1 / 9

UW CSEP 590 Term paper

UW CSEP 590 Term paper. Biometric Authentication Shankar Raghavan. Definition and Advantages. Physical or behavioral characteristics Much longer, random than a traditional password Always there with the person Unique to a person. Common biometric identifiers.

burke
Download Presentation

UW CSEP 590 Term paper

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UW CSEP 590 Term paper Biometric Authentication Shankar Raghavan

  2. Definition and Advantages Physical or behavioral characteristics Much longer, random than a traditional password Always there with the person Unique to a person

  3. Common biometric identifiers FRR/FAR are measures for accuracy

  4. Authentication mechanism, threats • If template is compromised, is the biometric identifier lost for ever? • Is there any good method for Tye 1 or type 2 attacks?

  5. Fingerprint minutiae

  6. Attacks and Defences • Dummy finger (Type 1) • Gummy finger – Matsumoto (Type 1) • Hill climbing attack (Type 4) • Liveness detection (Type 1) • WSQ data hiding (Type 2) • Advantages of iris/retinal scannings • Image based challenge response systems

  7. Fuzziness in biometrics • n of N attributes match • Application of Shamir’s secret sharing • Identity based encryption using bilinear maps • Uses different polynomials for each user • Generates a private key for every attribute user has, this is distinct and not shared with another user. • Interpolates polynomial in an exponent

  8. Fuzzy biometrics (backup) • Fuzzy commitment • x and x’ will both decode to a similar value • Not able to handle rotational/translational aspects of order invariances in an image very well. • Fuzzy vault • Maps a set that hold the key to a secret onto a polynomial p ie each value in the set is an x coordinate for a point evaluated by p. • Adds some noise or chaff so that the encrypted set becomes p(x),

  9. Questions?

More Related