SlideShare una empresa de Scribd logo
1 de 57
Biometric Security
    Dr. Vuda SreenivasaRao
BIOMETRICS

  Forget passwords ...


  Forget pin numbers ...


  Forget all your security concerns ...
PROTACTING
PERSONALDOCUMENTS:
BIOMETRICS SECURITY:
 Security     personnel look for
 biometric data that does not
 change over the course of your
 life; that is, they look for physical
 characteristics that stay constant
 and that are difficult to fake or
 change on purpose.
Traditional ways of security : password security.
 Disadvantage : Password is to be
 remembered or may leak out.
BIOMETRIC : A measurable, physical characteristic
or personal behavioral trait used to recognize the
identity or verify the claimed identity of an enrolled
user.
A FUTURE WITHOUT PASSWORDS
End of “PASSWORD OVERLOAD”

WORKPLACE
DESKTOP COMPUTER
CORPORATE COMPUTER
 NETWORK
INTERNET & E-MAIL
WHAT IS BIOMETRICS?
Automated method


Pattern recognition system


Specific physiological or behavioral
 characteristics
Biometrics
Biometrics is the automated use of
 physiological     or   behavioral
 characteristics to determine or
 verify identity.
Categories of BIOMETRICS:
        Biometrics can be sorted into two classes
1.       Behavioral:
          User speaks.
          Types on a keyboard.
          Signs name.
          Signature.
          Voice
2.       Physiological:
          Fingerprint
          Hand
          Eyes
          Face
Background on Passwords &
                Biometrics
 Passwords
   Ubiquitous Technology.
   Passwords are one of the oldest authentication
    methods.
   Many organizations and institutions have
    used passwords for computer access since
    1963 when Fernando J. Corbato added private
    codes to the CTSS at MIT.
 Biometrics
   First introduced in the 1970s and early 1980s.
   This technology gathers unique physiological or
    behavioral attributes of a person for storing it in a
    database or comparing it with one already found in a
    database.
   Reason    for biometrics include the positive
    authentication and verification of a person and
    ensuring confidentiality of information in storage or in
1.Introduction to Biometric
Objectives:
 1.1: Why Biometrics?
    1.1.1 Benefits of Biometrics versus
        Traditional Authentication Methods.
         Increased Security.
         Increased Convenience.
         Increased Accountability.
    1.1.2 Benefits of Biometrics in Identification
  Systems.
         Fraud Detection.
         Fraud Deterrence.
    1.1.3.Conclusion: Evaluating the Benefits of
1.Introduction to Biometric
 1.2.Verification vs. Identification.
 1.3.Fact and common characteristics.
 1.4.How does biometric works.
1.1. Why Biometrics?
 Biometric technology is used for dozens of
 types of applications, ranging from modest
 (providing time and attendance functionality for a small
 company) to expansive (ensuring the integrity of a 10
 million-person voter registration database).
 Depending on the application, the benefit of
 using or deploying biometrics may be
 increased security, increased convenience,
 reduced fraud, or delivery of enhanced
 services.
1.1. Why Biometrics?
 Regardless     of the rationale for
 deploying biometrics, there are two
 common elements:
  1. The benefits of biometric usage and
 deployment are derived from having a
 high degree of certainty regarding an
 individual’s identity.
  2. The benefits lead directly or
 indirectly to cost savings or to reduced
 risk of financial losses for an individual
WHY USE IT?

 Traditional methods involving
  passwords and PIN numbers

 Biometrics highest level of
  security
1.1.1.Benefits of Biometrics versus
   Traditional Authentication Methods
 The most frequently used authentication
  technologies are passwords and PINs.
 They secure access to
     personal computers (PCs),
     networks, and applications;
    control entry to secure areas of a
 building;
and authorize automatic teller machine
 (ATM)
and debit transactions.
Cont….
 Handheld tokens (such as cards and key fobs)
    have replaced passwords in some higher-security
    applications.
 However, passwords, PINs, and tokens have a
    number of problems that call into question their
    suitability for modern applications, particularly high-
    security applications such as access to online
    financial accounts or medical data.

  What benefits do biometrics provide compared to
  these authentication methods?
        Increased Security.
        Increased Convenience.
        Increased Accountability.
1.Increased Security
 Biometrics can provide a greater degree
  of     security     than     traditional
  authentication methods, meaning that
  resources are accessible only to
  authorized users and are kept protected
  from unauthorized users.
 Passwords and PINs are easily guessed
  or compromised; tokens can be stolen.
1.Increased Security
 Many users select obvious words or
  numbers for password or PIN
  authentication, such that an unauthorized
  user may be able to break into an account
  with little effort.
 In addition, many users write passwords
  in conspicuous places, especially as the
  number of passwords users must manage
  continually increases.
Cont..
 Good    passwords— long passwords with
  numbers and symbols—are too difficult to
  remember for most users and are rarely
  enforced.
 Biometrics data cannot be guessed or stolen in
  the same fashion as a password or token.
 Although some biometric systems can be
  broken under certain conditions, today’s
  biometric systems are highly unlikely to be
  fooled by a picture of a face, an impression of
  a fingerprint, or a recording of a voice.
Cont….
 Shared password or token— or whether the user is
 even authorized—security and accountability are
 greatly reduced.
 Biometric data cannot be shared in this fashion,
  although in some systems two users can choose to
  share a joint bank account by each enrolling a
  fingerprint.
 Although there are a number of security issues
  involved in biometric system usage that must be
  addressed through intelligent system design, the
  level of security provided by most biometric
  systems far exceeds the security provided by
  passwords, PINs, and tokens.
2.Increased Convenience
 One of the reasons passwords are
  kept simple is that they are easily
  forgotten.
 As computer users are forced to
  manage more and more passwords,
  the likelihood of passwords being
  forgotten increases, unless users
  choose a universal password,
  reducing security further.
Increased Convenience
 Tokens and cards can be forgotten as well,
  though keeping them attached to key chains
  reduces this risk.
 Biometrics are difficult if not impossible to
  forget, they can offer much greater
  convenience than systems based on
  remembering multiple passwords or on
  keeping possession of an authentication token.
 PC applications in which a user must access
  multiple resources, biometrics can greatly
  simplify the authentication process—the
  biometric replaces multiple passwords, in
  theory reducing the burden on both the user
  and the system administrator.
Increased Convenience
 Biometric authentication also allows for
  association of higher levels of rights and
  privileges with a successful authentication.
 Highly sensitive information can more
  readily be made available on a biometrically
  protected network than on one protected by
  passwords.
 This can increase user and enterprise
  convenience, as users can access otherwise
  protected information without the need for
  human intervention.
Increased Accountability
 Given the increased awareness of security issues in
  the enterprise and in customer-facing applications,
  the need for strong auditing and reporting capabilities
  has grown more pronounced.
 Using biometrics to secure computers and facilities
  eliminates phenomena such as buddy-punching and
  provides a high degree of certainty as to what user
  accessed what computer at what time.
 Finally,   The benefits of security, convenience, and
  accountability apply primarily to enterprises, corporations,
  and home users; in addition, they describe the rationale for
  biometric verification. The benefits of biometric
  identification, especially on a large scale, differ substantially.
Benefits of Biometrics in Identification
                       Systems
 In identification systems, biometrics can still be
  used for security, convenience, and accountability,
  especially when they are deployed to a modest
  number of users.
 However, identification systems are more often
  deployed in large-scale environments, anywhere
  from tens of thousands to tens of millions of
  users.
 In these applications, biometric identification is
  not replacing passwords or PINs—it is providing
  new types of fraud-reducing functionality.
Fraud Detection
 Identification systems are deployed to determine
  whether a person’s biometric information exists
  more than once in a database.
 By locating and identifying individuals who have
  already registered for a program or service,
  biometrics can reduce fraud.
 Example, a person may be able to register under
  multiple identities using fraudulent documentation.
  A person can also obtain fraudulent identification
  such as a driver’s license. Without biometrics, there
  is no way to be certain that a person is not
  registered under a different identity.
Fraud Deterrence
 Perhaps even more than fraud detection, fraud
  deterrence is a primary benefit in large-scale
  identification systems. It can be difficult to return a
  highly certain match against millions of existing
  biometric records: In some cases, the error rates in
  large-scale identification systems can run into the
  single digits (much higher than would be acceptable
  in verification applications).
 If the presence of biometric identification
  technology can deter individuals from attempting to
  enroll multiple times in a public benefit or driver’s
  license system, then the public agency has saved
  money and ensured the integrity of its records.
Conclusion: Evaluating the Benefits of
           Biometric Systems
 Biometrics   are not suitable for every
 application and user, and in some cases
 biometric authentication is simply the wrong
 solution.
 One of the major challenges facing the
 biometric    industry     is   defining     those
 environments in which biometrics provide the
 strongest benefit to individuals and institutions,
 and then demonstrating that the benefits of
 deployment outweigh the risks and costs.
Definitions
 Automated       use : Behavioral and physiological
  characteristics are regularly used to manually verify or
  determine identity—this is something that humans do
  every day when we greet friends or check an ID card.
 Biometric technologies, by contrast, are automated—
  computers or machines are used to verify or determine
  identity    through     behavioral    or   physiological
  characteristics.
  Because the process is automated, biometric authentication
  generally requires only a few seconds, and biometric systems
  are able to compare thousands of records per second.
 Example: A forensic investigator performing a visual match
  against an ink fingerprint is not performing biometric
  authentication. By contrast, a system where in a user places
  his or her finger on a reader and a match/no-match decision is
  rendered in real time is performing biometric authentication.
Definitions
 Physiological or behavioral characteristics. Biometrics are
  based on the measurement of distinctive physiological and
  behavioral characteristics.
 Finger-scan, facial-scan, iris-scan, hand-scan, and retina-
  scan are considered physiological biometrics, based on
  direct measurements of a part of the human body.
 Voice-scan and signature-scan are considered behavioral
  biometrics; they are based on measurements and data derived
  from an action and therefore indirectly measure
  characteristics of the human body.
 The element of time is essential to behavioral biometrics—the
  characteristic being measured is tied to an action, such as a
  spoken or signed series of words, with a beginning and an
  end.
Definitions
 The    physiological/behavioral classification is
  performance- and privacy-related factors often
  differ between the two types of biometrics.
 Behavioral biometrics are based in part on
  physiology, such as the shape of the vocal cords in
  voice-scan or the dexterity of hands and fingers in
  signature-scan.
 Physiological     biometric technologies are
  similarly informed by user behavior, such as the
  manner in which a user presents a finger or looks
  at a camera.
Definitions
 Determine versus verify. Determining
  versus verifying identity represents a
  fundamental distinction in biometric usage.
 Some biometric systems can determine the
  identity of a person from a biometric
  database without that person first claiming an
  identity.
 The traditional use of fingerprints in crime
  investigations—searching stored records of
  fingerprints in order to find a match—is an
  identification deployment.
Determine versus verify
 Identification   systems stand in contrast to
  verification systems, in which a person claims a
  specific identity and the biometric system either
  confirms or denies that claim.
 Accessing a network is normally a verification
  event—the user enters an ID and verifies that he
  or she is the proper user of that ID by entering a
  password or biometric.
 Identification and verification systems differ
  substantially in terms of privacy, performance,
  and integration into existing systems.
Determining versus Verifying identity
Definitions: Identity.
 Identity is often misunderstood in the
 context of biometrics, where a
 distinction must be drawn between an
 individual and an identity.
 An individual is a singular, unique
 entity—colloquially, a person—but an
 individual can have more than one
 identity.
TWO MAIN USES
1)     VERIFICATION: Verification systems answer the question,
       “Am I who I claim to be?” by requiring that a user claim an
       identity in order for a biometric comparison to be performed.
    Depending
    on the type of biometric system, the identity that a user claims
     might be a Windows
    username, a given name, or an ID number; the answer returned
     by the
    system is match or no match. Verification systems can contain
     dozens, thousands,
    or millions of biometric records, but are always predicated on a
     user’s
    biometric data being matched against only his or her own
     enrolled biometric
    data. Verification is often referred to as 1:1 (one-to-one). The
     process of providing
    a username and biometric data is referred to as authentication.

       -accomplished by the system performing a “one-to-one” search
2) IDENTFICATION
IDENTFICATION
 Identification systems answer the question, “Who am I?”
    and do not require
   that a user claim an identity before biometric comparisons
    take place. The user
   provides his or her biometric data, which is compared to
    data from a number
   of users in order to find a match. The answer returned by
    the system is an identity
   such as a name or ID number. Identification systems can
    contain dozens,
   thousands, or millions of biometric records. Identification is
    often referred to
   as 1:N (one-to-N or one-to-many), because a person’s
    biometric information is
   compared against multiple (N) records.
Positive and Negative
identification
 Positive identification systems are designed to
  find a match for a user’s biometric information in
  a database of biometric information. A typical
  positive identification system would be a prison
  release program where individuals do not enter
  an ID number or use a card, but provide biometric
  data and are located within an inmate database.
 Negative identification systems, by contrast, are
  designed to ensure that a person’s biometric
  information is not present in a database
 Verification systems are generally faster and
  more accurate than identification systems.
 Identification systems require more computational
  power than verification systems, because more
  comparisons take place before a match occurs—
  in some cases, millions of matches.
Logical versus Physical Access
 Physical access systems monitor, restrict, or grant movement of
    a person or
   object into or out of a specific area. Most physical access
    implementations
   involve entry into a room or building: bank vaults, server rooms,
    control towers,
   or any location to which access is restricted. Time and
    attendance are a common
   physical access application, combining access to a location with
    an audit
   of when the authentication occurred. Physical access can also
    entail accessing
   equipment or materials, such as opening a safe or starting an
    automobile,
   although most of these applications are still speculative. When
    used in physical
   access systems, biometrics replace or complement keys, access
    cards, PIN
   codes, and security guards.
CLASSIFICATION
PHYSIOLOGICAL    OR   BEHAVIORAL




IDENTIFICATION   OR   VERIFICATION
BIOMETRIC PROCESS
 ENROLLMENT                                NO MATCH
Present
             Capture   Process
Biometric                        STORE




                                 COMPARE
 VERIFICATION

Present                Process
             Capture
Biometric



                                            MATCH
TECHNOLOGIES
                BIOMETRICS
                  SECURITY




                                 SIGNATURE
IRIS

                                 HAND
       FINGER
                FACE     VOICE
Characteristics of Biometrics
 Universality : Every person should have the characteristic. People
    who are mute or without a fingerprint will need to be
    accommodated in some way.
   Uniqueness: Generally, no two people have identical
    characteristics. However, identical twins are hard to distinguish.
   stability: The characteristics should not vary with time. A person's
    face, for example, may change with age.
   Collectability: The characteristics must be easily collectible and
    measurable.
   Performance: The method must deliver accurate results under
    varied environmental circumstances.
   Acceptability: The general public must accept the sample
    collection routines. Nonintrusive methods are more acceptable.
   Circumvention: The technology should be difficult to deceive .
HOW IT WORKS


 The hardware captures the salient human
 characteristic .

The software interprets the resulting
 data and determines acceptability.
Advantages of Biometrics:
 Biometric     identification     can     provide
  extremely accurate, secured access to
  information; fingerprints, retinal and iris scans
  produce absolutely unique data sets when
  done properly.
 Current methods like password verification
  have many problems (people write them
  down, they forget them, they make up easy-to-
  hack passwords) .
 Automated biometric identification can be
  done very rapidly and uniformly, with a
  minimum of training .
Disadvantages of BIOMETRICS:
 The   finger print of those people
  working in Chemical industries are
  often     affected.  Therefore these
  companies should not use the finger
  print mode of authentication.
 Biometrics is an expensive security
  solution.
Disadvantages of
    BIOMETRICS:
 For people affected with diabetes, the eyes get
 affected resulting in differences.
 It is found that with age, the voice of a person
 differs. Also when the person has flu or throat
 infection the voice changes or if there are too
 much noise in the environment this method
 may not authenticate correctly. Therefore this
 method of verification is not workable all the
 time
QUERIES ???

Más contenido relacionado

La actualidad más candente

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 

La actualidad más candente (20)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
biometrics
biometricsbiometrics
biometrics
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 

Destacado

2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練Abner Huang
 
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big StepBiometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big StepDan Berlin
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer pptTarun tyagi
 
Biometrics proposition
Biometrics propositionBiometrics proposition
Biometrics propositionEwan Rawlings
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computerAnjali Agarwal
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor networkMaulik Patel
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 

Destacado (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
 
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big StepBiometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big Step
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Final2
Final2Final2
Final2
 
Biometrics
BiometricsBiometrics
Biometrics
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Biometrics proposition
Biometrics propositionBiometrics proposition
Biometrics proposition
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 
Biometrics
BiometricsBiometrics
Biometrics
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 

Similar a Biometrics security

What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredEnterprise Wired
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper ExampleKayla Perry
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxNelSon186520
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital TrustBahaa Al Zubaidi
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBahaa Abdulhadi
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfMobibizIndia1
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfBahaa Abdulhadi
 

Similar a Biometrics security (20)

Biometrics
BiometricsBiometrics
Biometrics
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
MasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docxMasterClass Login Using Biometric Authentication.docx
MasterClass Login Using Biometric Authentication.docx
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 

Último

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 

Último (20)

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 

Biometrics security

  • 1. Biometric Security Dr. Vuda SreenivasaRao
  • 2. BIOMETRICS  Forget passwords ...  Forget pin numbers ...  Forget all your security concerns ...
  • 3.
  • 4.
  • 5.
  • 6.
  • 8. BIOMETRICS SECURITY:  Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose.
  • 9.
  • 10. Traditional ways of security : password security. Disadvantage : Password is to be remembered or may leak out. BIOMETRIC : A measurable, physical characteristic or personal behavioral trait used to recognize the identity or verify the claimed identity of an enrolled user.
  • 11. A FUTURE WITHOUT PASSWORDS End of “PASSWORD OVERLOAD” WORKPLACE DESKTOP COMPUTER CORPORATE COMPUTER NETWORK INTERNET & E-MAIL
  • 12.
  • 13. WHAT IS BIOMETRICS? Automated method Pattern recognition system Specific physiological or behavioral characteristics
  • 14. Biometrics Biometrics is the automated use of physiological or behavioral characteristics to determine or verify identity.
  • 15. Categories of BIOMETRICS:  Biometrics can be sorted into two classes 1. Behavioral:  User speaks.  Types on a keyboard.  Signs name.  Signature.  Voice 2. Physiological:  Fingerprint  Hand  Eyes  Face
  • 16. Background on Passwords & Biometrics  Passwords  Ubiquitous Technology.  Passwords are one of the oldest authentication methods.  Many organizations and institutions have used passwords for computer access since 1963 when Fernando J. Corbato added private codes to the CTSS at MIT.  Biometrics  First introduced in the 1970s and early 1980s.  This technology gathers unique physiological or behavioral attributes of a person for storing it in a database or comparing it with one already found in a database.  Reason for biometrics include the positive authentication and verification of a person and ensuring confidentiality of information in storage or in
  • 17. 1.Introduction to Biometric Objectives:  1.1: Why Biometrics?  1.1.1 Benefits of Biometrics versus Traditional Authentication Methods.  Increased Security.  Increased Convenience.  Increased Accountability.  1.1.2 Benefits of Biometrics in Identification Systems.  Fraud Detection.  Fraud Deterrence.  1.1.3.Conclusion: Evaluating the Benefits of
  • 18. 1.Introduction to Biometric  1.2.Verification vs. Identification.  1.3.Fact and common characteristics.  1.4.How does biometric works.
  • 19. 1.1. Why Biometrics?  Biometric technology is used for dozens of types of applications, ranging from modest (providing time and attendance functionality for a small company) to expansive (ensuring the integrity of a 10 million-person voter registration database).  Depending on the application, the benefit of using or deploying biometrics may be increased security, increased convenience, reduced fraud, or delivery of enhanced services.
  • 20. 1.1. Why Biometrics?  Regardless of the rationale for deploying biometrics, there are two common elements: 1. The benefits of biometric usage and deployment are derived from having a high degree of certainty regarding an individual’s identity. 2. The benefits lead directly or indirectly to cost savings or to reduced risk of financial losses for an individual
  • 21. WHY USE IT? Traditional methods involving passwords and PIN numbers Biometrics highest level of security
  • 22. 1.1.1.Benefits of Biometrics versus Traditional Authentication Methods  The most frequently used authentication technologies are passwords and PINs.  They secure access to personal computers (PCs), networks, and applications; control entry to secure areas of a building; and authorize automatic teller machine (ATM) and debit transactions.
  • 23. Cont….  Handheld tokens (such as cards and key fobs) have replaced passwords in some higher-security applications.  However, passwords, PINs, and tokens have a number of problems that call into question their suitability for modern applications, particularly high- security applications such as access to online financial accounts or medical data.  What benefits do biometrics provide compared to these authentication methods?  Increased Security.  Increased Convenience.  Increased Accountability.
  • 24. 1.Increased Security  Biometrics can provide a greater degree of security than traditional authentication methods, meaning that resources are accessible only to authorized users and are kept protected from unauthorized users.  Passwords and PINs are easily guessed or compromised; tokens can be stolen.
  • 25. 1.Increased Security  Many users select obvious words or numbers for password or PIN authentication, such that an unauthorized user may be able to break into an account with little effort.  In addition, many users write passwords in conspicuous places, especially as the number of passwords users must manage continually increases.
  • 26. Cont..  Good passwords— long passwords with numbers and symbols—are too difficult to remember for most users and are rarely enforced.  Biometrics data cannot be guessed or stolen in the same fashion as a password or token.  Although some biometric systems can be broken under certain conditions, today’s biometric systems are highly unlikely to be fooled by a picture of a face, an impression of a fingerprint, or a recording of a voice.
  • 27. Cont….  Shared password or token— or whether the user is even authorized—security and accountability are greatly reduced.  Biometric data cannot be shared in this fashion, although in some systems two users can choose to share a joint bank account by each enrolling a fingerprint.  Although there are a number of security issues involved in biometric system usage that must be addressed through intelligent system design, the level of security provided by most biometric systems far exceeds the security provided by passwords, PINs, and tokens.
  • 28. 2.Increased Convenience  One of the reasons passwords are kept simple is that they are easily forgotten.  As computer users are forced to manage more and more passwords, the likelihood of passwords being forgotten increases, unless users choose a universal password, reducing security further.
  • 29. Increased Convenience  Tokens and cards can be forgotten as well, though keeping them attached to key chains reduces this risk.  Biometrics are difficult if not impossible to forget, they can offer much greater convenience than systems based on remembering multiple passwords or on keeping possession of an authentication token.  PC applications in which a user must access multiple resources, biometrics can greatly simplify the authentication process—the biometric replaces multiple passwords, in theory reducing the burden on both the user and the system administrator.
  • 30. Increased Convenience  Biometric authentication also allows for association of higher levels of rights and privileges with a successful authentication.  Highly sensitive information can more readily be made available on a biometrically protected network than on one protected by passwords.  This can increase user and enterprise convenience, as users can access otherwise protected information without the need for human intervention.
  • 31. Increased Accountability  Given the increased awareness of security issues in the enterprise and in customer-facing applications, the need for strong auditing and reporting capabilities has grown more pronounced.  Using biometrics to secure computers and facilities eliminates phenomena such as buddy-punching and provides a high degree of certainty as to what user accessed what computer at what time.  Finally, The benefits of security, convenience, and accountability apply primarily to enterprises, corporations, and home users; in addition, they describe the rationale for biometric verification. The benefits of biometric identification, especially on a large scale, differ substantially.
  • 32. Benefits of Biometrics in Identification Systems  In identification systems, biometrics can still be used for security, convenience, and accountability, especially when they are deployed to a modest number of users.  However, identification systems are more often deployed in large-scale environments, anywhere from tens of thousands to tens of millions of users.  In these applications, biometric identification is not replacing passwords or PINs—it is providing new types of fraud-reducing functionality.
  • 33. Fraud Detection  Identification systems are deployed to determine whether a person’s biometric information exists more than once in a database.  By locating and identifying individuals who have already registered for a program or service, biometrics can reduce fraud.  Example, a person may be able to register under multiple identities using fraudulent documentation. A person can also obtain fraudulent identification such as a driver’s license. Without biometrics, there is no way to be certain that a person is not registered under a different identity.
  • 34. Fraud Deterrence  Perhaps even more than fraud detection, fraud deterrence is a primary benefit in large-scale identification systems. It can be difficult to return a highly certain match against millions of existing biometric records: In some cases, the error rates in large-scale identification systems can run into the single digits (much higher than would be acceptable in verification applications).  If the presence of biometric identification technology can deter individuals from attempting to enroll multiple times in a public benefit or driver’s license system, then the public agency has saved money and ensured the integrity of its records.
  • 35. Conclusion: Evaluating the Benefits of Biometric Systems  Biometrics are not suitable for every application and user, and in some cases biometric authentication is simply the wrong solution.  One of the major challenges facing the biometric industry is defining those environments in which biometrics provide the strongest benefit to individuals and institutions, and then demonstrating that the benefits of deployment outweigh the risks and costs.
  • 36. Definitions  Automated use : Behavioral and physiological characteristics are regularly used to manually verify or determine identity—this is something that humans do every day when we greet friends or check an ID card.  Biometric technologies, by contrast, are automated— computers or machines are used to verify or determine identity through behavioral or physiological characteristics.  Because the process is automated, biometric authentication generally requires only a few seconds, and biometric systems are able to compare thousands of records per second.  Example: A forensic investigator performing a visual match against an ink fingerprint is not performing biometric authentication. By contrast, a system where in a user places his or her finger on a reader and a match/no-match decision is rendered in real time is performing biometric authentication.
  • 37. Definitions  Physiological or behavioral characteristics. Biometrics are based on the measurement of distinctive physiological and behavioral characteristics.  Finger-scan, facial-scan, iris-scan, hand-scan, and retina- scan are considered physiological biometrics, based on direct measurements of a part of the human body.  Voice-scan and signature-scan are considered behavioral biometrics; they are based on measurements and data derived from an action and therefore indirectly measure characteristics of the human body.  The element of time is essential to behavioral biometrics—the characteristic being measured is tied to an action, such as a spoken or signed series of words, with a beginning and an end.
  • 38. Definitions  The physiological/behavioral classification is performance- and privacy-related factors often differ between the two types of biometrics.  Behavioral biometrics are based in part on physiology, such as the shape of the vocal cords in voice-scan or the dexterity of hands and fingers in signature-scan.  Physiological biometric technologies are similarly informed by user behavior, such as the manner in which a user presents a finger or looks at a camera.
  • 39. Definitions  Determine versus verify. Determining versus verifying identity represents a fundamental distinction in biometric usage.  Some biometric systems can determine the identity of a person from a biometric database without that person first claiming an identity.  The traditional use of fingerprints in crime investigations—searching stored records of fingerprints in order to find a match—is an identification deployment.
  • 40. Determine versus verify  Identification systems stand in contrast to verification systems, in which a person claims a specific identity and the biometric system either confirms or denies that claim.  Accessing a network is normally a verification event—the user enters an ID and verifies that he or she is the proper user of that ID by entering a password or biometric.  Identification and verification systems differ substantially in terms of privacy, performance, and integration into existing systems.
  • 42. Definitions: Identity.  Identity is often misunderstood in the context of biometrics, where a distinction must be drawn between an individual and an identity.  An individual is a singular, unique entity—colloquially, a person—but an individual can have more than one identity.
  • 43. TWO MAIN USES 1) VERIFICATION: Verification systems answer the question, “Am I who I claim to be?” by requiring that a user claim an identity in order for a biometric comparison to be performed.  Depending  on the type of biometric system, the identity that a user claims might be a Windows  username, a given name, or an ID number; the answer returned by the  system is match or no match. Verification systems can contain dozens, thousands,  or millions of biometric records, but are always predicated on a user’s  biometric data being matched against only his or her own enrolled biometric  data. Verification is often referred to as 1:1 (one-to-one). The process of providing  a username and biometric data is referred to as authentication. -accomplished by the system performing a “one-to-one” search 2) IDENTFICATION
  • 44. IDENTFICATION  Identification systems answer the question, “Who am I?” and do not require  that a user claim an identity before biometric comparisons take place. The user  provides his or her biometric data, which is compared to data from a number  of users in order to find a match. The answer returned by the system is an identity  such as a name or ID number. Identification systems can contain dozens,  thousands, or millions of biometric records. Identification is often referred to  as 1:N (one-to-N or one-to-many), because a person’s biometric information is  compared against multiple (N) records.
  • 45. Positive and Negative identification  Positive identification systems are designed to find a match for a user’s biometric information in a database of biometric information. A typical positive identification system would be a prison release program where individuals do not enter an ID number or use a card, but provide biometric data and are located within an inmate database.  Negative identification systems, by contrast, are designed to ensure that a person’s biometric information is not present in a database
  • 46.  Verification systems are generally faster and more accurate than identification systems.  Identification systems require more computational power than verification systems, because more comparisons take place before a match occurs— in some cases, millions of matches.
  • 47.
  • 48. Logical versus Physical Access  Physical access systems monitor, restrict, or grant movement of a person or  object into or out of a specific area. Most physical access implementations  involve entry into a room or building: bank vaults, server rooms, control towers,  or any location to which access is restricted. Time and attendance are a common  physical access application, combining access to a location with an audit  of when the authentication occurred. Physical access can also entail accessing  equipment or materials, such as opening a safe or starting an automobile,  although most of these applications are still speculative. When used in physical  access systems, biometrics replace or complement keys, access cards, PIN  codes, and security guards.
  • 49. CLASSIFICATION PHYSIOLOGICAL OR BEHAVIORAL IDENTIFICATION OR VERIFICATION
  • 50. BIOMETRIC PROCESS ENROLLMENT NO MATCH Present Capture Process Biometric STORE COMPARE VERIFICATION Present Process Capture Biometric MATCH
  • 51. TECHNOLOGIES BIOMETRICS SECURITY SIGNATURE IRIS HAND FINGER FACE VOICE
  • 52. Characteristics of Biometrics  Universality : Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way.  Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish.  stability: The characteristics should not vary with time. A person's face, for example, may change with age.  Collectability: The characteristics must be easily collectible and measurable.  Performance: The method must deliver accurate results under varied environmental circumstances.  Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable.  Circumvention: The technology should be difficult to deceive .
  • 53. HOW IT WORKS  The hardware captures the salient human characteristic . The software interprets the resulting data and determines acceptability.
  • 54. Advantages of Biometrics:  Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.  Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to- hack passwords) .  Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .
  • 55. Disadvantages of BIOMETRICS:  The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.  Biometrics is an expensive security solution.
  • 56. Disadvantages of BIOMETRICS:  For people affected with diabetes, the eyes get affected resulting in differences.  It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time