540 likes | 687 Views
Biometrics. Joshua Grieser. Introduction. General Definition Biometrics is the science and technology of measuring and analyzing biological data IT Definition Refers to technologies and methods for uniquely recognizing humans based upon at least one physical or behavioral trait
E N D
Biometrics Joshua Grieser
Introduction • General Definition • Biometrics is the science and technology of measuring and analyzing biological data • IT Definition • Refers to technologies and methods for uniquely recognizing humans based upon at least one physical or behavioral trait • Instead of using something you have (a key) or something you know (a password), biometrics uses who you are to identify you
History of Biometrics • Quantitative measurements of humans for the purpose of identification dates back to 1870s • Measurement system of Alphonse Bertillon • System included skull diameter and arm and foot length measurements • 1920s: used to identify prisoners • 1960s: digital signal processing techniques lead to automating human identification • 1970s: government using technologies for fingerprint and hand geometry
Overview • Two categories of biometric identifiers • Anatomical • Behavioral • Different types of biometric systems • How it works • Enrollment process • Uses of biometric systems • Current • Future
Common Types • Fingerprint • Face recognition • Iris recognition • Palm print
Other Types • DNA • Voice patterns • Handwriting • Keystroke dynamics • Skin analysis • Vein patterns • Gait
Why Use Biometrics? • Token – something a person possesses and uses to assert a claim to identity • (Password, PIN) • Tokens no longer sufficient to authenticate identity • Easy to counterfeit/steal • Cannot ensure positive identification of a person • Passwords forgotten and stolen • Biometric identifiers are linked to a person • More robust audit trail, documentation
Current Applications • Large number of civilian and government applications • Physical access control • Welfare disbursement • International border crossing • National ID cards • Computer log-in • Safes • Home alarm systems
Assessing suitability of a trait • Seven factors used: • Universality • Uniqueness • Permanence • Measurability • Performance • Acceptability • Circumvention • Note: No single biometric will meet all requirements of every possible application.
Seven Factors • Universality • Means that every person using a system should possess the trait. • Uniqueness • Means the trait should be sufficiently different for each person using the system in order to distinguish from one another. • Permanence • Relates to a trait varying over time. Trait with good permanence will be more invariant over time, not constantly changing.
Seven Factors • Measurability (collectability) • Relates to the ease of measuring the trait. The data form can be processed, features extracted. • Performance • Relates to accuracy, speed and robustness of the technology used. • Acceptability • Relates to how well individuals in the population accept the technology. They are willing to have that biometric trait captured and assessed. • Circumvention • Relates to the how easy the trait is to imitate.
How it works • All systems boil down to the same three steps • Enrollment • Records information about you • Storage • Translates the info into a code or graph • Comparison • Compares traits to the template on file
How it works • All systems also use the same three components • Sensor • Detects characteristic being used for identification • Computer • Reads and stores the information • Software • Performs actual comparison
How it works • In general, biometric system will scan trait and process data by accessing a database. • Two modes • Verification mode • Identification mode • Biometric templates • Most biometric types are converted into mathematical representations to compare against
Stored in reader device, central repository, or portable token Some devices have temporary storage
Verification Mode • System performs one-to-one comparison • Uses specific template stored in a database • Involves confirming or denying a person’s claimed identity • Am I who I claim I am? • To determine which template to compare against, one of the following is used: • Smart card • Username • ID number
Identification Mode • System performs one-to-many comparison • More difficult • Attempts to recognize a person from a list of users in the template database • Who am I? • Successfully identifies the human if the sample collected matches template from the database when compared • Comparison result has to fall into preset threshold
Enrollment • Enrollment - first time an individual uses the biometric system • During enrollment, biometric information from individual is captured and stored in the database • In subsequent uses, the sample is collected and compared with the information stored at the time of enrollment • Three Blocks
First Block • Interface between system and real world (human) • Where the system acquires all necessary data • Actual interaction with sensors • Mainly image acquisition systems • Can be different depending on desired characteristics
Second Block • All pre-processing performed • Removes artifacts from sensors to enhance input • Normalization • Example: removing background noise
Third Block • Necessary, unique features are extracted to create the template • Critical step, correct features have to be extracted in the optimal way • Uses vector of numbers or an image with particular properties to create template • Discards measurements not used in creation of template • Reduce file size • Protect identity of enrollee
Templates are safe • Encrypted using strong cryptographic algorithms to secure and protect them from disclosure • Protects biometric templates from being • Reconstructed • Decrypted • Reverse-engineered • Manipulated in other ways • Most templates are site specific • Data is converted into code, not real life representation of person’s traits
Comparing Algorithms • When performing matching phase, template is passed to matcher that compares it with existing templates • Estimates distance between them using comparing algorithm • (how different the two templates are) • Many different algorithms depending on biometric type • Example: Hamming distance • If accepted, it is output for specified use like entrance in a restricted area
Hamming Distance • “distance” between two strings of equal length (how different they are) • Measures minimum number of substitutions required to change one string into the other string (number of errors) • Examples • “toned” “roses” = 3 • 10111011001001 = 2 • 21738962233796 = 3 • Programmed in many different languages • Used for strings, integers, characters
Fingerprint • Oldest biometric known • Were previously captured with ink on paper and mailed/faxed • Entire process now done in near real time • Leading toward use in applications from biometric passports to ATMs • Ridges and furrows used as reference points • 60-70 points of reference in fingerprints
Face Recognition • Face we are born with remains identifiable throughout our lives • Curves and contours remain relatively stable • Requires large image capture device • Most suitable at fixed locations • Least intrusive, can be scanned from a distance • Accuracy depends on lighting conditions
Iris Recognition • Each iris has different shapes and colors • As unique as a snowflake • Less intrusive, scanners don’t require bright lights • Mathematical expression of iris is most detailed of any biometric technology • Most accurate biometric • Considered one of the most secure
Iris Recognition • Approximately 250 distinctive characteristics in an iris • All can be used as points of reference for comparison • Odds of two people having the same pattern are 1 in 7 billion • Comparing against database is quick and high level of accuracy • Used in airports and other secure facilities • Most costly system
Palm Print • Size and shape of hands are unique to individuals • Device scans 3-D geometry of hand and fingers • Creates mathematical picture which is compared against a database • Readers are large, best suited for fixed point access • Capture units withstand extreme workforce conditions like temperature, weather • Can also verify individual’s hand even when it is dirty
Voice Recognition • Password for voice is tone and timbre • Graph representation and compared against a database • User has to teach the computer first by speaking a number of phrases • Quick and efficient after the enrollment process • Only ambient noise limits its application
Handwriting Recognition • Not just how you shape each letter • Analyzes act of writing • Examines pressure you use, speed and rhythm with which you write • Records sequence in which you form letters • Add dots and crosses as you go or after you finish • Systems sensors can include touch-sensitive writing surface or pen that contains sensors and detects angle, pressure, and direction • Translates handwriting into a graph
Handwriting Recognition Pressure Speed Acceleration Angle
Adaptive Biometric Systems • Aim to auto-update templates • Benefits: • No longer need to collect large number of biometric samples during enrollment process • No longer necessary to re-enroll/retrain the system • Can significantly reduce the cost of maintaining a biometric system • Issues: • Higher false acceptance • Threshold has to account for a changing template
Issues and Concerns • Privacy and discrimination • Possible to use data from enrollment for ways in which the user did not consent • Example: DNA recognition used to screen for genetic diseases • Higher danger to owners • Thieves can get more desperate • Example: cut off a finger to get access to fingerprint scanner • Cancelable biometrics • Unlike passwords, biometrics cannot be cancelled or reissued to a person if compromised
Issues and Concerns • Some people object to biometrics for cultural or religious reasons • Possibility of companies selling biometric data similar to email addresses/phone numbers • Over reliance – not foolproof, can’t forget about common sense security practices • Accessibility – some systems can’t be adapted for all populations (elderly/disabled people)
Used in Many Countries • Australia • Brazil • Canada • Germany • India • Iraq • Italy • United States
International Issue • International sharing of biometric data • Countries, including US, are sharing biometric data with other nations • Positive: • Could help combat terrorism by having access to other countries’ data • Negative: • Easier for people in other countries to get access to our data • Makes it easier to tamper with
Popular Culture • Minority Report • Uses Iris scans for identification as well as POS transactions • MythBusters • Attempted to break into commercial security door • Had fingerprint authentication • Successful with printed scan of fingerprint • Unsuccessful with gel fingerprint • Mission Impossible • Voice/iris recognition
BVAS • Biometrics Vulnerability Assessment Service • Proprietary of Biometrics Institute • Customer submits their system for independent testing • Conducted in an independent laboratory • Biometric devices are sent to have their vulnerabilities investigated, assessed, and reported • Helps make sure your system is secure and work out any kinks
Biometrics.gov • Central source of info on biometrics-related activities of the federal government • Sister site www.biometrics.org • Repository of public information and opportunities for discussion • Developed to encourage collaboration and sharing of info on biometric activities among: • Government departments and agencies • State, regional, and international organizations • General public
Four main rooms • Biometrics Reference • General info about biometric technologies, government programs and privacy planning • Presidential Directives • PD that touch on biometrics or federal biometric activities • NSTC Subcommittee on Biometrics and Identity Management Room • Info on the National Science & Technology Council’s Subcommittee on Biometrics • Standards • Info on federal biometric standards policy
Future Applications • Hospitals using scan of veins in your hand to identify patients • Easy access to medical records • Eliminates paper records • Germany, supermarkets use fingerprint biometrics to identify consumer account information and make payments • Possible use in the US • Combine heat sensors to fingerprint, hand scanners • Confirm an actual hand is interacting
Future Applications • Mobile Automated Fingerprint ID System • Comparisons made immediately over mobile networks • US border control • Digital photo of both index fingers for non residents • Combat terrorism and monitor residence permits • Digital face/fingerprint images on passports • Increase security/reduce processing time at borders • Enable access to secure/sensitive areas like energy supply facilities or nuclear power stations • Opportunities for digital citizen cards • e-government, e-banking, e-business
Multiple Biometrics • Layered systems • Combines a biometric method with a keycard or PIN • Multimodal systems • Combines multiple biometric methods simultaneously to confirm identification • Example: iris scanner and a voiceprint system • 3-D palm print systems replace 2-D • Much higher anti-counterfeit capability
Tongue Scanning? • Being tested at Hong Kong Polytechnic University’s Biometrics Research Center • Uses laser scanning to construct 3-D shape of tongue • Collected in about 2-3 seconds