Upload
kassia
View
38
Download
1
Embed Size (px)
DESCRIPTION
Padmaraj Nair. Introduction. “Physiological or behavioral characteristic of a human being that can distinguish one person from another” Theoretically can be used for identification or verification of identity To be practically useful it should be, Unique Universal Permanent Recordable - PowerPoint PPT Presentation
Citation preview
Computer Science and Engineering
Padmaraj Nair
Computer Science and Engineering
Introduction
“Physiological or behavioral characteristic of a human being that can distinguish one person from another”
Theoretically can be used for identification or verification of identity
To be practically useful it should be, Unique Universal Permanent Recordable Acceptable
Computer Science and Engineering
Authentication
Something we know Passwords Pin numbers Easy to change Require no additional hardware An accepted method of authentication Well-understood Easy to intercept Secure?
Computer Science and Engineering
Authentication cont…
Something we have Smart cards Access tokens Devices may be lost, damaged, and stolen May run out of power May be prone to power, synchronization and time-based
attacks if externally powered Subjected to reverse engineering and other treatment Theft can be easily detected
Computer Science and Engineering
Authentication cont… Something we are
Biometric authentication• Capture human input• Filter out unwanted input such as noise• Generate a statistical representation of the biometric input
(template)• Perform a match against biometric information previously
gathered and stored during an enrollment procedure Biometric verification Biometric identification (pure biometrics)
Computer Science and Engineering
Verification
Uses entity IDs and a biometric Biometric merely serves to prove identity
already declared by the entity ID may be something you know (a username)
or something you have (a smart card) Biometric works to actually complete the
authentication process Biometric database keeps a list of valid entity
IDs and corresponding biometric templates
Computer Science and Engineering
Identification
Biometric serves as both the identifier and the authenticator
Biometric database contains the enrolled biometric templates, and they all are compared against the provided biometric to find a match
Positive identification Provided biometric must be in the database Only one match to positively identify the person Risks: false acceptance and false rejection
Negative identification Determines whether the provided biometric is not in the
database.
Computer Science and Engineering
Computer Science and Engineering
Enrollment
Mandatory regardless of the type of a biometric system
Biometric enrollment is the registration of subjects’ biometrics in a biometric database.
Positive enrollment results in a database of recognized persons’ biometric templates that may be later used for positive identification
Negative enrollment results in a database of “excluded” persons
Security and reliability of the process and the database are fundamental to the system security
Computer Science and Engineering
Processing
Microprocessor, digital signal processor or computer
Involves image enhancement, normalization and template extraction
The DSP architecture is built to support complex mathematical algorithms that involve a significant amount of multiplication and addition.
With the high performance capabilities of the DSP, the total recognition time of the system can be reduced without an increase in power
Computer Science and Engineering
Matching
Comparison of biometric provided by the individual with the known biometric data stored in the biometric database
Representation of the same biometric taken by two input sensors or taken at two different points in time does not match bit by bit because of numerous factors such as sensor resolution, system noise, and so on
Pattern-recognition problem Not a bit-by-bit comparison
Computer Science and Engineering
Matching cont…
Threshold level is used to decide whether the matching score is high enough to be considered a match
Threshold level affects the accuracy and hence security
Errors False match or acceptance False non-match or rejection In practice, both FRR and FAR do not equal zero When higher security requires, users may be troubled
with high false rejection rates
Computer Science and Engineering
Types of Biometrics
Physiological Biometrics Based on direct measurements and data derived from
measurements of a part of the human body, Fingerprints Face Recognition Hand geometry Iris recognition Retina Recognition
Behavioral biometrics Based on measurements and data derived from human
actions Signature Voice
Computer Science and Engineering
Biometric secure? Artificial clones of fingers using cheap and freely available
materials such as gelatin, free molding plastic, and photosensitive
printed circuit boards. 80 percent success rate with fingers made of gelatin. Copy of live finger and artificial finger using a latent
fingerprint left on a glass Bruce Schneier, in his recent book ‘Beyond Fear’
A magically effective face recognition system with 99.9% accuracy. If someone is a terrorist, there is a 1-in-1000 chance that the software
fails to indicate “terrorist” If someone is not a terrorist, there is a 1-in-1000 chance that the
software falsely indicates “terrorist” Assume 1 in 10 million stadium attendees is a known terrorist (this
system won’t catch any unknown terrorists) System will generate 10,000 false alarms for every one real terrorist This would translate to 75 false alarms per Tampa Bay football game
and one real terrorist every 133 or so games.
Computer Science and Engineering
Computer Science and Engineering
Summary
Provide an opportunity for a more secure and responsible world
If misused or poorly engineered, may instead bring many hassles—if not troubles
Some biometrics are less usable than others, and different environments warrant different biometrics and design considerations.
Security and reliability Organizations should consider a biometric's stability,
including maturity of the technology, degree of standardization, level of vendor and government support, market share, and other support factors.
Computer Science and Engineering
References John D. Woodward, Nicholas M. Orlans, Peter T. Higgins, Identity
Assurance in the Information Age: Biometrics, Mc Graw Hill press 2003. John Daugman, Iris Recognition for Personal identification, University of
Cambridge, http://www.cl.cam.ac.uk/users/jgd1000/iris_recognition.html Edgar Danielyan, The Lures of Biometrics, The Internet Protocol Journal,
March 2004 Volume 7 International Biometric Group, www.biometricgroup.com John Daugman, How Iris RecognitionWorks, IEEE Trans. CSVT 14(1), 2004,
pp. 21 - 30 Simon Liu, Mark Silverman, A Practical Guide to Biometric Security
Technology, IEEE, ITPro, 2000 Biometric Consortium, http://www.biometrics.org/ Ram Sathappan, DSP for Smart Biometric Solutions, Texas Instruments
White Paper, May 2003