24
8/14/2019 Bio Metrics in Security Technology http://slidepdf.com/reader/full/bio-metrics-in-security-technology 1/24 ROLE OF BIOMETRICS IN SECURITY TECHNOLOGY

Bio Metrics in Security Technology

Embed Size (px)

Citation preview

Page 1: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 1/24

ROLE OF BIOMETRICS IN SECURITY

TECHNOLOGY

Page 2: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 2/24

 These are automated methods of recognizing aperson based on its physiological characteristics.

These are foundation of an extensive array of highly secure identification and personal verificationsolutions.

Biometric security technologies are used toaccurately identify individuals on a unique trait.

WHAT IS BIOMETRICS?

Page 3: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 3/24

BIOMETRICS ROLE IN PERSONAL

IDENTIFICATION One of the most important ways that biometrictechnology is impacting security lies within the confines of computer information systems.

Biometric technology offers an alternative to the mostused system currently in place in most operations:passwords or personal identification numbers (PIN).

Instead of users inputting their password or PIN, usersinteract with a computer terminal that will scan their finger,face, voice, retina, etc. to identify them

Page 4: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 4/24

HOW BIOMETRICS WORKS ?

Enrollmemt

Authenticate/Identify

Accuracy

Page 5: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 5/24

Fingerprint recognition.

Iris scanning.

Smart card security.

Face recognition.

TYPES OF BIOMETRICS

Page 6: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 6/24

FINGERPRINT RECOGNITION 

Fingerprint matching

Fingerprint classification

Fingerprint image Enhancement

Fingerprint recognition demonstration

Page 7: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 7/24

FINGERPRINT RECOGNITION

ALGORITHM  The Authentication Fingerprint is

captured. The user will be advisedto accurately position his finger onthe device. The quality ismeasured and only good imageswill be accepted. Once an image isaccepted, its relevant informationwill be extracted and stored into adatabase.

The extraction of information

starts with the color reduction toblack and white. Several filtersreduce the noise in the relevantimage areas without destroyingrequired information.

Page 8: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 8/24

  ALGORITHM 

CONT....

 Ridge width is reduced to

one pixel based on the

image.A mask is computed to

be able to exclude noisy,

unsharp or blank areas from

the recognition process.

This mask is also used to

determine the overall image

quality.

Page 9: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 9/24

ALGORITHM 

CONT....

Minutiae locations are

extracted. False Minutiae are

rejected by the quality mask

(Step 3) Various Features are

extracted from each Minutia

Once taught in, the user may

now authenticate himself by

putting the finger on the device.

Page 10: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 10/24

ALGORITHM  CONT....

The so extracted data is compared to thetraining data in the database. The finger of theuser has been shifted to the right and wasslightly rotated. Corresponding minutiae datais connected with a line in this illustration.Dots are unmatched minutiae.

• The user has been accepted .

The extracted data is compared to thetraining data in the database. There is only locorrelation between some minutiae. Additionalmatching criteria checks fail.

• The user has been rejected.

Page 11: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 11/24

IRIS SCANNING  Iris scans analyze the features that exist in the colored

tissue surrounding the pupil which has more than 200points that can be used for comparison, including rings,furrows and freckles.

The scans use a regular video camera style and can bedone from further away than a retinal scan.

It will work through glasses fine and in fact has theability to create an accurate enough measurement that

it can be used for identification purposes, and not muchverification.

Page 12: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 12/24

HOW IRIS SCANNING WORKS ? 

The user’s eye is positioned near the

camera of the iris recognition device.The camera automatically zooms in and

focuses.

The camera captures image of the iris.

This can be done through eyeglasses,

contact lenses or at night.

Page 13: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 13/24

HOW IRIS SCANNING

WORKS ?A computer program analyzes the

patterns within each circular gridand transforms them into a data

file, which is like a personal bar code.

The code from the iris iscompared against a database of previously recorded irises toconfirm the Identification of the

user.

Page 14: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 14/24

SMART CARD SECURITY

CARD SECURITY

BIOMETRICS IDENTIFICATION

PHYSICAL STRUCTURE

LIFE CYCLE OF A SMART CARD

LOGICAL STRUCTURE AND ACCESS CONTROLS

SMART CARD SOFTWARE

Page 15: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 15/24

SMART CARD SOFTWARE 

• It has been established that any secure

transaction involves 6 generic functions as

followed:

Data Protection

Identification of the cardholder 

Mutual authentication

Secure writing Certification or signature

Encryption

Page 16: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 16/24

FACIAL RECOGNITION 

Facial recognition analyzes the characteristics of a person's face images

input through a digital video camera.

It measures the overall facial structure, including distances between

eyes, nose, mouth, and jaw edges.

These measurements are retained in a database and used as a

comparison when a user stands before the camera. This biometric has ben widely, and perhaps wildly, touted as a fantastic

system for recognizing potential threats (whether terrorist, scam artist,

or known criminal) but so far has been unproven in high-level usage. It is

currently used in verification only systems with a good deal of success.

Page 17: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 17/24

HOW FACIAL RECOGNITION WORKS ?

User faces the camera, standing about two feet from it. Thesystem will locate the user's face and perform matchesagainst the claimed identity or the facial database.

It is possible that the user may need to move and reattemptthe verification based on his facial position.

The system usually comes to a decision in less than 5seconds.

To prevent a fake face or mold from faking out the system,many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying.

Page 18: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 18/24

HOW THE SOFTWARE WORKS ?

Detection

Normalization

Matching

Representation

Page 19: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 19/24

WHERE BIOMETRICS ARE BEEN USED ? 

Panasonic sells an iris reader for desktop computers that does log-onsand videoconferencing. ADT Security Services now uses Visionics face-recognition systemsat the airports they protect.

Some new PC models use desktop fingerscanners on their mouse or keyboards.The Los Angleles Firemen's Credit Union spent $40,000 on afingerprint-.scanning system. Its 90 employees no longer need toremember up to 10 passwords to use networks and applications. They

 just touch the finger pad and they're ready to go. St. Vincent Hospitals and Health Care Center uses a fingerprintreader system and biometric software in its facilities of up to 3,000 staff and physicians to access computers.

Page 20: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 20/24

ADVANTAGES OF BIOMETRICS SECURIT

 First, unlike passwords or PIN numbers, biometrics looks ata person’s unique trait, which cannot be replicated by others.Thus, when a user scans their retina for access to a

computer’s resources, biometrics links the event to a certainindividual.

Second, Users do not need to remember their password or carry around other identification forms (like a driver’s license).

Third, biometrics offers better, more accurate authenticationcompared to current password/PIN systems (2002).

Page 21: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 21/24

LIMITATIONS AND DISADVANTAGES 

First, biometric technology can be relatively intrusive on users,especially if computers are using fingerprints and retina scans toidentify users. The issue of personal privacy comes into play whensuch delicate information is being recorded.

Second, many of the biometric techniques for identifying usersare expensive and difficult to implement on current computer systems.

Third, many of the biometric techniques take a lot of effort to useand can be complicated for those who are unfamiliar with the

technology.

Fourth, biometric security techniques are not equally accurateand dependable.

Page 22: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 22/24

CONCLUSION Biometric security technology cannot be

overplayed. Even with its disadvantages andupfront costs, biometric technology is simplythe best route to preventing identity theft andsecuring computers from unwanted users.

As the technology works its way intocorporate computers and home PCs, thedemand for the product will increase and theuneasiness towards the technology willdecrease.

Biometrics are quickly becoming moresocially acceptable, more accurate, and lessexpensive. Their place in the future: assured.Their impact on security: profound.

Page 23: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 23/24

REFERENCES

An Introduction to Biometrics” The Biometric Consortiume”   http://www.biometrics.org/html/introduction.htm, 23 June

2004 About Biometrics” Information Technology Laboratory”

http://www.itl.nist.gov/div893/biometrics/about.html,23 June 2004.

Bertolucci, James” Products for the Paranoid”http://www.pcworld.com/news/article/0,aid,116573,00.asp23 June 2004.

Mace, Scott.”Gates Previews Security Projects”http://www.pcworld.com/news/article/0,aid,114916,00.asp 23 June

O’Brien, James A.Management Information Systems”

Managing Information Technology in the Business Enterprise"New York: McGraw-Hill, 2004c Newell, Adrienne.Is Biometrics Coming to a PC Near You?

http://www.pcworld.com/news/article/0,aid,115289,00.asp 2004d, March 19

Page 24: Bio Metrics in Security Technology

8/14/2019 Bio Metrics in Security Technology

http://slidepdf.com/reader/full/bio-metrics-in-security-technology 24/24