SlideShare una empresa de Scribd logo
1 de 24
Biometrics Sensors


Submitted by:- Sukhdeep Singh Sidhu
         Roll No. :- 115363
         Branch:- CSE N2
   Authentication – the process of verifying that a
    user requesting a network resource is who he,
    she, or it claims to be, and vice versa.

   Conventional authentication methods
    › „something that you have“ – key, magnetic card or
      smartcard
    › „something that you know“ – PIN or password

   Biometric authentication uses personal features
    › „something that you are“
Contents
   Application domains for biometric products

   Biometric products
       Fingerprint recognition
       Face recognition
       Iris recognition
       Retinal recognition
       Hand geometry measurement
       Dynamic signature verification

   How good are biometric products today?

   Conclusions
   Access control
    › to devices
        cellular phones
        logging into a computer, laptop, or PDA
        cars
        guns
    › to local services
        debitting money from a cash dispenser
        logging in to computer
        accessing data on smartcard
    › to remote services
        e-commerce
        e-business
   Physical access control
    › to high security areas
    › to public buildings or areas
 Time & attendance control
 Identification
    › forensic person investigation
    › social services applications, e.g. immigration or
      prevention of welfare fraud
    › personal documents, e.g. electronic drivers
      license or ID card
   Sensors
    › optical sensors
    › ultrasound sensors
    › chip-based sensors
    › thermal sensors
   Integrated products
    › for identification – AFIS systems
    › for verification
Electro-optical sensor
                                   [DELSY® CMOS sensor modul]


   Optical fingerprint sensor
[Fingerprint Identification Unit
     FIU-001/500 by Sony]




                                          Capacitive sensor
                                      [FingerTIP™ by Infineon]
Thermal sensor
                            [FingerChip™ by ATMEL
                              (was: Thomson CSF)]

      E-Field Sensor
[FingerLoc™ by Authentec]
[BioMouse™ Plus by American Biometric Company]




Physical Access Control System
 [BioGate Tower by Bergdata]                  [ID Mouse by Siemens]
Keyboard [G 81-12000
                                             by Cherry]




                                      System including
[TravelMate 740 by Compaq und Acer]   fingerprint sensor,
                                      smartcard reader and
                                      display by DELSY
Face recognition system
[TrueFace Engine by Miros]


                                           Face recognition system
                      [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r




S y s t e m f o r a c t iv e ir is
r e c o g n it io n b y Ir is S c a n
Retinal recognition system [Icam 2001 by Eyedentify]
Hand geometry reader by Recognition Systems


        Hand geometry reader for
two finger recognition by BioMet Partners
Electronic pen [LCI-SmartPen]
Digitising tablet by   Digitising tablet [Hesy Signature Pad
Wacom Technologies       by BS Biometric Systems GmbH]
   Combination of biometric technologies
    › Fingerprint and face recognition
    › Face recognition and lip movement
    › Fingerprint recognition and dynamic signature
     verification



 increase the level of security achieved by
  the system
 enlarge the user base
   depends on the application
     reliability
     security
     performance
     cost
     user acceptance
     life detection
     users that are unsuitable
     size of sensor
   How can we find out, how good a biometric
    product is?
    › Empirical tests of the product
   In the past year, there were two
    independent test series of biometric products
    › in Japan
    › in Germany
1.   Regular biometric sensor
     using artificially generated
     biometric data

3.   Replay attack of
     eavesdropped biometric
     data

5.   Manipulation of stored
     biometric reference data
 Tsutomu Matsumoto, a Japanese
  cryptographer working at Yokohama
  National University
 11 state-of-the-art fingerprint sensors
 2 different processes to make gummy fingers
    › from live finger
    › from latent fingerprint

 Gummy       fingers fooled fingerprint sensors 80%
    of the time
 Computer magazine c’t
 11 biometric sensors
    › 9 fingerprint sensors,
    › 1 face recognition system, and
    › 1 iris scanner
   Fingerprint sensors –
    › reactivate latent fingerprints (optical and capacitive
      sensors)
    › apply latex finger (thermal sensor)
   Face recognition system –
    › down- (up-) load biometric reference data from (to) hard
      disk
    › no or only weak life detection
   Iris recognition –
    › picture of iris of enrolled person with cut-out
      pupil, where a real pupil is displayed


 All tested biometric systems could be fooled,
    but the effort differed considerably
   Biometric technology has great potential
   There are many biometric products around,
    regarding the different biometric technologies
   Shortcomings of biometric systems due to
    › manufacturers ignorance of security concerns
    › lack of quality control
    › standardisation problems

   Biometric technology is very promising
   Manufacturers have to take security concerns
    serious

Más contenido relacionado

La actualidad más candente

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

La actualidad más candente (20)

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 

Destacado

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 

Destacado (19)

BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Nano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileNano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf file
 
Retina scan
Retina scanRetina scan
Retina scan
 
10 nanosensors
10 nanosensors10 nanosensors
10 nanosensors
 
optical nanosensors
optical nanosensorsoptical nanosensors
optical nanosensors
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and Innovations
 
Smart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSmart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta Bhattacharyya
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareBio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Nanosensors basics, design and applications
Nanosensors basics, design and applicationsNanosensors basics, design and applications
Nanosensors basics, design and applications
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
7 nanosensors
7 nanosensors7 nanosensors
7 nanosensors
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
Modern irrigation techniques
Modern irrigation techniquesModern irrigation techniques
Modern irrigation techniques
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 

Similar a Biometric Sensors

Similar a Biometric Sensors (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 

Más de parmsidhu (6)

open source technology
open source technologyopen source technology
open source technology
 
C++ Introduction
C++ IntroductionC++ Introduction
C++ Introduction
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Parm
ParmParm
Parm
 
Parm
ParmParm
Parm
 

Último

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Último (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Biometric Sensors

  • 1. Biometrics Sensors Submitted by:- Sukhdeep Singh Sidhu Roll No. :- 115363 Branch:- CSE N2
  • 2. Authentication – the process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa.  Conventional authentication methods › „something that you have“ – key, magnetic card or smartcard › „something that you know“ – PIN or password  Biometric authentication uses personal features › „something that you are“
  • 3. Contents  Application domains for biometric products  Biometric products  Fingerprint recognition  Face recognition  Iris recognition  Retinal recognition  Hand geometry measurement  Dynamic signature verification  How good are biometric products today?  Conclusions
  • 4. Access control › to devices  cellular phones  logging into a computer, laptop, or PDA  cars  guns › to local services  debitting money from a cash dispenser  logging in to computer  accessing data on smartcard › to remote services  e-commerce  e-business
  • 5. Physical access control › to high security areas › to public buildings or areas  Time & attendance control  Identification › forensic person investigation › social services applications, e.g. immigration or prevention of welfare fraud › personal documents, e.g. electronic drivers license or ID card
  • 6. Sensors › optical sensors › ultrasound sensors › chip-based sensors › thermal sensors  Integrated products › for identification – AFIS systems › for verification
  • 7. Electro-optical sensor [DELSY® CMOS sensor modul] Optical fingerprint sensor [Fingerprint Identification Unit FIU-001/500 by Sony] Capacitive sensor [FingerTIP™ by Infineon]
  • 8. Thermal sensor [FingerChip™ by ATMEL (was: Thomson CSF)] E-Field Sensor [FingerLoc™ by Authentec]
  • 9. [BioMouse™ Plus by American Biometric Company] Physical Access Control System [BioGate Tower by Bergdata] [ID Mouse by Siemens]
  • 10. Keyboard [G 81-12000 by Cherry] System including [TravelMate 740 by Compaq und Acer] fingerprint sensor, smartcard reader and display by DELSY
  • 11. Face recognition system [TrueFace Engine by Miros] Face recognition system [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
  • 12. S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r S y s t e m f o r a c t iv e ir is r e c o g n it io n b y Ir is S c a n
  • 13. Retinal recognition system [Icam 2001 by Eyedentify]
  • 14. Hand geometry reader by Recognition Systems Hand geometry reader for two finger recognition by BioMet Partners
  • 16. Digitising tablet by Digitising tablet [Hesy Signature Pad Wacom Technologies by BS Biometric Systems GmbH]
  • 17. Combination of biometric technologies › Fingerprint and face recognition › Face recognition and lip movement › Fingerprint recognition and dynamic signature verification  increase the level of security achieved by the system  enlarge the user base
  • 18. depends on the application  reliability  security  performance  cost  user acceptance  life detection  users that are unsuitable  size of sensor
  • 19. How can we find out, how good a biometric product is? › Empirical tests of the product  In the past year, there were two independent test series of biometric products › in Japan › in Germany
  • 20. 1. Regular biometric sensor using artificially generated biometric data 3. Replay attack of eavesdropped biometric data 5. Manipulation of stored biometric reference data
  • 21.  Tsutomu Matsumoto, a Japanese cryptographer working at Yokohama National University  11 state-of-the-art fingerprint sensors  2 different processes to make gummy fingers › from live finger › from latent fingerprint  Gummy fingers fooled fingerprint sensors 80% of the time
  • 22.  Computer magazine c’t  11 biometric sensors › 9 fingerprint sensors, › 1 face recognition system, and › 1 iris scanner  Fingerprint sensors – › reactivate latent fingerprints (optical and capacitive sensors) › apply latex finger (thermal sensor)  Face recognition system – › down- (up-) load biometric reference data from (to) hard disk › no or only weak life detection
  • 23. Iris recognition – › picture of iris of enrolled person with cut-out pupil, where a real pupil is displayed  All tested biometric systems could be fooled, but the effort differed considerably
  • 24. Biometric technology has great potential  There are many biometric products around, regarding the different biometric technologies  Shortcomings of biometric systems due to › manufacturers ignorance of security concerns › lack of quality control › standardisation problems  Biometric technology is very promising  Manufacturers have to take security concerns serious

Notas del editor

  1. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  2. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  3. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  4. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 PDA = Personal Digital Assistant
  5. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 For example, a system for physical access control has been used at the Olympic Games in Atlanta. fingerprint recognition has been used in forensic applications since early 20 th century. ID cards based on fingerprint recognition are used in Brunei.
  6. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 AFIS = Automated Fingerprint Identification System
  7. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors by DELSY and Infineon are chip-based. A picture of an ultrasound fingerprint sensor [by UltraScan] was not available.
  8. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensor by Authentec is chip-based.
  9. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 BioMouse ™ Plus: integrated smartcard reader and fingerprint sensor ID Mouse: mouse with fingerprint sensor
  10. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Cherry keyboard: with integrated smartcard reader and fingerprint sensor
  11. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Sensors are standard off-the-shelf cameras. Therefore, the price of a face recognition system is determined solely by the software. This makes face recognition quite cost effective. TrueFace Engine: feedback for focussing the face on PC monitor One-to-One ™: feedback for focussing the face using mirrored camera
  12. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 IrisScan: In an active system, the user has to focus the iris into the corresponding frame (displayed on the computer monitor) him/herself. Sensar: In a passive system, the sensor focusses the biometric feature itself.
  13. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 To our knowledge, there is only one manufacturer of retinal recognition systems.
  14. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Hand geometry reading has been used at the Olympic Games in Atlanta to monitor access to the Olympic village.
  15. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The pen measures pressure and tilt.
  16. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors are incorporated into the tablet.
  17. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 „ increase the level of security achieved by the system“ by using two or more biometric methods in conjunction. „ enlarge the user base“ by giving the user an alternative.
  18. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Reliability: Some sensors are more vulnerable than others. Security: The error rates of different biometric technologies vary a lot. For example, iris recognition systems have an error rate in the order of 1 in 1 million users, fingerprint recognition systems have an error rate in the order of 1 in 1000 to 1 in 10000 and speaker recognition systems or dynamic signature verification systems have an error rate in the order of 1 in 100. Cost: Some biometric methods do not require specific sensor technology, for example speaker recognition, face recognition and keystroke dynamics, whereas other require sophisticated sensor technology. Hence, the costs vary a lot. User acceptance: For example, retinal recognition systems have a very low user acceptance, whereas others, like dynamic signature verification, face recognition, and speaker recognition are widely accepted. Life detection: Life detection is a very important feature of any biometric system. There are biometric technologies where life detection is not satisfactory (e.g. speaker recognition). Users that are unsuitable: For every biometric technology, there is a small ratio of users for whom the biometric method does not work, e.g. fingerprint recognition cannot be used when a person has lost both arms. Size of sensor: Fingerprint sensors are very small and can be incorporated even into small devices. Hand geometry readers, on the other, would not be suitable for e.g. mobile applications.
  19. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 [ http://www.itu.int/itudoc/itu-t/workshop/security/present/s5p4.pdf ] [Mat02] Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002.
  20. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Face recognition system (biometric data unprotected on hard disk) – Biometric reference data downloaded onto laptop and displayed on screen. The face recognition system accepts the displayed picture. Attacker creates new biometric reference data and loads it into the face recognition database. The face recognition system accepts the attacker as legitimate user. Fingerprint recognition – Breathe onto sensor or apply water-filled plastic bag or apply graphite powder and a piece of tape to reactivate latent fingerprints (for capacitive sensors) Use graphite powder technique plus bright light to reactivate latent fingerprints (for optical fingerprint sensors) Use latex finger (for thermal sensors)
  21. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Links and documents: Scheuermann, D., Schwiderski-Grosche, S. und Struif, B., Usability of Biometrics in Relation to Electronic Signatures , EU Studie 502533/8, http://www.sit.fraunhofer.de/cgi-bin/sit-frame/sica?link=/SICA/projects/bio_sig.html. Jain, A., Bolle, R. und Pankanti, S., Biometrics: Personal Identification in Networked Society , Kluwer Academic Publishers, 1999. International Biometric Group: http:// www.biometricgroup.com The Biometric Consortium: http://www.biometrics.org/ Association for Biometrics: http://www.afb.org.uk/ BioAPI Consortium: http://www.bioapi.org/ International Biometric Industry Association: http://www.ibia.org/