SlideShare una empresa de Scribd logo
1 de 35
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Subtopics
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
‘Biometrics’
Relation between BIOMETRICS and
COMPUTERS
• Authentication
• Make the work easier, faster
• Managing accounts and users with ease
Types based on characteristics
1. Physiological characteristics :
 Finger-Print
 Face recognition
 DNA
 Palm Print
 hand geometry
 Iris recognition
 odour/scent
2. Behavioural characteristics :
 Typing rhythm
 Gait
 Voice
Parameters
A.K. Bolle, R. Pankanti eds. (1999). Biometrics:
Personal Identification in Networked Society.
Kluwer Academic Publications
• Universality
• Uniqueness
• Permanence
• Measurability
• Performance
• Acceptability
• Circumvention
How Templates are Generated???
Applications
• Industries, Offices
• Schools, Colleges, Classes
• Smart cards, Passports, License
• Residential security (Door locks etc.)
• Gun safe
• Cell phones
Attendance systems
Security purpose
Future
Value Chain Market Sizing 2013-2017
($m USD X 10000)
0
1
2
3
4
5
6
2013 2014 2015 2016 2017
Biometrics Core
Technology
Technical Integrated
solution
Application/point solution
•Apple takes a Giant Leap in Future
“Biometrics”
•Intel's McAfee brings biometric authentication to cloud
storage
Companies in race for Biometrics
Conclusion
Biometrics is the safest and easiest way
for authentication and security. It has
its advantages as well as disadvantages
but finally it’s the newest and smartest
solution to security problems…
Questions???
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Summary
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
Subtopics
• Brief introduction
• Major contributor
• Methods:
1) On basic level
2) On professional level
• Major Issues
• Conclusion
The 6th Day
•Science Fiction Action Thriller Movie
•Directed by Roger Spottiswoode
•Starring Arnold Schwarzenegger
iPhone 5S fingerprint sensor hacked
by Germany's Chaos Computer Club
Chaos Computer Club (CCC)
Europe's largest association of hackers.
Major Contributor
• Prof. Tsutomu Matsumoto
• “gummy finger” concept:
1)Direct experiment
2)Professional level
Required Material
Freeplastic used for finger print mold
Gelatin sheet used for gummy
finger
Creation of fingerprint mold
Creation of gummy finger
Professional Level
Creation of gummy finger from latent
fingerprint mold
Hacking from the another
point of view
• In another test of biometric security, an Australian National
University student was able to hack through the device
using the information stored within the system itself.
• Chris Hill worked on discovering the way the system stored
the template information and then created images that had
enough similar “features” of the desired fingerprint to trick
the device.
• He said, “Really all I had to do was crack the code of the
template, so the images I created that were accepted by
the security system did not even look like thumbprints they
just displayed the characteristics required by the computer
program.”
Major Issues
• Other issues needing discussion are: What
happens when the part of the body getting
validated is somehow damaged, such as a
finger getting badly burned or deeply cut Or if
someone does manage to create a fake
fingerprint from your finger, how is that issue
resolved, since a finger can’t be easily
changed like a password can?
CONCLUSION
Biometric devices have flaws, but so does every
other security hardware and software solution.
Biometric security measures offer such a strong
level of security, that they cannot be thrown out
or ignored simply because a few flaws have been
discovered. They need to be incorporated into an
organization’s already strong defence in depth.
Biometrics, especially in conjunction with
passwords or passcards, offers the level of
security that we need at this stage in the
development of information security…
Biometrics and its hacking
Biometrics and its hacking

Más contenido relacionado

La actualidad más candente

Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
PROJECT POWERPOINT
PROJECT POWERPOINTPROJECT POWERPOINT
PROJECT POWERPOINT
Simon Chege
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
parmsidhu
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 

La actualidad más candente (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
biometrics
biometricsbiometrics
biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Cover page
Cover pageCover page
Cover page
 
PROJECT POWERPOINT
PROJECT POWERPOINTPROJECT POWERPOINT
PROJECT POWERPOINT
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Final report
Final reportFinal report
Final report
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 

Destacado

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Emanuela Marasco
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
Pratish Sardar
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 

Destacado (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric
Biometric Biometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 

Similar a Biometrics and its hacking

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
CSCJournals
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 

Similar a Biometrics and its hacking (20)

Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Seetu
SeetuSeetu
Seetu
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometrics
BiometricsBiometrics
Biometrics
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric technology 2023 report.pdf
Biometric technology 2023 report.pdfBiometric technology 2023 report.pdf
Biometric technology 2023 report.pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 

Último

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Último (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Biometrics and its hacking

  • 1. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 2. Subtopics • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 4. Relation between BIOMETRICS and COMPUTERS • Authentication • Make the work easier, faster • Managing accounts and users with ease
  • 5. Types based on characteristics 1. Physiological characteristics :  Finger-Print  Face recognition  DNA  Palm Print  hand geometry  Iris recognition  odour/scent 2. Behavioural characteristics :  Typing rhythm  Gait  Voice
  • 6. Parameters A.K. Bolle, R. Pankanti eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications • Universality • Uniqueness • Permanence • Measurability • Performance • Acceptability • Circumvention
  • 7.
  • 8. How Templates are Generated???
  • 9. Applications • Industries, Offices • Schools, Colleges, Classes • Smart cards, Passports, License • Residential security (Door locks etc.) • Gun safe • Cell phones
  • 13.
  • 14. Value Chain Market Sizing 2013-2017 ($m USD X 10000) 0 1 2 3 4 5 6 2013 2014 2015 2016 2017 Biometrics Core Technology Technical Integrated solution Application/point solution
  • 15. •Apple takes a Giant Leap in Future “Biometrics” •Intel's McAfee brings biometric authentication to cloud storage
  • 16. Companies in race for Biometrics
  • 17. Conclusion Biometrics is the safest and easiest way for authentication and security. It has its advantages as well as disadvantages but finally it’s the newest and smartest solution to security problems…
  • 19.
  • 20. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 21. Summary • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 22. Subtopics • Brief introduction • Major contributor • Methods: 1) On basic level 2) On professional level • Major Issues • Conclusion
  • 23. The 6th Day •Science Fiction Action Thriller Movie •Directed by Roger Spottiswoode •Starring Arnold Schwarzenegger
  • 24. iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club Chaos Computer Club (CCC) Europe's largest association of hackers.
  • 25. Major Contributor • Prof. Tsutomu Matsumoto • “gummy finger” concept: 1)Direct experiment 2)Professional level
  • 26. Required Material Freeplastic used for finger print mold Gelatin sheet used for gummy finger
  • 30. Creation of gummy finger from latent fingerprint mold
  • 31. Hacking from the another point of view • In another test of biometric security, an Australian National University student was able to hack through the device using the information stored within the system itself. • Chris Hill worked on discovering the way the system stored the template information and then created images that had enough similar “features” of the desired fingerprint to trick the device. • He said, “Really all I had to do was crack the code of the template, so the images I created that were accepted by the security system did not even look like thumbprints they just displayed the characteristics required by the computer program.”
  • 32. Major Issues • Other issues needing discussion are: What happens when the part of the body getting validated is somehow damaged, such as a finger getting badly burned or deeply cut Or if someone does manage to create a fake fingerprint from your finger, how is that issue resolved, since a finger can’t be easily changed like a password can?
  • 33. CONCLUSION Biometric devices have flaws, but so does every other security hardware and software solution. Biometric security measures offer such a strong level of security, that they cannot be thrown out or ignored simply because a few flaws have been discovered. They need to be incorporated into an organization’s already strong defence in depth. Biometrics, especially in conjunction with passwords or passcards, offers the level of security that we need at this stage in the development of information security…