Enviar búsqueda
Cargar
Biometrics - Basics
•
4 recomendaciones
•
1,423 vistas
Franck Franchin
Seguir
Biometrics - Basics - May 2013
Leer menos
Leer más
Educación
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 14
Recomendados
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Franck Franchin
Presentation deek-ige-original
Presentation deek-ige-original
Université Saint Joseph de Beyrouth
sorbonne entreprenariat
sorbonne entreprenariat
Sacha Berenfus
Les agrégats de la comptabilité national
Les agrégats de la comptabilité national
zaidmeziani
Cours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercices
nezha errechydy
Comptabilité nationale pratiques
Comptabilité nationale pratiques
Abdelhak Essoulahi
Recherche cours de comptabilite analytique
Recherche cours de comptabilite analytique
hassan1488
Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.
bouchra elabbadi
Recomendados
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Franck Franchin
Presentation deek-ige-original
Presentation deek-ige-original
Université Saint Joseph de Beyrouth
sorbonne entreprenariat
sorbonne entreprenariat
Sacha Berenfus
Les agrégats de la comptabilité national
Les agrégats de la comptabilité national
zaidmeziani
Cours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercices
nezha errechydy
Comptabilité nationale pratiques
Comptabilité nationale pratiques
Abdelhak Essoulahi
Recherche cours de comptabilite analytique
Recherche cours de comptabilite analytique
hassan1488
Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.
bouchra elabbadi
Cryptographie quantique
Cryptographie quantique
Franck Franchin
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
Franck Franchin
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
cours fsjes
Monnaie
Monnaie
bouchra elabbadi
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Franck Franchin
Speak English
Speak English
stephanie vincent
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
Mohamed Heny SELMI
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
Houda Elmoutaoukil
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
Habiba MEZYANI
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
Actions-Finance
Comptabilite-analytique
Comptabilite-analytique
Mejdoubi Amal
Cours de finances_publiques-1
Cours de finances_publiques-1
rajaa224
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
Franck Franchin
Exercices d analyse financière
Exercices d analyse financière
Abde LLatif
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Abbes Rharrab
Le Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’Entreprise
claude wastiaux
Sécurité des systèmes d'information
Sécurité des systèmes d'information
Franck Franchin
Compta analyt cours exercices
Compta analyt cours exercices
GEANT_ATLAS
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
HB1-Sela
Alphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQL
Alphorm
Biometrics
Biometrics
shweta-sharma99
Biometrics
Biometrics
shweta-sharma99
Más contenido relacionado
Destacado
Cryptographie quantique
Cryptographie quantique
Franck Franchin
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
Franck Franchin
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
cours fsjes
Monnaie
Monnaie
bouchra elabbadi
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Franck Franchin
Speak English
Speak English
stephanie vincent
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
Mohamed Heny SELMI
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
Houda Elmoutaoukil
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
Habiba MEZYANI
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
Actions-Finance
Comptabilite-analytique
Comptabilite-analytique
Mejdoubi Amal
Cours de finances_publiques-1
Cours de finances_publiques-1
rajaa224
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
Franck Franchin
Exercices d analyse financière
Exercices d analyse financière
Abde LLatif
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Abbes Rharrab
Le Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’Entreprise
claude wastiaux
Sécurité des systèmes d'information
Sécurité des systèmes d'information
Franck Franchin
Compta analyt cours exercices
Compta analyt cours exercices
GEANT_ATLAS
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
HB1-Sela
Alphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQL
Alphorm
Destacado
(20)
Cryptographie quantique
Cryptographie quantique
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
Monnaie
Monnaie
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Speak English
Speak English
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
Comptabilite-analytique
Comptabilite-analytique
Cours de finances_publiques-1
Cours de finances_publiques-1
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
Exercices d analyse financière
Exercices d analyse financière
Audit sécurité des systèmes d’information
Audit sécurité des systèmes d’information
Le Controle De Gestion De L’Entreprise
Le Controle De Gestion De L’Entreprise
Sécurité des systèmes d'information
Sécurité des systèmes d'information
Compta analyt cours exercices
Compta analyt cours exercices
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Analyse et conception des systèmes d’information (d’outils et modèles pour le...
Alphorm.com Formation PL/SQL
Alphorm.com Formation PL/SQL
Similar a Biometrics - Basics
Biometrics
Biometrics
shweta-sharma99
Biometrics
Biometrics
shweta-sharma99
Biometrics
Biometrics
Shivani Gautam
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
Presentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
Palm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
Biometric
Biometric
Vinay Gupta
Biometrics
Biometrics
Alan Leewllyn Bivera
palm vein technology
palm vein technology
Srinivasa Rao Gurram
Palm vein Technology
Palm vein Technology
Srinivasa Rao Gurram
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
Biometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
Biometrics
Biometrics
Priyanka Sharma
Palm Authentication using Biometrics system
Palm Authentication using Biometrics system
Darshan Parate
Biometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
Biometric security system
Biometric security system
Mithun Paul
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
Biometric
Biometric
NikhilKumar1203
kiran's slide info
kiran's slide info
Kalyanam Kiran
Similar a Biometrics - Basics
(20)
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Presentation Fingervein Authentication
Presentation Fingervein Authentication
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Palm vein technology
Palm vein technology
Biometric
Biometric
Biometrics
Biometrics
palm vein technology
palm vein technology
Palm vein Technology
Palm vein Technology
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Biometric security using cryptography
Biometric security using cryptography
Biometrics
Biometrics
Palm Authentication using Biometrics system
Palm Authentication using Biometrics system
Biometrics/fingerprint sensors
Biometrics/fingerprint sensors
Biometric security system
Biometric security system
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
Biometric
Biometric
kiran's slide info
kiran's slide info
Último
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
pradhanghanshyam7136
Spatium Project Simulation student brief
Spatium Project Simulation student brief
Association for Project Management
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
Jisc
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Pooja Bhuva
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
neillewis46
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Pooja Bhuva
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
Celine George
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Denish Jangid
Single or Multiple melodic lines structure
Single or Multiple melodic lines structure
dhanjurrannsibayan2
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
Poh-Sun Goh
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
agholdier
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Nguyen Thanh Tu Collection
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
Mebane Rash
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
Dr. Ravikiran H M Gowda
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
Nirmal Dwivedi
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
Association for Project Management
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
Celine George
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
Sherif Taha
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
MaryamAhmad92
Último
(20)
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Spatium Project Simulation student brief
Spatium Project Simulation student brief
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Single or Multiple melodic lines structure
Single or Multiple melodic lines structure
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
Biometrics - Basics
1.
Franck Franchin 1
2.
Franck Franchin -
© 2013 Automated process to identity and authenticate humans based on one or more physical or behavioral traits Based on assessment that each human being is unique and that this uniqueness allows identification 2
3.
Franck Franchin -
© 2013 You have to prove who you are ? ◦ Something you know: PIN, password... ◦ Something you have: key, token, card... ◦ Something you are: a biometric… Biometrics encompass: ◦ Voice ◦ Fingerprint & Palmprint ◦ Facial Recognition ◦ Eye (iris, retinal patterns) ◦ Vein Because it can be fooled, it should be implemented into 2-factor or 3-factor authentication 3
4.
Franck Franchin -
© 2013 Unique ID Third Authentication Factor Hard to forge by basic hackers Forget, Loss, Stealth and Borrow most difficult… Allows to know WHO did WHAT, WHERE and WHEN Unequivocally link to acting person (accountability) 4
5.
Franck Franchin -
© 2013 Success Rate Issue (dirt for finger, diabete for eye, flu for voice) Privacy Revocation Cost Permanence risk (resistance to ageing) Acceptability by people 5
6.
Franck Franchin -
© 2013 Physiological ◦ fingerprint recognition ◦ palm print recognition ◦ palm geometry ◦ facial recognition ◦ voice recognition ◦ retinal scans ◦ iris scans Behavorial ◦ typing rhythm/patterns (keystroke) ◦ accents and speaking rhythms ◦ gait (locomotion behavior) ◦ writing speed and pressure (signature matching) 6
7.
Franck Franchin -
© 2013 Not two fingerprints are alike High level of acceptance by people Template easily generated from minutiae points and/or ridges and/or valleys Different types of sensors : thermal, optical, capacitance, minutiae-based 7
8.
Franck Franchin -
© 2013 Ability of discriminating identical twins with same DNA Low level of acceptance by people Relatively expensive (processing power and storage) 8
9.
Franck Franchin -
© 2013 Police Immigration ATM School (library, lunch, …) Payment in Stores Site Access Control 9
10.
Franck Franchin -
© 2013 Enrollment ◦ Samples of the biometric are captured and processed ◦ Unique features of these samples are extracted and computed which generates a ‘template’ ◦ From this template, it’s not possible to go back to the original biometric Authentication or Identification ◦ The biometrics system captures the biometric of the ’live biometric’ and searches for a match against its database of templates Revocation 10
11.
Franck Franchin -
© 2013 Biometrics matching process is based on threshold detection - False acceptances/rejections Sensor tolerance Anonymation information loss (for some algorythms) Some people categories always rejected (twins, aged people) ? Attended or unattended system (fake/dead finger) ? 11
12.
Franck Franchin -
© 2013 Aside IT regular vulnerabilities and risks, biometrics solutions are sensitive to specific threats : ◦ Attack to the biometric sensor ◦ Spoofing (cutoff finger, gummy finger, photography of iris pattern) ◦ Mimicry (signature and voice) ◦ Eavesdropping or man-in-the middle between the sensor and the template repository ◦ Template insertion using compromise IT or admin ! 12
13.
Franck Franchin -
© 2013 How to protect the biometric template ? ◦ Hashing : template are protected, revokable and rewable ◦ But one has to prove it’s impossible to get back to the original key (one-way function cyphering) ◦ The best solution : public-key encryption which cyphers templates and deciphers only during access control ◦ Mix architectures involve session keys too (public-key and private key schemes) Innovative ways ◦ During the enrollment process, combining the biometric image with a digital key to create a secure block of data. Key can be then retrieved using the biometric ! (but the key is independent of the biometric, mathematically speaking !) 13
14.
Franck Franchin -
© 2013 Once compromise, a biometric trait wouldn’t be reused – hence if someone copy your finger, the only way to revoke your finger would be to cut it ? Hum… Physical biometric is different from store template ! If your password is lost or compromised, you have to change your password AND the password access control storage… In biometrics, you can’t change your ‘pwd’ (aka your biometric) but you can revoke the stored encrypted template 14