You are on page 1of 24

ROLE OF BIOMETRICS IN SECURITY

TECHNOLOGY
WHAT IS BIOMETRICS?
 These are automated methods of recognizing a
person based on its physiological characteristics.

These are foundation of an extensive array of


highly secure identification and personal verification
solutions.

Biometric security technologies are used to


accurately identify individuals on a unique trait.
BIOMETRICS ROLE IN PERSONAL
IDENTIFICATION
 One of the most important ways that biometric
technology is impacting security lies within the confines of
computer information systems.

Biometric technology offers an alternative to the most


used system currently in place in most operations:
passwords or personal identification numbers (PIN).

Instead of users inputting their password or PIN, users


interact with a computer terminal that will scan their finger,
face, voice, retina, etc. to identify them
HOW BIOMETRICS WORKS ?
 Enrollmemt

Authenticate/Identify

Accuracy
TYPES OF BIOMETRICS
Fingerprint recognition.

Iris scanning.

Smart card security.

Face recognition.
FINGERPRINT RECOGNITION

Fingerprint matching

Fingerprint classification

Fingerprint image Enhancement

Fingerprint recognition demonstration


FINGERPRINT RECOGNITION
ALGORITHM
 The Authentication Fingerprint is
captured. The user will be advised
to accurately position his finger on
the device. The quality is
measured and only good images
will be accepted. Once an image is
accepted, its relevant information
will be extracted and stored into a
database.

 The extraction of information


starts with the color reduction to
black and white. Several filters
reduce the noise in the relevant
image areas without destroying
required information.
ALGORITHM
CONT....

 Ridge width is reduced to


one pixel based on the
image.A mask is computed to
be able to exclude noisy,
unsharp or blank areas from
the recognition process.

 This mask is also used to


determine the overall image
quality.
ALGORITHM
CONT....

 Minutiae locations are


extracted. False Minutiae are
rejected by the quality mask
(Step 3) Various Features are
extracted from each Minutia

 Once taught in, the user may


now authenticate himself by
putting the finger on the device.
ALGORITHM CONT....
 The so extracted data is compared to the
training data in the database. The finger of the
user has been shifted to the right and was
slightly rotated. Corresponding minutiae data
is connected with a line in this illustration.
Dots are unmatched minutiae.
• T he user has been accepted.
 The extracted data is compared to the
training data in the database. There is only lo
correlation between some minutiae. Additional
matching criteria checks fail.
• T he user has been r ejected.
IRIS SCANNING
 Iris scans analyze the features that exist in the colored
tissue surrounding the pupil which has more than 200
points that can be used for comparison, including rings,
furrows and freckles.

 The scans use a regular video camera style and can be


done from further away than a retinal scan.

 It will work through glasses fine and in fact has the


ability to create an accurate enough measurement that
it can be used for identification purposes, and not much
verification.
HOW IRIS SCANNING WORKS ?

 The user’s eye is positioned near the


camera of the iris recognition device.
The camera automatically zooms in and
focuses.

 The camera captures image of the iris.


This can be done through eyeglasses,
contact lenses or at night.
HOW IRIS SCANNING
WORKS ?
 A computer program analyzes the
patterns within each circular grid
and transforms them into a data
file, which is like a personal bar
code.
 The code from the iris is
compared against a database of
previously recorded irises to
confirm the Identification of the
user.
SMART CARD SECURITY
 CARD SECURITY

 BIOMETRICS IDENTIFICATION

 PHYSICAL STRUCTURE

 LIFE CYCLE OF A SMART CARD

 LOGICAL STRUCTURE AND ACCESS CONTROLS

 SMART CARD SOFTWARE


SMART CARD SOFTWARE
• It has been established that any secure
transaction involves 6 generic functions as
followed:

 Data Protection
 Identification of the cardholder
 Mutual authentication
 Secure writing
 Certification or signature
 Encryption
FACIAL RECOGNITION
 Facial recognition analyzes the characteristics of a person's face images
input through a digital video camera.
 It measures the overall facial structure, including distances between
eyes, nose, mouth, and jaw edges.
 These measurements are retained in a database and used as a
comparison when a user stands before the camera.
 This biometric has ben widely, and perhaps wildly, touted as a fantastic
system for recognizing potential threats (whether terrorist, scam artist,
or known criminal) but so far has been unproven in high-level usage. It is
currently used in verification only systems with a good deal of success.
HOW FACIAL RECOGNITION WORKS ?
User faces the camera, standing about two feet from it. The
system will locate the user's face and perform matches
against the claimed identity or the facial database.

It is possible that the user may need to move and reattempt
the verification based on his facial position.

The system usually comes to a decision in less than 5


seconds.

To prevent a fake face or mold from faking out the system,
many systems now require the user to smile, blink, or
otherwise move in a way that is human before verifying.
HOW THE SOFTWARE WORKS ?

Detection

Normalization

Matching

Representation
WHERE BIOMETRICS ARE BEEN USED ?
Panasonic sells an iris reader for desktop computers that does log-ons
and videoconferencing.
 ADT Security Services now uses Visionics face-recognition systems
at the airports they protect.
 Some new PC models use desktop fingerscanners on their mouse or
keyboards.
The Los Angleles Firemen's Credit Union spent $40,000 on a
fingerprint-.scanning system. Its 90 employees no longer need to
remember up to 10 passwords to use networks and applications. They
just touch the finger pad and they're ready to go.
 St. Vincent Hospitals and Health Care Center uses a fingerprint
reader system and biometric software in its facilities of up to 3,000 staff
and physicians to access computers.
ADVANTAGES OF BIOMETRICS SECURITY
 First, unlike passwords or PIN numbers, biometrics looks at
a person’s unique trait, which cannot be replicated by others.
Thus, when a user scans their retina for access to a
computer’s resources, biometrics links the event to a certain
individual.

Second, Users do not need to remember their password or


carry around other identification forms (like a driver’s license).

Third, biometrics offers better, more accurate authentication


compared to current password/PIN systems (2002).
LIMITATIONS AND DISADVANTAGES
 First, biometric technology can be relatively intrusive on users,
especially if computers are using fingerprints and retina scans to
identify users. The issue of personal privacy comes into play when
such delicate information is being recorded.
 Second, many of the biometric techniques for identifying users
are expensive and difficult to implement on current computer
systems.
 Third, many of the biometric techniques take a lot of effort to use
and can be complicated for those who are unfamiliar with the
technology.
 Fourth, biometric security techniques are not equally accurate
and dependable.
CONCLUSION
 Biometric security technology cannot be
overplayed. Even with its disadvantages and
upfront costs, biometric technology is simply
the best route to preventing identity theft and
securing computers from unwanted users.
 As the technology works its way into
corporate computers and home PCs, the
demand for the product will increase and the
uneasiness towards the technology will
decrease.
 Biometrics are quickly becoming more
socially acceptable, more accurate, and less
expensive. Their place in the future: assured.
Their impact on security: profound.
REFERENCES
 An Introduction to Biometrics” The Biometric Consortiume”
 http://www.biometrics.org/html/introduction.htm, 23 June
2004
 About Biometrics” Information Technology Laboratory”
http://www.itl.nist.gov/div893/biometrics/about.html,2
3 June 2004.
 Bertolucci, James” Products for the Paranoid”
http://www.pcwor ld.com/news/ar ticle/0,aid,116573,00
.asp23 June 2004.
 Mace, Scott.”Gates Previews Security Projects”
http://www.pcwor ld.com/news/ar ticle/0,aid,114916,00
.asp 23 June
 O’Brien, James A.Management Information Systems”
Managing Information Technology in the Business Enterprise
"New York: McGraw-Hill, 2004c
 Newell, Adrienne.Is Biometrics Coming to a PC Near You?
http://www.pcwor ld.com/news/ar ticle/0,aid,115289,00
.asp 2004d, March 19

You might also like