An Introduction to
BIOMETRICS
Agenda
•
Introduction
To
Biometrics
•
Definition
Of
Biometrics
•
Mode
Of
Biometrics
•
Type
Of
Biometrics
•
Fingerprint
Recognition
•
Application
How
Can
You
Prove
it
?
How Can I Know Who You Are ?
•
Token
----
What
the
individual
has
An
Identification
Card,
Badge,
Magnetic
Strip
Card
Identifying Individuals
There
are
three
common
ways
of
identifying
an
individual's
identity
•
Secret/Knowledge
----
What
the
individual
Knows/Owns
A
Password
or
Personal
Identification
Number
(PIN)
•
Biometrics
----
What
the
individual
is
or
does
Biometrics …….. The Definition
“The
Automated
reorganization
of
individuals
based
on
their
behavioral
and
Biological
characteristics
.
”
The
term
“
Biometrics”
is
derived
from
the
Greek
words
B
io
(
Means
‘L
ife
’
)
and
M
etric
(means
‘
T
o
M
easure’
)
Biometrics …….. The Truth
•
Universal
:
Each
person
should
have
the
specific
Biometric
character
.
•
Unique
(Just
Distinguishable)
:
Any
two
people
should
be
sufficiently
different
in
terms
of
the
characteristics
.
•
Collectible
:
Biometric
characters
must
be
obtainable
.
•
Permanent
:
Characters
remain
invariable
over
time,
allowing
for
repeatable
measures
.
How It Works
Type Of Biometrics
•
Biological
Face
Finger
Hand
Iris
Vein
Retina
Imaging
Ear
Odor
•
Behavioral
Signature
Keystroke
Voice
Gait
SECURITY AT
YOUR
FINGERTIP
Fingerprint Recognition
Fingerprint
recognition
is
a
Biometric
technique
which
use
different
characteristics
of
a
person’s
fingerprint
.
The
use
of
fingerprints
as
a
means
of
identification
were
first
used
by
the
Chinese
in
500
B
.
C
.
Details About Fingerprint
Tool Used
Finger
Token
is
essentially
a
personal
password
storage
tool
with
all
the
capabilities
required
for
fingerprint
authentication
—
scanning
fingerprints,
storing
fingerprint
reference
data,
and
matching
the
verification
.
Digital Fingerprint
Any
image
data
can
be
converted
into
digital
information
with
the
combination
of
“
0
”
and
“
1
”
.
In
this
case,
even
though
we
convert
a
fingerprint
into
digital
data,
the
property
of
uniqueness
of
a
fingerprint
is
still
valid
.
00011101101010000111101
0
1
1
0
0
1
1
< Conversion without loss>
>
Eg
.
The
second
row
of
binary
fingerprint
is
created
by
taking
every
third
bit
of
the
first
row
of
full
conversion
of
original
fingerprint
.
Therefore
a
fingerprint
can
be
converted
into
unlimited
number
of
new
digital
fingerprint
.
<
Conversion
with
allowing
loss
>
Fig..Conversion of fingerprint to Binary data
Pattern Matching
Have
a
digitalized
target
data
&
digitalize
the
fingerprint
;
now
we
should
enter
pattern
-
mapping
phase
To
map
the
pattern
of
the
fingerprint
into
the
data,
we
use
a
brute
-
force
matching
between
the
fingerprint
and
the
data
.
Starting
from
the
first
bit
of
fingerprint,
step
by
step
find
the
maximum
length
of
bits
of
fingerprint
that
is
matching
with
the
content
bits
of
the
data
.
Eg
.
For
eg
:
there
are
two
sequence
of
binary
information
one
is
for
fingerprint
and
other
for
data
.
Overall Process
Fingerprint
Scanning
Extract
Fingerprint
1 0 0 1
1 1 1 1
0 0 0 1
1 1 0 1
01010101
01110110
01110100
01010111
Create Data
0101010
0111011
0111010
0101011
Mapping
0100110
0111011
0001010
0101011
010101
011101
011101
010101
Distribution
to other users
Mapping+Fingerprint
Pattern
1 0 0 1
1 1 1 1
0 0 0 1
1 1 0 1
Pattern
Encoding
Applications
Forensics
Information system/computer network security
Electronic commerce and electronic banking
Fingerprint
-
based national ID systems
Fingerprint
-
based voter and driver registration
Others
Face Recognition
Based
on
location
and
shape
of
facial
attributes
such
as
the
eyes,
eyebrows,
nose,
lips
and
chin,
as
well
as
their
relationship
to
each
other
Hand Recognition
Based on measurements of the hand
Iris Recognition
Iris
is
the
area
between
the
pupil
and
the
sclera
.
Iris
carries
very
distinctive
information
.
1
in
(
10
)
78
–
chance
of
someone
having
an
identical
iris
as
you
.
Others
Vein Recognition
•
Finger based
•
Top of hand based
•
Palm
Keystroke Recognition
How an individual types on a keyboard
Keystroke press time
Keystroke latency time
Voice Recognition
•
Text
dependent
Voice
recognition
system
is
based
on
utterances
of
a
fixed
pre
-
determined
phrase
•
Text
independent
Voice
recognition
system
recognizes
the
speaker
independent
of
what
they
say
Pros & Cons
•
Pros
:
The
uniqueness
of
biometric
attributes
No
question
of
forgetting
passwords
More
difficult
to
replicate
a
biometric
feature
at
the
data
acquisition
stage
•
Cons
Still
very
expensive
The
hardware
and
software
must
be
integrated
properly
System
may
not
recognize
a
valid
user
Biometric
authentication
gives
a
likelihood
of
a
match
Fusion
When more than one biometric is combined,
fusion occurs.
Multi
-
modal
Conclusion
Most security breaches are due to weak
authentication…….
Is Biometrics the answer ?
Thank you
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Commentaires 0
Connectez-vous pour poster un commentaire