1 / 35

Biometrics A tool for Information Security

Biometrics A tool for Information Security. Authors: Anil K. Jain , Arun Ross and Sharath Pankanti. Presented By: Payas Gupta. Outline. Today’s security related concerns Commonly used Biometrics Variance in Biometrics Operation of Biometrics Systems Attacks on Biometric System

ayla
Download Presentation

Biometrics A tool for Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BiometricsA tool for Information Security Authors: Anil K. Jain , Arun Ross and Sharath Pankanti Presented By: Payas Gupta

  2. Outline • Today’s security related concerns • Commonly used Biometrics • Variance in Biometrics • Operation of Biometrics Systems • Attacks on Biometric System • Multi Biometric Systems • Level of fusion in Biometric Systems

  3. Today’s Security related Questions • Is she really who she claims to be? • Is this person authorized to use this facility? • Is he in the watch list posted by the government? Biometrics, Science of recognizing an individual based on his or her physical or behavioral traits

  4. Paper is all about • Examining applications where biometrics can solve issues pertaining to information security • Enumerating the fundamental challenges encountered by biometric systems in real-world applications • Discussing solutions to address the problems of scalability and security in large-scale authentication systems

  5. Commonly Used Biometrics In this paper Others, widely used

  6. Research Going on… • Heart Beat • Galvanic Skin Conductivity • Pulse Rate • Brain tissues • Respiration • DNA

  7. Face • Location and shape of facial attributes • Eyes, eyebrows, nose, lips and chin • Global Analysis of face as weighted combination of no. of canonical faces. • Disadvantages: • Face could be an image (photograph) • Difficult to locate the face if there is one • Difficult to match from any pose • Template Update Problem

  8. Fingerprint • Pattern of ridges and valleys on fingertip • Fingerprint scanner, cheap approx. $30 • Fingerprint of Identical twins are different • Disadvantage: • Large computation resource when in identification mode

  9. Hand Geometry • Human Hand • Shape and size of palm • Length and widths of fingers • Relatively easy to use • Inexpensive • Environmental conditions do not affect • Disadvantage • Not very distinctive • Individual jewelry • Limitation in dexterity (e.g. Arthritis)

  10. Iris • Iris, is bounded by pupil and the white portion of eye • High accuracy and speed • Each Iris is believed to be distinctive • Ability to detect artificial Irises (contact lenses). • Low FAR but could be high FRR • Disadvantages: • Considerable user participation • expensive

  11. Keystroke • Hypothesis • Behavioral biometric • each person types on keyboard in a characteristic way. • Not unique, but sufficiently different that permits identity verification • Disadvantage: • typing patterns change substantially between consecutive instances of typing the password • different style of keyboard

  12. Signature • The way a person sign • Excepted all throughout the world • Behavioral Biometric • Possibility of changing in emotional and physical conditions. • Disadvantage: • Professional forgers may be able to reproduce signatures that fool the system.

  13. Voice • Physical + Behavioral Biometric • Depends on: • Shape and size of vocal tracts, mouth, nasal cavities and lips • Disadvantages: • Physical part are invariant from each other • But, behavioral part changes from age, emotional state and medical conditions (cold). • Background noise

  14. Variance in Biometrics Major Problem

  15. Inconsistent Presentation

  16. Irreproducible Presentation

  17. Imperfect Representation Acquisition

  18. Operation of Biometric System

  19. E.g. Fingerprint Preprocess Extract Features Feature set Raw Biometric Processed Compare and Validate

  20. Functionalities of a Biometric system • Verification • “Is this person truly John Doe?” • Identification • “Is this person in the database?” • Screening • “Is this a wanted person?”

  21. Matcher Accuracy • FMR (False Match Rate) • Incorrectly declares a successful match • FNMR (False non Match Rate) • Incorrectly declares failure of match • FTE (Failure to Enroll) • % of times users are not able to enroll to the system • FTC (Failure to Capture) • % of times, device fails to capture the sample

  22. Attacks on a Biometric system

  23. Zero effort attacks • Intruder: sufficiently similar biometric traits to a legitimate user • Problem under examination • Determine the probability that any two (or more) individuals may have sufficiently similar fingerprints in a given target population • Given a sample fingerprint, determine the probability of finding a sufficiently similar fingerprint in a target population • Given two fingerprints from two different fingers, determine the probability that they are sufficiently similar.

  24. Adversary Attacks • Physical traits can be obtained from face, fingerprints.

  25. Other Attacks… • Circumvention • Fraudulent access to the system, tamper the sensitive data • Repudiation • Bank clerk Modify the customer record, and claim that intruder spoof his biometric trait • Collusion • Administrator may deliberately modify biometric • Coercion • at gunpoint, grant him access to the system. • Denial of Service (DoS) • A server can be bombarded with a large number of bogus requests

  26. Vulnerabilities in Biometric System Stored Templates Modify Template Override Feature Extractor Intercept the channel Sensor Feature Extractor Matcher Y/N Application Device Synthesized Feature Vector Override final Decision Replay Old Data Override Matcher Fake Biometric

  27. MultiBiometric systems • One can have the fusion of multiple biometrics, to get a high amount of accuracy.

  28. Levels of fusion in multibiom. Feature Level Score Level Decision Level

  29. Feature Level Feature Set Feature Set Fused Feature Set Match Scores Accept/Reject

  30. Matching Module Templates Templates Matching Module Feature Extraction Module Feature Extraction Module Score Level fusion Decision Module Feature Set Feature Set Fused Match Scores Accept/Reject

  31. Matching Module Templates Templates Matching Module Feature Extraction Module Feature Extraction Module Decision Level fusion Feature Set Feature Set Match Scores Match Scores Accept/Reject

  32. Summary and Conclusion • More reliable than current passwords • Cannot be easily shared • Misplace and forged • A well implemented biometric system with sufficient privacy safeguards may be a further basis of resistance. • Multibiometric systems have received much attention in recent researches. • Speech + face • Face +finger • Multiple fingers of users

  33. Cont… • The complexity of biometric system depends on • Accuracy • Scale • Size of the database • Usability

  34. Thank youQuestions / Comments?

More Related