Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Similar documents
BIOMETRICS BY- VARTIKA PAUL 4IT55

Introduction to Biometrics 1

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Biometric Recognition: How Do I Know Who You Are?

About user acceptance in hand, face and signature biometric systems

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

User Awareness of Biometrics

Biometrics - A Tool in Fraud Prevention

Modern Biometric Technologies: Technical Issues and Research Opportunities

Biometric Recognition Techniques

Feature Extraction Techniques for Dorsal Hand Vein Pattern

The Role of Biometrics in Virtual Communities. and Digital Governments

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

Biometrics and Fingerprint Authentication Technical White Paper

Title Goes Here Algorithms for Biometric Authentication

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

A COMPARATIVE STUDY OF MULTIMODAL BIOMETRICS

Investigation of Recognition Methods in Biometrics

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

Study and Analysis on Biometrics and Face Recognition Methods

SVC2004: First International Signature Verification Competition

BIOMETRIC IDENTIFICATION

A Survey of Multibiometric Systems

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

Challenges and Potential Research Areas In Biometrics

Human Recognition Using Biometrics: An Overview

Biometrical verification based on infrared heat vein patterns

Evaluation of Biometric Systems. Christophe Rosenberger

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2

Biometrics in a Glimpse

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Authentication Using Pulse-Response Biometrics

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I. The Biometric Systems

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Palm Vein Technology

Authentication using Iris

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

Little Fingers. Big Challenges.

Iris Recognition using Histogram Analysis

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

Impact of Resolution and Blur on Iris Identification

Edge Histogram Descriptor for Finger Vein Recognition

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Non-Contact Vein Recognition Biometrics

Experiments with An Improved Iris Segmentation Algorithm

Biometrics. Duane M. Blackburn Federal Bureau of Investigation

Iris Segmentation & Recognition in Unconstrained Environment

1. First printing, TR , March, 2000.

Iris Recognition using Hamming Distance and Fragile Bit Distance

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

Sensors. CSE 666 Lecture Slides SUNY at Buffalo

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

Feature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits

Authenticated Document Management System

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

A Review on Different Biometric Techniques: Single and Combinational

Student Attendance Monitoring System Via Face Detection and Recognition System

ISSN Vol.02,Issue.17, November-2013, Pages:

Spatial Resolution as an Iris Quality Metric

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

Personal Identification Using Different Biometrics : A Review

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

Touchless Fingerprint Recognization System

Privacy & Biometrics Building a Conceptual Foundation

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Keywords Biometrics, Iris, Recognition, Advantage, Shortcomings.

Punjabi Offline Signature Verification System Using Neural Network

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Improved Human Identification using Finger Vein Images

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

A Novel Approach for Human Identification Finger Vein Images

IRIS RECOGNITION USING GABOR

Authenticated Automated Teller Machine Using Raspberry Pi

ISSN: Page 511. International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

Role of multibiometric systems in analysis of biological data

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

Biometrics Acceptance - Perceptions of Use of Biometrics

Real time verification of Offline handwritten signatures using K-means clustering

International Journal of Pure and Applied Mathematics

A study of dorsal vein pattern for biometric security

A Study of Unimodel Multimodel and Soft Biometric Recognition

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES

Introduction to

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Fingerprint Image Quality Parameters

Transcription:

CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used effectively to authorize access this is the realm of biometrics is derived from an automated system that uses biological, physiological, or behavioral characteristics to authenticate automatically the identity of an individual based on a previous enrollment or registration process biometrics is often touted as having these advantages over competing methods: doesn t require remembering a password or carrying a token security levels meet or exceed those of token authentication there is a great variety of characteristics, properties, or behaviors that qualify for development into biometric systems 1

here is a partial listing of commercial and research prototypes available today voice recognition infrared facial fingerprints thermography facial recognition iris recognition ear recognition EKG or EEG (walking) gait odor keystroke dynamics DNA signature dynamics there are several criteria that can be used to compare/contrast different sources and methods retinal scan hand/finger geometry subcutaneous blood vessel imaging. Biometric Parameters Universality: What is the distribution of this property in the population? Ideally, every person should possess it Uniqueness: No two individuals should possess the same attributes for that characteristic Permanence: The characteristic or behavior should not change significantly over time. Biometric Parameters Collectability: The characteristic should be something quantitatively measurable Resistance to Circumvention: How easily can impostors fool the system? Performance: Ease of use, speed, accuracy, and robustness of the technology. 2

Biometric Parameters User Acceptance: Is the target audience willing to use these types of authentication systems? some individuals may have personal, moral, and/or religious objections to the use of this technology like other authentication methods, biometric systems require two steps registration. The external entity presents an identifier to the security system, which catalogs and stores it. usually, a one- time process verification. Periodically, the external entity presents the authentication information to gain access to the computer entity usually, a many- times process have been studied as a means of identifying individuals since the late nineteenth century Sir Francis Galton was one of its pioneers who studied fingerprints scientifically a fingerprint represents the structure of the pattern of the skin where dark areas denote raised ridges and the white areas valleys between them. 3

registration typically incorporates an optical sensor that reads the print and produces a digital image this is the data collection stage the digital version of the original image is seldom used for actual authentication a new digital image is produced using an adaptive feature extraction algorithm its goal is to produce a template, which typifies important features in the fingerprint the fingerprint registration process after the template is registered, the verification process matches stored templates with those generated from the user s verification scan during authentication For example, features can be identified using minutiae- based pattern matching. It relies on specific location and direction of so- called minutiae points. 4

the registration/verification process is never perfect for any biometric scheme that maps some physical characteristic into a digital representation in verification, the system must compare a current sample of the individual s characteristics with a template stored in its database it would be rare to find an exact match between the two instead, the system uses an algorithm to generate a matching score that quantifies the similarity within some level of tolerance any automated biometric system is therefore susceptible to two types of errors false acceptance rates (FAR). the rate that the system incorrectly matches an input pattern to a non- matching template false positives false rejection rates (FRR). the rate that the system fails to detect a match between an input pattern and a matching template false negatives if the match scores used for acceptance are set lower, the FRR goes down while the FAR goes up 5

if the match score is set higher, then the FAR goes down while the FRR goes up FRR affects the usability of the system, and FAR represents its security risk System 3 in the chart is the higher performing system because, for any given FAR, it has the lowest FRR the Receiver Operating Characteristic (ROC) Curve depicts the relationship between error rates in biometric systems ROC curves can be used to calculate another performance value called the Equal Error Rate (EER). i.e., where FAR = FRR advantages economical commonplace, accepted reliable disadvantages injuries to prints can affect verification can be spoofed requires physical contact dirt, oil, etc. can degrade system performance which system has better overall performance based on these ROC Curves? 6

Signature Recognition the earliest signature recognition systems were developed in the latter half of the 20 th century these were based on static signature recognition, which treats the signature as a graphic figure the geometric features of the signature are measured and encoded for the template matches are based on how much the graphics resemble each other signature forgery Dynamic Signature Recognition capturing behavioral or dynamic features of a signature offers greater accuracy the data captured focuses on direction, stroke, pressure, shape, and timing Facial Recognition Facial Recognition long considered the Holy Grail for automated system, its chief advantage is that it can register the individual using passive acquisition i.e., the subject does not have to perform any directed action ASIDE: for example, in 2014, The Guardian reported on Operation Optic Nerve, which was a joint effort of the UK GCHQ and the NSA the project collected millions of still images of Yahoo! webcam chats in bulk these data sweeps used facial recognition to flag subjects of interest from their databases early methods were based on selected geometric features of the face these proved too brittle as an accurate measure due to problems with lighting and facial positioning systems today use algorithms that capture statistically invariable features of the subject s face e.g., principal component analysis (PCA) 7

Facial Recognition advantages template storage is easy no physical contact with the system is necessary verification can be passive without the subject s awareness disadvantages facial traits change over time may not be unique changing conditions can affect verification facial expression, lighting conditions, etc. Iris Recognition Iris Recognition the human iris is a thin circular structure in the eyes that is responsible for controlling the diameter and size of the pupils iris color is a variable property for humans brown, green, blue, grey, and hazel sometimes violet or pink each iris has its own distinct pattern 8

Iris Recognition Iris Recognition advantages very accurate chance that two irises match is 1 in 10 billion people iris rarely changes over lifespan verification is fast disadvantages equipment is expensive high quality images can spoof a person an individual must keep head steady and still for accurate scanning Retinal Scan Recognition the retina is the lining at the back of the eye that covers 65% of the eyeball s inner surface it contains photo- sensitive rod and cone cells the complex network of blood vessels in the retina are unique for each individual this pattern remains unchanged except in cases of degenerative diseases Retinal Scan Recognition for both registration and verification, the person must remove any glasses or eye ware, place their eye close to the scanner and stare at a specific point 9

Speaker/Voice Recognition Speaker/Voice Recognition used for over 50 years, there are two basic approaches: text dependent. the individual is registered using a prescribed text text independent. speaker is usually unaware that his or her voice is being registered not to be confused with speech recognition Speaker/Voice Recognition advantages easy to implement existing equipment can be employed (e.g., telephony) disadvantages sensitive to quality of equipment and noise can be spoofed replay attack Keystroke Recognition keystroke recognition systems analyze the person s typing behavior including speed and rhythm 10

Comparing Biometric Technologies Biometric Method Universality Uniqueness Permanence Collectability Circumvention Performance Acceptance Fingerprint Medium High High Medium High High Medium Face Recognition High Low Medium High Low Low High Iris Recognition High High High Medium High High Low Retinal Scan High High Medium Low High High Low Keystroke High Low Low High High Medium High Signature High High Medium Medium Low Medium Medium Dynamics Voice Recognition Medium Low Low Medium Low Low High 11