Biometric authentication

53
Biometric Authentication Muhammad Usman 122 Mahtab Rasheed 145 Usman Ali Butt 112 Waseem Khan 107 NUST,SEECS Pakistan

Transcript of Biometric authentication

Biometric Authentication

Muhammad Usman 122

Mahtab Rasheed 145

Usman Ali Butt 112

Waseem Khan 107

NUST,SEECS Pakistan

Agenda

• Introduction

• History

• Importance

• Types

• Methods

• Risks

• Summary

Introduction

Biometric Authentication:-

“ Biometric

Authentication is any process that validates

the identity of a user who wishes to sign

into a system by measuring some intrinsic

characteristic of that user”

Introduction

• Word biometric is derived from Greek words

bios mean life and metrics mean measure

• Therefore biometric authentication is defined

measuring of physiological or behavioral

properties related to particular entity to verify

or authenticate the entity.

Quick Look at History

• During the construction of great Pyramid Khufu workers

need to be authenticated for allowance

• 14th century in china, they use to save palm and foot

prints on clay blocks

• In 1890 a Persian police man Alphonse Bertillon provided

the basics to recognize the fingerprints

• 1892 Francis developed a classified system for finger

prints

• In 1896 Based on Bertillon study Aziz-ul-Haq developed

first systematic finger prints system for Edward Henry ,a

colonial of British Army in Bengal, India.

Quick Look at History

• 1936 Frank Burch gave a concept of using Iris

patterns for the recognition of an individual

• 1960 work on face recognition and voice

recognition

• 1965 automated system for signature

recognition

• Rapid development in biometric authentication

in 70’s

Quick Look at History

• 1985 patent for hand identification

• 1995 iris prototype become available as a

commercial product

• 1996 hand geometry used in Olympic games

held in Atlanta.

• First major success.

Quick Look at History

• 2000,first face recognition commercial product

• 2000,first research paper on vascular patterns

for recognition

• Modern biometrics based on computing have

developed now.

Importance of Biometric

Authentication

• Security is becoming important in business and

every field of life

• Fraud detection

• A person can claim multiple identities to get

more resources

• Biometric properties cannot be stolen unlike

passwords and keys

• After 9/11 rapid development on Biometric

Authentication

Types of Biometric Authentication

Biometric applications available today are

categorized into 2 sectors

• Physiological: Iris, Fingerprints, Hand Geometry,

Retinal ,Face recognition etc.

• Behavioral: Voice, Typing pattern etc.

Physiological Biometrics

Authentication

• A biometrics which use a physical trait, such

as a fingerprint, iris, hand or face for

recognition. The physical trait is analyzed,

measured and digitally stored.

Fingerprint Authentication

• Divides print into loops, whorls and arch

• Calculates minutiae points (ridge endings)

• Comparisons

• Authentication

Disadvantages

• Dirt , grime and wounds

• Placement of finger

• Too big a database to process

• Can be spoofed

Hand Geometry

• Geometry of users hands

• More reliable than fingerprinting

• Balance in performance and usability

• Very large scanners

Retinal Scanning

• Scans retina(the innermost coat of the back

part of the eye) into database

• User looks straight into retinal reader

• It checks the pattern of blood vessels of eye

retina.

• Scan using low intensity light

• Very efficient – cant be spoofed!

• User has to look “directly”

Iris Scanning

• Scans unique pattern of iris the colored ring of

muscle

• Iris is colored and visible from far

• No touch required

• The patterns of one person's two eyes are

quite different from each other and even

genetically identical twins have different iris

patterns.

• Contact lenses an issue

Face Recognition

• User faces camera

• Neutral expression required

• Appropriate lighting and position

• Algorithms for processing

Other Physiological Biometrics

• Palm print

• Hand vein

• DNA

• Thermal imaging

• Ear shape

• Human Odor Recognition

• Fingernail bed

Palm Print

• Palm print verification is a slightly different

implementation of the fingerprint technology.

Hand Vein

• Hand vein geometry is based on the fact that

the vein pattern is distinctive for various

individuals.

DNA

• DNA (Deoxyribose Neucleic Acid)

authentication is very popular at present and

requires a form of tissue, blood or other bodily

sample.

Behavioral Biometrics

• Biometrics that is based on a behavioral trait of

an individual.

• Acquired over time by an individual.

• A reflection of an individual’s psychology.

Types Of Behavioral Biometric

• Signature Recognition.

• Voice Recognition.

• Typing Patterns

• Gaits

Signature Recognition

• Automatically scanning a person's signature

and matching it electronically against a

library of known signatures.

How it works

• Speed

• Direction

• Pressure

• Acceleration

• length of the strokes

• Dynamics number of strokes and their duration

Advantages

• Unique style of doing Signature.

• One does not know how to write signature

even after looking at it.

Disadvantages

• Signature variable with Age, illness, emotions

• Requires high quality hardware

• High FRR as signatures are very dynamic

• Low Accuracy.

Voice Recognition

• A Biometric identification by electronically

recording and graphically representing a

person's voice.

Voice Recognition

• Voice prints : The unique characteristic of individual.

• User’s voice print is stored in database.

• Enroll by speaking some phrases.

• System Compares the voiceprints.

• Speech input

• Speaking style

• Pitch

• Frequency

• Natural tone

Disadvantages

• Background noise

• Device quality

• Illness , emotional behavior

• Time consuming enrollment

• Large processing template

Typing Patterns

• A method of verifying the identity of an

individual by their typing rhythm.

• System can verify the user at the log-on stage

or it can Continuously monitor the typist.

Typing Patterns

• User typing pattern

• Different characteristics

• Speed ( time durations between the keystrokes )

• Press and Release Rate

• Frequency of errors (use of backspace)

• Use of num pad

• Order in which user presses shift key to get capital letters

• Unique patterns are generated

• Comparisons

• Cheap

• Continuously check the user

Disadvantages

• For recognition a large amount of keystroke

data is needed

• Unnecessary comparisons with all existing

users

• Not very scalable

• FRR is high (Speed and Frequency of errors

can vary)

• Can be spoofed – by simple technology

(recorders)

Gaits

• Gait is an attractive biometric feature for

human identification at a distance.

• Gait is a particular way or manner

of moving on foot.

• Movements of a person's

various body parts over time

Advantages

• Perceivable at a distance

• Non-contact

• Non-invasive ( without interfering human

body)

• Can identify among a group of people

Disadvantages

• Injuries

• Illness

• Weather Effect

General Look on Biometrics

Iris

• Strengths

Very stable over time

Uniqueness

• Weakness

Requires user training

Dependant on a single vendor’s technology

General Look on Biometrics

• Iris

• Usability

Information security access control,

especially for Federal Institutions and

government agencies.

General Look on Biometrics

Fingerprint

• Strengths

Small template (less than 500 bytes)

Small sensors

• Weakness

Physical contact required

• Usability

Physical access control

Association with criminal justice

General Look on Biometrics

Voice

• Strengths

Low training

Microphone can be built into PC or mobile device

• Weaknesses

Changes with time, illness stress or injury

Large template unsuitable for recognition

• Usability

Mobile phones

Telephone banking

General Look on Biometrics

Signatures

• Strengths

• High user acceptance

Minimal training

• Weaknesses

Unstable over time

Occasional erratic variability

Enrollment takes times

• Usability

Portable devices with stylus input

General Look on Biometrics

Face

• Strengths

Universally present

• Weaknesses

Cannot distinguish identical siblings

Religious or cultural prohibitions

• Usability

Physical access control

General Look on Biometrics

Hand

• Strengths

Small template (approximately 10 bytes)

Unaffected by skin condition

• Weaknesses

Physical size of acquisition device

Physical contact required

• Usability

Physical access control

Time and attendance

Comparison of Different

Biometrics Technology

Conclusion

• All authentication methods are prone to errors. Nevertheless, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user

• Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication

• Biometric systems are not foolproof; they can be compromised by:

Submission of another person’s biometric

Submission of enrollee’s biometric with the user under duress or incapacitated

• A prudent balance between Security and Privacy needs to be achieved

References

• Biometrics History published by NSTC

subcommittee on Biometrics

date:7 August 2006

www.biometrics.gov

• Biometric Authentication

Technology and Evaluation –

Term Project CS574

Spring 2003

San Diego State University

Uwe Bubeck Dina Sanchez

References

• Biometrics and Authentication slides of

Shivani Kirubanandan

• Authentication: Overview slides of Paul Bui

• Biometric Authentication Systems

by Zdeneˇk Rˇ íha and Václav Matyáš FIMU

Report Series November 2000

Question?