17
Computer Science and Engineering Padmaraj Nair

Padmaraj Nair

  • Upload
    kassia

  • View
    42

  • Download
    1

Embed Size (px)

DESCRIPTION

Padmaraj Nair. Introduction. “Physiological or behavioral characteristic of a human being that can distinguish one person from another” Theoretically can be used for identification or verification of identity To be practically useful it should be, Unique Universal Permanent Recordable - PowerPoint PPT Presentation

Citation preview

Page 1: Padmaraj Nair

Computer Science and Engineering

Padmaraj Nair

Page 2: Padmaraj Nair

Computer Science and Engineering

Introduction

“Physiological or behavioral characteristic of a human being that can distinguish one person from another”

Theoretically can be used for identification or verification of identity

To be practically useful it should be, Unique Universal Permanent Recordable Acceptable

Page 3: Padmaraj Nair

Computer Science and Engineering

Authentication

Something we know Passwords Pin numbers Easy to change Require no additional hardware An accepted method of authentication Well-understood Easy to intercept Secure?

Page 4: Padmaraj Nair

Computer Science and Engineering

Authentication cont…

Something we have Smart cards Access tokens Devices may be lost, damaged, and stolen May run out of power May be prone to power, synchronization and time-based

attacks if externally powered Subjected to reverse engineering and other treatment Theft can be easily detected

Page 5: Padmaraj Nair

Computer Science and Engineering

Authentication cont… Something we are

Biometric authentication• Capture human input• Filter out unwanted input such as noise• Generate a statistical representation of the biometric input

(template)• Perform a match against biometric information previously

gathered and stored during an enrollment procedure Biometric verification Biometric identification (pure biometrics)

Page 6: Padmaraj Nair

Computer Science and Engineering

Verification

Uses entity IDs and a biometric Biometric merely serves to prove identity

already declared by the entity ID may be something you know (a username)

or something you have (a smart card) Biometric works to actually complete the

authentication process Biometric database keeps a list of valid entity

IDs and corresponding biometric templates

Page 7: Padmaraj Nair

Computer Science and Engineering

Identification

Biometric serves as both the identifier and the authenticator

Biometric database contains the enrolled biometric templates, and they all are compared against the provided biometric to find a match

Positive identification Provided biometric must be in the database Only one match to positively identify the person Risks: false acceptance and false rejection

Negative identification Determines whether the provided biometric is not in the

database.

Page 8: Padmaraj Nair

Computer Science and Engineering

Page 9: Padmaraj Nair

Computer Science and Engineering

Enrollment

Mandatory regardless of the type of a biometric system

Biometric enrollment is the registration of subjects’ biometrics in a biometric database.

Positive enrollment results in a database of recognized persons’ biometric templates that may be later used for positive identification

Negative enrollment results in a database of “excluded” persons

Security and reliability of the process and the database are fundamental to the system security

Page 10: Padmaraj Nair

Computer Science and Engineering

Processing

Microprocessor, digital signal processor or computer

Involves image enhancement, normalization and template extraction

The DSP architecture is built to support complex mathematical algorithms that involve a significant amount of multiplication and addition.

With the high performance capabilities of the DSP, the total recognition time of the system can be reduced without an increase in power

Page 11: Padmaraj Nair

Computer Science and Engineering

Matching

Comparison of biometric provided by the individual with the known biometric data stored in the biometric database

Representation of the same biometric taken by two input sensors or taken at two different points in time does not match bit by bit because of numerous factors such as sensor resolution, system noise, and so on

Pattern-recognition problem Not a bit-by-bit comparison

Page 12: Padmaraj Nair

Computer Science and Engineering

Matching cont…

Threshold level is used to decide whether the matching score is high enough to be considered a match

Threshold level affects the accuracy and hence security

Errors False match or acceptance False non-match or rejection In practice, both FRR and FAR do not equal zero When higher security requires, users may be troubled

with high false rejection rates

Page 13: Padmaraj Nair

Computer Science and Engineering

Types of Biometrics

Physiological Biometrics Based on direct measurements and data derived from

measurements of a part of the human body, Fingerprints Face Recognition Hand geometry Iris recognition Retina Recognition

Behavioral biometrics Based on measurements and data derived from human

actions Signature Voice

Page 14: Padmaraj Nair

Computer Science and Engineering

Biometric secure? Artificial clones of fingers using cheap and freely available

materials such as gelatin, free molding plastic, and photosensitive

printed circuit boards. 80 percent success rate with fingers made of gelatin. Copy of live finger and artificial finger using a latent

fingerprint left on a glass Bruce Schneier, in his recent book ‘Beyond Fear’

A magically effective face recognition system with 99.9% accuracy. If someone is a terrorist, there is a 1-in-1000 chance that the software

fails to indicate “terrorist” If someone is not a terrorist, there is a 1-in-1000 chance that the

software falsely indicates “terrorist” Assume 1 in 10 million stadium attendees is a known terrorist (this

system won’t catch any unknown terrorists) System will generate 10,000 false alarms for every one real terrorist This would translate to 75 false alarms per Tampa Bay football game

and one real terrorist every 133 or so games.

Page 15: Padmaraj Nair

Computer Science and Engineering

Page 16: Padmaraj Nair

Computer Science and Engineering

Summary

Provide an opportunity for a more secure and responsible world

If misused or poorly engineered, may instead bring many hassles—if not troubles

Some biometrics are less usable than others, and different environments warrant different biometrics and design considerations.

Security and reliability Organizations should consider a biometric's stability,

including maturity of the technology, degree of standardization, level of vendor and government support, market share, and other support factors.

Page 17: Padmaraj Nair

Computer Science and Engineering

References John D. Woodward, Nicholas M. Orlans, Peter T. Higgins, Identity

Assurance in the Information Age: Biometrics, Mc Graw Hill press 2003. John Daugman, Iris Recognition for Personal identification, University of

Cambridge, http://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.html Edgar Danielyan, The Lures of Biometrics, The Internet Protocol Journal,

March 2004 Volume 7 International Biometric Group, www.biometricgroup.com John Daugman, How Iris RecognitionWorks, IEEE Trans. CSVT 14(1), 2004,

pp. 21 - 30 Simon Liu, Mark Silverman, A Practical Guide to Biometric Security

Technology, IEEE, ITPro, 2000 Biometric Consortium, http://www.biometrics.org/ Ram Sathappan, DSP for Smart Biometric Solutions, Texas Instruments

White Paper, May 2003