Você está na página 1de 37

Biometrics:

“A More Secure World”

By:
Ashok Patro
1PI00TE011
What is Biometrics?
• Biometrics (“Bio” stands for life
and “metric” is to measure)

• Biometrics are automated


methods of identifying a person
or verifying the identity of a
person based on physiological or
behavioral characteristics.
Major Purposes
Biometric scanning is used for two major
purposes:

• Identification - “Do I know who you are?”


• Authentication: “Are you who you claim to
be?”
Biometric Technologies
• Fingerprint
• Iris
• Retina
• Facial Imaging
• Facial Thermal grams
• Hand Geometry
• Voice
• Signature
• Keystroke
Biometric Classifications:

• Physical vs. Behavioral Biometrics

• Interactive vs. Passive Biometrics


Physical Biometrics
• Physical: these
characteristics are
those that measure
parts of the physical
body such as hand
geometry, and
fingerprints.
Behavioral Biometrics
• Behavioral: these
techniques include
voice recognition,
keyboard applications,
and signature analysis.
These characteristics
can change with more
often and can be
dependant on mood.
Interactive Biometrics
Interactive:
• Requires that the user
actively participate
with the technology.
• Often required by
today’s technological
standards.
Passive Biometrics
Passive:
• Has the ability to
monitor individuals
without their
involvement.
• Type of identification
that is often referred to
as “Big Brother”.
How Biometrics Work
• Enrollment
• Capture and store the
biometric
• Compare stored
biometric with live
biometric
– Authentication and
identification
Fingerprint Scan
•The most widely-used biometric technology.

•Measures the unique, complex swirls on a person's


fingertip. The swirls are characterized and produced as a
template requiring from 250-1,000 bytes.

What is stored is not a full fingerprint, but a small amount


of data derived from the fingerprint's unique patterns.

Although more accurate technologies exist, finger-scan is


still considered highly accurate.
Fingerprint Scan
Two types of finger scan:

• Optical Scan – Uses CCD(charger coupled device)


i.e. an arra of light sensitive diodes – photosites.

• Capacitance Scan – Made up of semicondutor


chips containing tin cells acting as capacitors.
(more compact than optical scan)
Fingerprint Scan

Capacitance Scanning
Fingerprints

• Pros
– Relatively mature technology
– Multiple samples (10 fingers) increase accuracy
– Existing law enforcement databases
– Suitable for large-database identification
• Cons
– Scan quality is highly variable
– 1-3% of public do not have suitable fingerprints
– Public perception of criminality, privacy sensitivity
– Susceptible to spoofing
Facial Scan
• A method called “feature analysis” tracks about 80 facial
characteristics.

• Essentially, the technology measures the peaks and valleys


of the face, such as the tip of the nose and the depth of the
eye sockets , which are known as nodal points – the human
face has 80 nodal points, only 14 to 22 are needed for
recognition — concentrating on the inner region, which runs
from temple to temple and just over the lip. It then comes up
with a face print. A facial template requires ~1,300 bytes.
Facial Scan

Facial recognition software is designed to pinpoint a


face and measure its features
Facial Scan

Using facial recognition software, police can zoom in with


cameras and take a snapshot of a face.
Facial Scan

Many people who don't use


banks use check cashing
machines. Facial recognition
could eliminate possible
criminal activity.
Facial Recognition
• Pros
– Existing enrollment infrastructure
– Public acceptance
– Existing databases
• Cons
– Highly susceptible to aging factors and lighting
– Watchlist accuracy needs improvement
– Identification from a large database is not currently
possible
– High-quality acquisition is difficult for some (~1-3%)
individuals
Iris Scan
• The technology examines the unique patterns of the
iris, the ring around the pupil.
• Very complex.
• All iris recognition technology is based on research
and patents held by Dr. John Daugman of
Cambridge University.
• Iris scans are non-invasive. The person puts their
face in front of a camera which then analyzes all the
features.
• Even works with corrective lenses.
Iris Scan
• Highest accuracy of all the biometric technologies.

• Iris scanners read 266 different characteristics as


opposed to fingerprint scanners which read about 90.
The template used requires only 512 bytes.

• EyeTicket, a producer of iris technology, is


launching a program with Virgin Atlantic and British
Airways. Frequent fliers can choose to join the iris
program which will facilitate their passage from the
ticket counter through Heathrow's customs and
immigration.
Iris Scan
• Pros
– Highly stable biometric over time
– Probably suitable for large-database
identification
– Very low false accept rate
• Cons
– Immature technology, not sufficiently tested
– Specialized cameras with infrared
– Public concerns and unfamiliarity
– 1-3% of public do not have a suitable iris
– Proprietary issues
Hand Scan
• Hand scan, also known as hand geometry, is a biometric
authentication technology.

• Used for access control and time and attendance.

• The system maps key features of the topography of a


person's hand, measuring all the creases on the palm.
This is more expensive and considered less accurate than
other biometrics.

• Strength: requires only ~9 bytes to store template.


Weakness: bulky scanner, expensive, and it does not
compensate for injuries to hands.
Voice Scan
• Voice dynamics relies on the production of a "voice
template" that is used to compare with a spoken
phrase. A speaker must repeat a set phrase several
times as the system builds the template.

• This biometrics technique relies on the behavior of


the subject rather than the physical characteristics of
the voice and is considered prone to inaccuracy.

• Voice verification is used with passwords and PIN


numbers. A person must repeat the password and key
in numbers to gain access. The problem is that a
person's voice is susceptible to sickness, drugs and
emotions.
Retinal Scan
• Retinal scans examine the blood vessel patterns of
the retina, the nerve tissue lining the inside of the
eye that is sensitive to light.

• An infrared light source is used to illuminate the


retina of the eye. The image of the enhanced blood
vessel pattern of the retina is analyzed for
characteristic points.

• With the exception of some types of degenerative


eye diseases, or cases of severe head trauma, retinal
patterns are stable enough to be used throughout
one's life. 
Retinal Scan
• Along with iris recognition technology, retina scan
is perhaps the most accurate and reliable biometric
technology.

• It is also among the most difficult to use, and is


perceived as being moderately to highly intrusive.

• A retinal scan can produce almost the same


volume of data as a fingerprint image analysis.
Others
• Signature scan - analysis of characteristics in an
individuals signature. May soon help address the
very large demand for document authentication.

• Keystroke scan - analysis of an individual’s typing


pattern. Can be used along with passwords for a
very secure system.

• Body odor, skin pores, wrist/hand veins, DNA,


Shape of ear, Gait, etc…
Cost/benefit
• Iris recognition • Hand geometry
– High cost/high – Medium cost/difficult
accuracy for elderly to use
• Fingerprint • Voice recognition
– Least expensive/ high
– Low cost/long false rejection rates
application history
• Signature recognition
• Facial recognition – Medium cost/awkward
– Low cost/low accuracy when used with
E-document
User Acceptance
• Refers to how well the
end users accepts the
applied biometric
system.
• Generally, the less
intrusive the
biometrics, the more
readily it is accepted.
Use of Biometrics
• IATA (International Air Traffic Association) - “In
the new security environment, biometrics can
quickly identify the people who do not represent a
security risk.”
• Network security - Authentication, ATM, Internet
banking.
• Non-Network based security - Home use, content
control.
Use of Biometrics
• Sensitive environments, e.g. government
buildings, prisons
• Schools - Library cards, Computer access,
Enrollment.
• Businesses - Time and attendance.
• Law Enforcement - Casino Operations, Super
Bowl.
• Etc…., The uses are endless.
Fingerprint Scan
• At least four countries in California, including Los Angeles,
use fingerprint technology to reduce welfare fraud. Spain
uses it for its social security card — soon to be expanded for
use in handing out pension, unemployment and health
benefits.

• CANPASS, used by Canada customs, uses this technology


to ease the flow of goods between the U.S. And Canada.
Truck drivers have their fingerprints registered in order to
pass through borders smoothly.

• Its acceptance rate among users is exceptionally high.


Facial Scan
• Used in more than 100 casinos in the United States.

• Used by authorities at Super Bowl XXXV in Tampa to


search for felons among the crowd of 100,000 spectators.

• Another method is to use Eigenface, roughly translated as


"one's own face," a technology patented at MIT which
utilizes two dimensional, global grayscale images
representing distinctive characteristics of a facial image.
Variations of eigenface are frequently used as the basis of
other face recognition methods.
Hand Scan
• The U.S. Federal bureau of prisons uses hand
geometry to track movements of its prisoners, staff
and visitors within prisons. Once a person enters
the system, they must have their hand scanned.
The information is put in a database and the
person is issued a magnetic swipe card that they
carry at all times.

• Disney World uses hand scans to authenticate


season pass holders.
• Market dominated by Recognition Systems Inc
Back-up Planning
• Alternatives
– How do you
fingerprint an armless
person?
• Manual process
– What happens in the
event the system
crashes?
Conclusions
With a rough start, eventually people began to
understand that we need more security, what better
way than through the use of biometrics. In recent
years, the devices used have become more
advanced and their prices have dropped
drastically. With the onset of cheaper and more
efficient devices an increasing number of
businesses, government agencies, and schools are
starting to use them.
Questions?

Você também pode gostar