13

Biometrics disadvantages

Embed Size (px)

DESCRIPTION

The topic of our presentation is focusing on how the use of biometric systems can reveal sensitive personal information and how this can be a disadvantage.

Citation preview

Page 1: Biometrics disadvantages
Page 2: Biometrics disadvantages

The contents

1- Background information: What is Biometrics?

2- The positive side of biometrics

3- Fraud, hacking, and their techniques

4- Biometrics and privacy issues

5- Conclusion

Page 3: Biometrics disadvantages

What is Biometrics?

Bios + Metric = “life measurement”

Behavioral systems

Signature Verification

Voice Recognition

(Revett, 2007)

Page 4: Biometrics disadvantages

What is Biometrics?

1- Identification mode: one-to-many comparison

2- Authentication mode: one-to-one comparison

(Jain,  Flynn, and Ross, 2008)

Page 5: Biometrics disadvantages

Biometrics in action

Page 6: Biometrics disadvantages

The positive side of Biometrics

- Prevent unauthorized access

- No need to remember passwords

- Reduce the criminal act of fraud

- Our human characteristics cannot be lost

(Hariri and Shokouhi, 2012)

(Jamil and Khan, 2011)

Page 7: Biometrics disadvantages

How to cheat a biometric system

(Matsumoto, 2002)(Takahashi and Hitachi, 2009)

Page 8: Biometrics disadvantages

Fraud- Costs the British economy around 1.9 billion pounds per year

- 1.8 million people in the UK fall victim to identity theft each year

- 380,000 victims have been suffered of a more serious fraud

(National Fraud Authority, 2011)

Page 9: Biometrics disadvantages

Biometrics and privacy issues

-Security versus health records

-Popularity of biometrics in the future

-A simultaneous health check?

(Hariri and Shokouhi, 2011)

(Pheterson, 2011)(Wolf-hope, 2011)

Page 10: Biometrics disadvantages

Conclusion

-Risk of using biometric systems

-Misusage of personal information

-An impact on the security of stored

information

Page 11: Biometrics disadvantages

References pt.1

Hariri, M., and Shokouhi, S. (2011). Possibility of spoof attack against robustness of multibiometric authentication systems. Optical Engineering [e-journal], 50(2), 112-119. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 8 March 2012]

Hariri, M. and Shokouhi, S. (2012). Robustness of Multi Biometric Authentication Systems against Spoofing. Computer and Information Science [e-journal], 5(1), 77-86. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 8 March 2012]

Jain,A., Flynn, P., and Ross, A. (2008). Handbook of biometrics. Newyork: Springer. Available through: http://www.springerlink.com/content/978-0-387-71040-2 [Retrieved 6 March]

Page 12: Biometrics disadvantages

References pt.2

Jamil, D. and Khan, M. (2011). Keystroke pattern recognition preventing online fraud. International Journal of Engineering Science and Technology [e-journal], 3(3), 1953-1958. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 9 March 2012]

Matsumoto, T. (2002). A case study on user identification [PDF file] Available through: http://web.mit.edu/6.857/OldStuff/Fall03/ref/gummy-slides.pdf [Retrieved 13 March 2012]

National Fraud Authority. (2011). Annual fraud indicator [PDF file] Available through: http://www.homeoffice.gov.uk/publications/agencies-public-bodies/nfa/annual-fraud-indicator/annual-fraud-indicator-2011?view=Binary Retrieved 9 March 2012]

Pheterson, J. (2011). Trends in Biometric Data Collection and Use. Employee Relations Law Journal [e-journal], 37(1), 64-67. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 5 March 2012]

Page 13: Biometrics disadvantages

References pt.3

Revett, K. (2007). A Bioinformatics Based Approach to Behavioural Biometrics. Frontiers of Bioscience and Information Technologies [e-journal], 15(3), 665-670. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 3 March 2012]

Takahashi, K. and Hitachi, S. (2009). Generating Provably Secure Cancelable Fingerprint Templates based on Correlation-Invariant Random Filtering. International Conference on Theory, Applications, and Systems [e-journal], 12(2), 12-16. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 13 March 2012]

Wolf-hope, P. (2011). Mobile Biometric Devices: What the Future Holds. Police chief [e-journal], 78(9), 38-47. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 4 March 2012]