You are on page 1of 24

An overview of BIOMETRICS SECURITY TECHNOLOGY

ROLE OF BIOMETRICS IN SECURITY


TECHNOLOGY
TECHNICAL SEMINAR

Presented by
SOUMEN SARKAR

Under the guidance of


Mr. DEVANAND KONHAR

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

WHAT IS BIOMETRICS?
 These are automated methods of recognizing a
TECHNICAL SEMINAR

person based on its physiological characteristics.

These are foundation of an extensive array of


highly secure identification and personal verification
solutions.

Biometric security technologies are used to


accurately identify individuals on a unique trait.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

BIOMETRICS ROLE IN PERSONAL


IDENTIFICATION
 One of the most important ways that biometric
TECHNICAL SEMINAR

technology is impacting security lies within the confines of


computer information systems.

Biometric technology offers an alternative to the most


used system currently in place in most operations:
passwords or personal identification numbers (PIN).

Instead of users inputting their password or PIN, users


interact with a computer terminal that will scan their finger,
face, voice, retina, etc. to identify them
SOUMEN SARKAR CS200118347
An overview of BIOMETRICS SECURITY TECHNOLOGY

HOW BIOMETRICS WORKS ?


 Enrollmemt
TECHNICAL SEMINAR

Authenticate/Identify

Accuracy

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

TYPES OF BIOMETRICS
Fingerprint recognition.
TECHNICAL SEMINAR

Iris scanning.

Smart card security.

Face recognition.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

FINGERPRINT RECOGNITION
TECHNICAL SEMINAR

Fingerprint matching

Fingerprint classification

Fingerprint image Enhancement

Fingerprint recognition demonstration

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

FINGERPRINT RECOGNITION
ALGORITHM
TECHNICAL SEMINAR

 The Authentication Fingerprint is captured.


The user will be advised to accurately position
his finger on the device. The quality is
measured and only good images will be
accepted. Once an image is accepted, its
relevant information will be extracted and
stored into a database.

 The extraction of information starts with the


color reduction to black and white. Several
filters reduce the noise in the relevant image
areas without destroying required information.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

ALGORITHM CONT....
 Ridge width is reduced to one pixel
TECHNICAL SEMINAR

based on the image.A mask is


computed to be able to exclude noisy,
unsharp or blank areas from the
recognition process.

This mask is also used to determine


the overall image quality.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

ALGORITHM CONT....
TECHNICAL SEMINAR

Minutiae locations are extracted.


False Minutiae are rejected by the
quality mask (Step 3) Various Features
are extracted from each Minutia

Once taught in, the user may now


authenticate himself by putting the
finger on the device.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

ALGORITHM CONT....
 The so extracted data is compared to
the training data in the database. The
TECHNICAL SEMINAR

finger of the user has been shifted to the


right and was slightly rotated.
Corresponding minutiae data is
connected with a line in this illustration.
Dots are unmatched minutiae.
The user has been accepted.
 The extracted data is compared to the
training data in the database. There is
only lo correlation between some
minutiae. Additional matching criteria
checks fail.
The user has been rejected.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

IRIS SCANNING
Iris scans analyze the features that exist in the colored
tissue surrounding the pupil which has more than 200 points
TECHNICAL SEMINAR

that can be used for comparison, including rings, furrows and


freckles.

 The scans use a regular video camera style and can be


done from further away than a retinal scan.

 It will work through glasses fine and in fact has the ability to
create an accurate enough measurement that it can be used
for identification purposes, and not much verification.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

HOW IRIS SCANNING WORKS ?


TECHNICAL SEMINAR

The user’s eye is positioned near


the camera of the iris recognition
device. The camera automatically
zooms in and focuses.

 The camera captures image of the


iris. This can be done through
eyeglasses, contact lenses or at
night.
SOUMEN SARKAR CS200118347
An overview of BIOMETRICS SECURITY TECHNOLOGY

HOW IRIS SCANNING WORKS ?


A computer program analyzes
TECHNICAL SEMINAR

the patterns within each circular


grid and transforms them into a
data file, which is like a personal
bar code.
The code from the iris is
compared against a database of
previously recorded irises to
confirm the Identification of the
user.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

SMART CARD SECURITY


CARD SECURITY

BIOMETRICS IDENTIFICATION
TECHNICAL SEMINAR

PHYSICAL STRUCTURE

LIFE CYCLE OF A SMART CARD

LOGICAL STRUCTURE AND ACCESS CONTROLS

SMART CARD SOFTWARE

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

SMART CARD SOFTWARE


It has been established that any secure transaction
involves 6 generic functions as followed:
TECHNICAL SEMINAR

Data Protection
Identification of the cardholder
Mutual authentication
Secure writing
Certification or signature
Encryption

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

FACIAL RECOGNITION
Facial recognition analyzes the characteristics of a person's face
images input through a digital video camera.
TECHNICAL SEMINAR

It measures the overall facial structure, including distances between


eyes, nose, mouth, and jaw edges.
These measurements are retained in a database and used as a
comparison when a user stands before the camera.
This biometric has ben widely, and perhaps wildly, touted as a
fantastic system for recognizing potential threats (whether terrorist,
scam artist, or known criminal) but so far has been unproven in high-
level usage. It is currently used in verification only systems with a good
deal of success.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

HOW FACIAL RECOGNITION WORKS ?


User faces the camera, standing about two feet from it. The
system will locate the user's face and perform matches
against the claimed identity or the facial database.
TECHNICAL SEMINAR

It is possible that the user may need to move and reattempt
the verification based on his facial position.

The system usually comes to a decision in less than 5


seconds.

To prevent a fake face or mold from faking out the system,
many systems now require the user to smile, blink, or
otherwise move in a way that is human before verifying.
SOUMEN SARKAR CS200118347
An overview of BIOMETRICS SECURITY TECHNOLOGY

HOW THE SOFTWARE WORKS ?


TECHNICAL SEMINAR

Detection

Normalization

Matching

Representation

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

WHERE BIOMETRICS ARE BEEN USED ?


Panasonic sells an iris reader for desktop computers that does log-ons
TECHNICAL SEMINAR

and videoconferencing.
 ADT Security Services now uses Visionics face-recognition systems
at the airports they protect.
 Some new PC models use desktop fingerscanners on their mouse or
keyboards.
The Los Angleles Firemen's Credit Union spent $40,000 on a
fingerprint-.scanning system. Its 90 employees no longer need to
remember up to 10 passwords to use networks and applications. They
just touch the finger pad and they're ready to go.
 St. Vincent Hospitals and Health Care Center uses a fingerprint
reader system and biometric software in its facilities of up to 3,000 staff
and physicians to access computers.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

ADVANTAGES OF BIOMETRICS SECURITY


 First, unlike passwords or PIN numbers, biometrics looks at
TECHNICAL SEMINAR

a person’s unique trait, which cannot be replicated by others.


Thus, when a user scans their retina for access to a
computer’s resources, biometrics links the event to a certain
individual.

Second, Users do not need to remember their password or


carry around other identification forms (like a driver’s license).

Third, biometrics offers better, more accurate authentication


compared to current password/PIN systems (2002).

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

LIMITATIONS AND DISADVANTAGES


 First, biometric technology can be relatively intrusive on users,
especially if computers are using fingerprints and retina scans to
TECHNICAL SEMINAR

identify users. The issue of personal privacy comes into play when
such delicate information is being recorded.
 Second, many of the biometric techniques for identifying users
are expensive and difficult to implement on current computer
systems.
 Third, many of the biometric techniques take a lot of effort to use
and can be complicated for those who are unfamiliar with the
technology.
 Fourth, biometric security techniques are not equally accurate
and dependable.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

CONCLUSION
 Biometric security technology cannot be overplayed.
Even with its disadvantages and upfront costs, biometric
TECHNICAL SEMINAR

technology is simply the best route to preventing identity


theft and securing computers from unwanted users.
 As the technology works its way into corporate
computers and home PCs, the demand for the product
will increase and the uneasiness towards the technology
will decrease.
 Biometrics are quickly becoming more socially
acceptable, more accurate, and less expensive. Their
place in the future: assured. Their impact on security:
profound.

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY

REFERENCES
 An Introduction to Biometrics” The Biometric Consortiume”
http://www.biometrics.org/html/introduction.htm, 23 June 2004
 About Biometrics” Information Technology Laboratory”
TECHNICAL SEMINAR

http://www.itl.nist.gov/div893/biometrics/about.html,23 June
2004.
 Bertolucci, James” Products for the Paranoid”
http://www.pcworld.com/news/article/0,aid,116573,00.asp23
June 2004.
 Mace, Scott.”Gates Previews Security Projects”
http://www.pcworld.com/news/article/0,aid,114916,00.asp 23
June
 O’Brien, James A.Management Information Systems” Managing
Information Technology in the Business Enterprise "New York:
McGraw-Hill, 2004c
 Newell, Adrienne.Is Biometrics Coming to a PC Near You?
http://www.pcworld.com/news/article/0,aid,115289,00.asp
2004d, March 19

SOUMEN SARKAR CS200118347


An overview of BIOMETRICS SECURITY TECHNOLOGY
TECHNICAL SEMINAR

SOUMEN SARKAR CS200118347

You might also like