12
Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant Miller

Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Biometric Inaccuracies

Project Team 9: Tanner Ellenberger and Grant Miller

Page 2: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Overview● History● Types of biometrics, how they work● Overall effectiveness ● Risks/Downsides (problem)● Known alternatives● Our solution

Page 3: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

History● Biometrics used since 500 B.C by Babylonian merchants

for transactions

● Bertillon System was used in mid 1800s to measure

various body dimensions

● Henry System implemented in late 1800s to include

fingerprints of inmates

● Biometrics we see today were not implemented until late

90s, early 2000’s

Page 4: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

How Biometrics Work

1. Proper recording/scanning device records initial

appropriate biometric input

2. System turns biometric input into storable data

3. User seeking access presents biometric input to device

4. Device compares new input to original stored input

5. If new input matches original stored input, access granted

Page 5: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Popular Types of Biometrics

● Fingerprint● Retina● Iris● Facial● Voice● Signature

Page 6: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Effectiveness

● Convenient, easy to use● Very unique● Always with you● Easy to implement

Page 7: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Risks/Downsides● Cannot change your DNA if compromised ● Lack of privacy● Users can be forced to use their biometric with physical force● Can be manipulated

Page 8: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Alternatives

● Password/Passphrase

● Personal Device Check

● Two-Factor

● Two-Step

● Randomly Generated Codes

Page 9: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Solution● AI.Lock

● User takes picture of unique object or scene (reference image)

● Must take picture of same object/scene for authorization (candidate image)

● Only stores a hash of the image

Page 10: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Conclusion● Biometric History● How biometrics work ● Types of biometrics● Effectiveness of biometrics● Risks of Biometrics● Biometric Alternatives● Our Solution

Page 11: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Works CitedAzimpourkivi, et al. “A Secure Mobile Authentication Alternative to Biometrics.” [1402.1128] Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition, 7 Dec. 2017, arxiv.org/abs/1712.02483.

Yang, Kai, et al. “Consent Biometrics.” Neurocomputing, vol. 100, 2013, pp. 153–162., doi:10.1016/j.neucom.2011.12.044.

Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number (The Implementation of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4:129. doi:10.4172/2165-7866.1000129

Shahnewaz, Shaon. “The Top Seven Advantages of a Biometric Identification Management System”. M2SYS. Apr 4, 2016. Web. Jun 24, 2018.

Mayhew, S. (2018, March 21). History of Biometrics. Retrieved from https://www.biometricupdate.com/201802/history-of-biometrics-2

Penny, Wayne. “Biometrics: A Double Edged Sword - Security and Privacy”. SANS Institute. 2002. Web. Jun 24, 2018.

Page 12: Inaccuracies Biometric...appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares

Questions ?