
Highly accurate
Disadvantages: Enrollment and scanning are
intrusive and take too long
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
28/35
Retinal Scanner
Used at:Almost exclusive
use in high-endsecurity
applications. Used mostly for
controllingaccess to areasor rooms in
military facilities,power plantsand other highrisk facilities
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
29/35
Vascular Patterns
Measure the characteristics of veinssituated in a persons hand or face.
The Process: The user places his palm on
a curved surface which runsan infrared scan on it.
The scan creates a picturewhich can then becompared to ones stored indatabase
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
30/35
Vascular Patterns
Benefits:
Difficult to forge
Contactless, hygienic and non-invasive
Highly accurate
Source: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
31/35
Vascular Patterns
Application:
Still fairly new ascompared to other
biometrics. Few details
published about it.
Can be found at
military institutesand multi-outletretailersestablishment.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
32/35
DNA Biometrics
Every individual has 23 pairs ofchromosomes which contain the genetichistory of the person.
After a suspect leaves DNA sample at the
scene of the crime it is matched with theDNA of all people suspect of the crime.
This type of biometrics requires twothings:
Creating DNA profile using basic molecularbiology protocols
Crunching numbers and applying the principlesof population genetics to prove a matchmathematically
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
33/35
DNA Biometrics
Benefits:
Highly accurate
Disadvantages: Not done in real-time, eventalready occurred.
Civil liberties issue, as people
might be unwilling to providesamples
Highly intrusive in natureSource: BiometricNewsportal.com
8/9/2019 Bio Metrics- Biological Security Measures
34/35
DNA Biometrics
Used at:
Since this method isnt practiced in real-time, most DNA evidences are processed in
laboratories and used for criminalinvestigations.
Source: Questbiometrics.com
8/9/2019 Bio Metrics- Biological Security Measures
35/35
Thank Youfor your patience!