Bio Metrics- Biological Security Measures

Embed Size (px)

Citation preview

  • 8/9/2019 Bio Metrics- Biological Security Measures

    1/35

  • 8/9/2019 Bio Metrics- Biological Security Measures

    2/35

    Biometrics

    Definition:

    The science and technologywhich is used to measure andanalyze biological data is calledBiometrics.

    In IT Perspective:

    The technologies whichmeasure and analyze specifichuman characteristics

    Source: SearchSecurity.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    3/35

    Types of Biometrics

    Behavioral Biometrics:

    Characteristics which oneacquires naturally over a periodof time

    Speech recognition- analyzingones vocal behavior

    Signature- analyzing onessignature dynamics

    Keystroke- measuring the timespacing between words

  • 8/9/2019 Bio Metrics- Biological Security Measures

    4/35

    Speech Recognition

    How it works:

    Person producesactual sounds

    which are recorded

    Follow some sort ofscript or code tokeep a standard

    voice pattern record

    Voice patternidentified bymicrophones

    statistical profiles are

    created by comparingvarious voice samples todetermine any repeating

    patterns

    Live voice sample submitted forverification is compared to thestatistical profiles created

    Source: findbiometrics.com (An Application of Biometric Technology: Voice Recognition)

  • 8/9/2019 Bio Metrics- Biological Security Measures

    5/35

    Speech Recognition

    Benefits:

    Ability to use existing phonelines

    Low perceived invasiveness

    Can be automated

    Disadvantages:

    High false non-matching rates

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    6/35

    Speech Recognition

    Application:

    Physical Access Entry

    Where remote identification is

    requiredFinancial Transactions (accessing ones

    accounts, funds transfer, billpayments)

    Credit Card Processing (addresschanges notification, balance

    transfers, loss prevention)

    Source: findbiometrics.com (An Application of Biometric Technology: Voice Recognition)

  • 8/9/2019 Bio Metrics- Biological Security Measures

    7/35

    Signature Biometrics

    Works in 3 Stages: Enrollment: Using a graphical user

    interface and a digital pen and tablet,the user provides a required number

    of signatures as samples to becompared with. Signature Profile Creation and

    Handling: Sample signaturesconverted into templates.

    Signature Verification: Comparescurrent signature to pre-setsignature. The server continues tolearn and fine-tune the users profile.

    Source: Eyenetwatch.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    8/35

    Signature Biometrics

    Benefits:

    Difficult to mimic the behaviorof signing

    Low False Acceptance Rates People used to signing

    documents, non-intrusiveapproach

    Disadvantages:

    People may not always sign in aconsistent manner

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    9/35

    Signature Biometrics

    Application:

    Provides Access to documents

    Contract/ Agreement executionAcknowledgement of goods or

    services received

    Banking services

    Postal carriers in developedcountries using Signaturebiometrics to keep records.

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    10/35

    Keystroke

    Working:

    Instead of using signatures, as in previous

    case, users are required to punch in theirusername and passwords 15 times.

    This is to make the findings moreconsistent.

    Source: Findbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    11/35

    Keystroke

    The distinctive, behavioralcharacteristics measured by KeystrokeRecognition include:

    The cumulative typing speed;

    The time that elapses between consecutivekeystrokes;

    The time that each key is held down;

    The frequency of the individual in usingother keys on the keyboard, such as the

    number pad or function keys;

    The sequence utilized by the individual whenattempting to type a capital letter

  • 8/9/2019 Bio Metrics- Biological Security Measures

    12/35

    Keystroke

    Applications:

    Used mainly for verificationpurposes after authenticationhas been carried out usingsome other method.

    Source: Eyenetwatch.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    13/35

    Types of Biometrics

    Physical Biometrics:

    Measuring ones physically inherent conditions.Basically used for identification or verification.

    Bertillonage - measuring body lengths (no longer used)

    Fingerprint - analyzing fingertip patterns

    Facial Recognition - measuring facial characteristics

    Hand Geometry - measuring the shape of the hand

    Iris Scan - analyzing features of colored ring of the eye Retinal Scan - analyzing blood vessels in the eye

    Vascular Patterns - analyzing vein patterns

    DNA - analyzing genetic makeup

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    14/35

    Fingerprint Scanner

    Probably the oldest biometric technique (FBIrecording ten finger templates as early as1970, though fingerprints identified unique in1684).

    How it Works: Fingerprint made up of ridges and furrows. Fingerprint scanner captures image of fingerprint. Converts picture using complex algorithms into

    maps of minutiae points. Reads ridge characteristic and plots an x/y co-

    ordinate. These co-ordinates are stored rather than the

    complete image, to save space.

    Source: EyenetWatch.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    15/35

    Fingerprint Scanner

    Benefits:

    Easy to use

    Cheap Small in size

    Low power

    Non-intrusive

    Large databases alreadyavailable (abroad)

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    16/35

    Fingerprint Scanner

    Application:

    Used in IT security (flash drives,notebooks, mobile phones)

    Used in Sensor Technologies inthe Healthcare Industry

    Used in door locks for access

    control Used in network applications

    Source: Eyenetwatch.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    17/35

    Facial Recognition

    The Process:

    User faces camera System locates the users face and

    perform matches against claimedidentity from database

    To prevent fake face or mold,

    users are now required to smile,blink or move in a way that ishuman verifying

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    18/35

    Facial Recognition

    Benefits:

    Not intrusive, no physicalcontact required

    Can be done from a distance

    Disadvantages:

    More suited for authentication

    rather than identification Civil liberties issue

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    19/35

    Facial Recognition

    Application:

    Used mainly as a potential toolfor averting terrorism attacks,and for other law enforcementpurposes.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    20/35

    Hand Geometry

    On its own, hand geometry biometrics are notreliable for identification purposes- can be used witha combination of other biometrics for verification

    purposes however. The Process:

    User places hands on surface which hasguidance pegs on it.

    Hand is then aligned by the pegs so thedevice can read hand attributes.

    Device checks its database for matches.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    21/35

    Hand Geometry

    Benefits: Easy to use Small amount of data required to

    uniquely identify a user

    Low failure to enroll rates Non intrusive

    Disadvantages: Lack of accuracy, cant be used for

    identification Size of the scanner Expensive as compared to finger scanner Injuries to hand fairly common

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    22/35

    Hand Geometry

    Used in (actual places wherein application):

    International Airports,

    Day care centers,

    Blood banks,

    Welfare agencies,

    Hospitals, Immigration facilities.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    23/35

    Iris Scanner

    Analyzes the eye colored tissues surrounding the pupil. More than 200 points which can be used for comparison

    purpose. Can be used for identification as well as verification.

    Process: Person aligns himself in such a way that

    he can see his own eyes reflection. The scanner captures the iris image and

    compares with images stored indatabase

    To avoid fake eyes from being used,light may be shone by machine and pupildilation observed.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    24/35

    Iris Scanner

    Benefits:

    Highly accurate, no known falsecase

    Not intrusive, no physicalcontact required

    Disadvantages:

    User has to face somediscomfort as he has to staysteady for time period

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    25/35

    Iris Scanner

    Uses:

    Law enforcementagencies, LancasterCounty Prison used irisscanner for lawenforcement purposesfor the first time.

    International Airports

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    26/35

    Retinal Scanner

    The difference between iris and retinal scanner is thatretinal scanner analyzes the layers of blood vessels atthe back of the eye. Also unlike iris, retinal scannerrequires user to remove glasses.

    The process:A person brings his eye close to the

    device and peers through a smallopening.

    User focuses on a small green dotwhile keeping head absolutely still

    and waiting for verification. Since there is no way to replicate a

    retina, extra precautionary measuresneed not be taken.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    27/35

    Retinal Scanner

    Benefits:

    Highly accurate

    Disadvantages: Enrollment and scanning are

    intrusive and take too long

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    28/35

    Retinal Scanner

    Used at:Almost exclusive

    use in high-endsecurity

    applications. Used mostly for

    controllingaccess to areasor rooms in

    military facilities,power plantsand other highrisk facilities

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    29/35

    Vascular Patterns

    Measure the characteristics of veinssituated in a persons hand or face.

    The Process: The user places his palm on

    a curved surface which runsan infrared scan on it.

    The scan creates a picturewhich can then becompared to ones stored indatabase

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    30/35

    Vascular Patterns

    Benefits:

    Difficult to forge

    Contactless, hygienic and non-invasive

    Highly accurate

    Source: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    31/35

    Vascular Patterns

    Application:

    Still fairly new ascompared to other

    biometrics. Few details

    published about it.

    Can be found at

    military institutesand multi-outletretailersestablishment.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    32/35

    DNA Biometrics

    Every individual has 23 pairs ofchromosomes which contain the genetichistory of the person.

    After a suspect leaves DNA sample at the

    scene of the crime it is matched with theDNA of all people suspect of the crime.

    This type of biometrics requires twothings:

    Creating DNA profile using basic molecularbiology protocols

    Crunching numbers and applying the principlesof population genetics to prove a matchmathematically

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    33/35

    DNA Biometrics

    Benefits:

    Highly accurate

    Disadvantages: Not done in real-time, eventalready occurred.

    Civil liberties issue, as people

    might be unwilling to providesamples

    Highly intrusive in natureSource: BiometricNewsportal.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    34/35

    DNA Biometrics

    Used at:

    Since this method isnt practiced in real-time, most DNA evidences are processed in

    laboratories and used for criminalinvestigations.

    Source: Questbiometrics.com

  • 8/9/2019 Bio Metrics- Biological Security Measures

    35/35

    Thank Youfor your patience!