Biometric Authentication - courses

utterlypanoramicΑσφάλεια

30 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

71 εμφανίσεις

Biometrics

1

Basics Warnings Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics

2

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security

Biometric Authentication:


technologies that measure and analyze
human
physical

and
behavioral
characteristics for authentication purposes.

Biometrics

3

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security

Biometric Authentication:


technologies that measure and analyze
human
physical

and
behavioral
characteristics for authentication purposes.

fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

4

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

5

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

6

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

7

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

8

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

9

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

10

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

11

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

12

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


Biometric authentication has been around
since the beginning of human interaction.


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

13

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

14

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

15

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Biometrics

16

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

lossy image compression

Biometrics

17

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

lossy image compression

100101010110010001010101…

Biometrics

18

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Connecticut DMV

Biometrics

19

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Connecticut DMV

Biometrics

20

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Disney World

Biometrics

21

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Disney World

=

?

Biometrics

22

Basics

Warnings Fingerprint Example

6.857


6.857, Computer & Network Security


But databases make it interesting…


fingerprints

retinas

irises

facial patterns

hand measurements

signature

gait

typing patterns

voice

photo

Disney World

=

?

Biometrics

23

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics

24

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!

Biometrics

25

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!

You brazenly trot your face,
eyes, hands, fingerprints, gait,
and signature out in public on a
daily basis.



(unless you are a hermit)

Biometrics

26

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!


Remote system where I mail a photo and get password


Biometrics

27

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!


Remote system where I mail a photo and get password


Thumbprint scanner to grant me remote access



Biometrics

28

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!


Remote system where I mail a photo and get password


Thumbprint scanner to grant me remote access


Faxing a signed consent form to tell me password over phone



Biometrics

29

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are not secret keys!


Remote system where I mail a photo and get password


Thumbprint scanner to grant me remote access


Faxing a signed consent form to tell me password over phone


Problem with Connecticut DMV

Biometrics

30

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are UIDs

Biometrics

31

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are UIDs

Very useful with trusted path from
subject

to verifier…


Biometrics

32

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are UIDs

Very useful with trusted path from
subject

to verifier…


requires (probably) human observation…


Biometrics

33

Basics
Warnings

Fingerprint Example

6.857


6.857, Computer & Network Security

Biometrics are UIDs

Very useful with trusted path from
subject

to verifier…


requires (probably) human observation…


no longer very automated.
Oh well.


Biometrics

34

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

Case Study:

Fingerprint Authentication

Biometrics

35

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

Biometrics

36

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

Biometrics

37

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

optical

Biometrics

38

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

capacitive

Biometrics

39

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

ultrasonic

Biometrics

40

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

“Live and Well” Sanity Check

Biometrics

41

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

Biometrics

42

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

Pattern matching


* Keep (oriented) image

Biometrics

43

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

Minutia vectors


or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

Biometrics

44

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

Minutia vectors


or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

bifurcation

ridge ending

short ridge

Biometrics

45

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

compare

Biometrics

46

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

compare

Pattern matching


Biometrics

47

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

compare

Vector comparison

* e.g., 7
-
20 out of 10
-
100


are
close.


(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

Biometrics

48

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

compare

result

Biometrics

49

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

capture

feature extraction

or

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)

(type, x, y,
θ
, W)



(type, x, y,
θ
, W)

Enrollment

Biometrics

50

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

Risk Analysis

(from Matsumoto Paper)



Registered finger (at gunpoint)



Use an un
-
registered finger



Severed registered finger



Genetic Clone of registered finger



Artificial clone of registered finger



Other stuff (hack the software, blind the sensor,


walk in behind someone else, kick in the door…)

Biometrics

51

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

Risk Analysis

(from Matsumoto Paper)



Registered finger (at gunpoint)



Use an un
-
registered finger



Severed registered finger



Genetic Clone of registered finger



Artificial clone of registered finger



Other stuff (hack the software, blind the sensor,


walk in behind someone else, kick in the door…)

Biometrics

52

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

Risk Analysis

(from Matsumoto Paper)



Registered finger (at gunpoint)



Use an un
-
registered finger



Severed registered finger



Genetic Clone of registered finger



Artificial clone of registered finger


T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino,

Impact of Artificial ‘Gummy’ Finders on Fingerprint
Systems
.” Proceedings of SPIE Vol. #4677, Optical
Security and Counterfeit Deterrence Techniques IV.

Biometrics

53

Basics Warnings
Fingerprint Example


6.857


6.857, Computer & Network Security

T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino,

Impact of Artificial ‘Gummy’ Finders on Fingerprint
Systems
.” Proceedings of SPIE Vol. #4677, Optical
Security and Counterfeit Deterrence Techniques IV.

Slides from Matsumoto talk showing the construction

of a ‘gummy finger’…

Biometrics

54

Basics Warnings Fingerprint Example

6.857


6.857, Computer & Network Security



Conclusion

Biometrics

55

Basics Warnings Fingerprint Example

6.857


6.857, Computer & Network Security



Conclusion

Trade convenience of use for complexity of safety analysis.

Biometrics

56

Basics Warnings Fingerprint Example

6.857


6.857, Computer & Network Security



Conclusion

Trade convenience of use for complexity of safety analysis.

Hard to remember a secret random sequence of 20
digits…but easy to analyze its security.

Biometrics

57

Basics Warnings Fingerprint Example

6.857


6.857, Computer & Network Security



Conclusion

Trade convenience of use for complexity of safety analysis.

Hard to remember a secret random sequence of 20
digits…but easy to analyze its security.


Easy to stick your finger on a scanner and have it
extract 20 digits worth of information…but hard to
analyze its security.