Role of Biometrics in Cybersecurity. Sam Youness

Similar documents
Biometric Security Roles & Resources

Biometrics Our Past, Present, and Future Identity

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Computer Security 4/15/18

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Biometrics. Overview of Authentication

Match On Card MINEX 2

NIST Tests Supporting Biometric Identification Applications

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Biometric quality for error suppression

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

An introduction on several biometric modalities. Yuning Xu

Gaining Business Value from IoT

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 8: Finger pattern skeletal data

Information Security Identification and authentication. Advanced User Authentication II

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages

Smart Card and Biometrics Used for Secured Personal Identification System Development

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

An Overview of Biometric Image Processing

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

Using Biometric Authentication to Elevate Enterprise Security

6 facts about GenKey s ABIS

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Applying biometric authentication to physical access control systems

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 5: Face image data

Charter Pacific Biometrics Acquisition

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Mobile ID, the Size Compromise

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

In this unit we are continuing our discussion of IT security measures.

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

Interview with Fernando Podio Chair of ISO/IEC JTC 1 SC 37 Subcommittee on Biometrics

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 2: Finger minutiae data

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric calibration, augmentation and fusion data Part 1: Fusion information format

Authentication Technologies

Advanced Biometric Access Control Training Course # :

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

Access Control with Fingerprint Recognition

The Future of Authentication

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Types of Peripheral Devices

Biometric Use Case Models for Personal Identity Verification

Authentication. Chapter 2

Access Control Biometrics User Guide

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Verwelkoming. 20 September Fort Lent

Quantitative Tests Supporting Standardized Biometric Data for Large Scale Identity Management

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

Face recognition for enhanced security.

MDR-1 Mobile Document Reader

CBEFF. Common Biometric Exchange Formats Framework. Catherine Tilton. 6 March W3C Workshop on SIV

The European Union approach to Biometrics

Combating Accuracy Issues in Biometric Solutions

Biometric Enrolment for the European Visa Informationsystem (VIS)

JTC 1 SC 37 Biometrics International Standards

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

USE CASES. See how Polygon s Biometrid can be used in different usage settings

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data

A Review of Emerging Biometric Authentication Technologies

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

The Need for Biometric Authentication

Touchless Fingerprint recognition using MATLAB

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

FINGERPRINT BIOMETRICS

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

EU Passport Specification

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Biometrics: The Password You ll Never Forget

CS 528 Mobile and Ubiquitous Computing Lecture 11b: Mobile Security and Mobile Software Vulnerabilities Emmanuel Agu

Hybrid Biometric Person Authentication Using Face and Voice Features

INTUS 1600PS Palm Vein Authentication

Understanding Fingerprint Biometrics

Biometric Cryptosystems: for User Authentication

Human Identification Using Biometry

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.

FSN-PalmSecureID-for ATM Machines

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

Lecture 9 User Authentication

Advances in Stand-off Biometrics

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

The Future of Smart Cards: Bigger, Faster and More Secure

NFC Identity and Access Control

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc.

Integrated Access Management Solutions. Access Televentures

Transcription:

Role of Biometrics in Cybersecurity Sam Youness

Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead

The Basics Everyday we need to identify ourselves when we do things like: Use a bank automatic teller machine (PIN #) Use a personal or corporate computing devices Enter the office by scanning a badge, punching a code, or using key Use passwords to access online services (e.g. online banking, Netflix, Amazon) Use password to access our email Provide passport or drivers license as proof of identity And many more examples There is an essential need to accurately identify an individual to minimize the possibility of security breaches and threats

Why Biometrics? Traditional security guards (passwords, pins, etc.) have serious issues Security keys, such as, ID cards, keys, etc. also have their issues, such as getting lost, copied, etc. Is biometrics the answer? It is part of the person and not easily compromised through theft, collusion, or loss Simplifies user management leading to cost savings No need to remember passwords or pins User accounts cannot be shared Easy to use.

Biometrics Modalities Physiological (not likely to change over time): Fingerprints, Finger length Iris/Retina Facial image and geometry (2D and 3D) Hand geometry Vein pattern DNA Behavioral (may change over time): Voice Gait Odor Signature Keystroke and mouse moves dynamics

How Biometrics Work Enrollment Enrollment Template Extraction Template Storage Search/Match Biometric sample Distinguished features of the sample Template Extraction Digital template of the sample Template Comparison Live Capture Comparison Algorithm Biometric sample Distinguished features of the sample Digital template of the sample MATCH NO MATCH

Biometrics Processes Image Capture Feature Extraction Secure Storage Template Matching Secure Device Trusted Computer MATCH NO MATCH

Biometric System Accuracy ROC: receiver operating characteristic FMR: false match rate FNMR: false non-match rate Matching threshold T Higher quantities of data (e.g. more fingerprints) and higherquality (highly consistent) samples are required for one-tomany search processes as compared to one-to-one matching for verification.

Biometrics Application Categories Verification One-to-one biometric identification to provide physical or logical acces conrol Compares against a template stored locally (PC, smart phone, etc.) or on a server Acts as a passcode or PIN Identification One-to-many search to assess whether an individual s biometrics are present in a database or gallery that contains a very large number of biometric records More computing intensive to help identify a person Duplicate Checking Matching each and every template to all templates in a gallery Determines if individuals are represented more than once in a database Used to detect fraud enrollment in multiple social benefits programs, etc.

Example Biometric Applications Verification Logical access to devices (computer/network logon) Dumb terminals client server access Internet e-commerce Smart card access Identification Access to facility Border control identification Duplicate Checking Fraud detection

Devices and Sensors Mechanical or electronic systems that are used to enroll and capture raw biometric samples in a form that can be digitized and converted into a digital biometric template Examples include: Fingerprint sensors: Capacitive are based on silicon chips that detect electric currents when the finger ridges make contact. They can use full finger or swipe techniques Optical sensors use prism light source and light sensor Light emitting and multispectral sensors Digital cameras for facial recognition: consumer- grade digital SLRs, pocket cameras, and webcams 60 PPI are required for 1:1 matching and 90 PPI for 1:n matching Consistency is the most important factor Iris cameras for iris recognition: Requires an infrared image of the iris to optimize the image contrast so as to facilitate machine based analysis. Off-the-shelf cameras aren t yet used for iris image capture, and a special camera is required Microphones for voice recognition: used for 1:1 identification and consistency is very important for these scenarios

Standardization Building standards which all biometrics vendors adhere to is still a challenge despite the work of several national and international organizations over the past two decades Biometrics template extraction and comparison is typically proprietary to each vendor. This prevents using a product from one company to compare templates generated by products from another. One exception to this are MINEX-certified minutiae-based fingerprint template generator and matching algorithms. This category of templates and matching algorithms has been developed, tested, and certified by NIST to be interoperable for 1:1 verification to be used on compact cards and travel documents

Biometrics Standards ISO/IEC JTC 1/SC 37 119 published ISO standards 29 standards under development 29 participating members 13 observing members Different working groups addressing: Strategy Harmonized vocabulary Technical interfaces Data interchange formats Technical implementations of biometric systems Testing and reporting Cross-jurisdictional and societal aspects of biometrics National Institute of Standards and Technology (NIST) Research on the various biometric modalities: fingerprint, face, iris, voice, DNA, and multimodal Standards development at the national and international level Technology testing and evaluation, which leads to innovation NIST partners: DOJ/FBI, DOD, DOS, Intelligence Community

Biometrics Considerations Cost Security obfuscation of biometrics may occur Privacy/intrusiveness Size for storage (images and templates) Convenience Speed Accuracy Connectivity & compatibility

Questions?

Sam Youness Sam is a seasoned professional with more than 21 years of deep experience in business and IT, including architecture vision creation and building industry-wide strategies to achieve that vision. Sam has successfully delivered a large number of architectures, solutions and projects to better enable customer business. Sam is fluent in both languages of business and IT. He is a result driven technical leader with a passion for excellence. He is a relationship builder with outstanding communication skills. Technically minded but always commercially aware. Sam is an established author and contributor of several books and other publications covering different topics in areas of data management, programming languages, solution building, and security. He is a keynote speaker in high level industry conferences and end user events.