Biometric Security Roles & Resources

Similar documents
CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

An Overview of Biometric Image Processing

Role of Biometrics in Cybersecurity. Sam Youness

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

Smart Card and Biometrics Used for Secured Personal Identification System Development

Biometrics: The Password You ll Never Forget

Biometrics Technology: Hand Geometry

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

Biometric quality for error suppression

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

Lecture 11: Human Authentication CS /12/2018

Chapter 3: User Authentication

FINGERPRINT BIOMETRICS

Information Security Identification and authentication. Advanced User Authentication II

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

Access Control Biometrics User Guide

Advanced Biometric Access Control Training Course # :

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

A Review of Emerging Biometric Authentication Technologies

NIST Tests Supporting Biometric Identification Applications

CSE 565 Computer Security Fall 2018

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

Privatizing user credential information of Web services in a shared user environment

Lumidigm Frequently Asked Questions

Computer Security 4/17/2017

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

BIOMETRIC TECHNOLOGY: A REVIEW

CS Authentication of Humans. Prof. Clarkson Spring 2017

Development of an Automated Fingerprint Verification System

Fingerprint Authentication for SIS-based Healthcare Systems

Biometric Cryptosystems: for User Authentication

Hybrid Biometric Person Authentication Using Face and Voice Features

Secure and Private Identification through Biometric Systems

Exploring Similarity Measures for Biometric Databases

Biometrics Hybrid System Based Verification

Peg-Free Hand Geometry Verification System

Biometrics. Overview of Authentication

CAS Sign On for Windows

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Keystroke Dynamics: Low Impact Biometric Verification

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

6. Multimodal Biometrics

Authentication. Chapter 2

Authentication Objectives People Authentication I

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

FVC2004: Third Fingerprint Verification Competition

A Novel Approach to Improve the Biometric Security using Liveness Detection

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

A Survey on Security in Palmprint Recognition: A Biometric Trait

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Biometrics Our Past, Present, and Future Identity

Match On Card MINEX 2

Multimodal Biometric Security using Evolutionary Computation

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

Combating Accuracy Issues in Biometric Solutions

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Chapter 6. Multibiometrics

Understanding Fingerprint Biometrics

234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004

Unit-VI. User Authentication Mechanisms.

Encryption of Text Using Fingerprints

An introduction on several biometric modalities. Yuning Xu

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

CHAPTER 6 RESULTS AND DISCUSSIONS

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

sensors ISSN

Rotation Invariant Finger Vein Recognition *

CHAPTER 5 FEASIBILITY STUDY ON 3D BIOMETRIC AUTHENTICATION MECHANISM

FUZZY LOGIC IMPLEMENTATION OF FINGERPRINT MECHANISM FOR SECURE TRANSACTION AND IDENTITY AUTHENTICATION IN M-COMMERCE

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Call for participation. FVC2004: Fingerprint Verification Competition 2004

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Keywords Palmprint recognition, patterns, features

Biometrics Security Concerns

Robust Biometrics Based on Palmprint

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

INTUS 1600PS Palm Vein Authentication

In this unit we are continuing our discussion of IT security measures.

Technical Challenges for Biometric Science

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)

Transcription:

Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems

Outline Biometrics Overview Biometric Architectures (Non-Centralized and Centralized) BIAS: the connection between the capture front end and the storage and matching back end

Biometrics What are Biometrics? Measurements of certain physical or behavioral characteristics of an individual used to create a unique identifier which can be electronically stored, retrieved, and compared for positive identification purposes Examples of Biometric Types: - Fingerprint - Facial features -Voice -Signature -Iris -Retina - Hand geometry - Facial thermography - Keystroke dynamics - Palm print - Vein patterns - DNA (?)

How do biometrics work? www.oasis-open.org

Three basic processes Enrollment Adding a biometric identifier to the database Verification (1:1) Matching against a single record Answers Am I whom I claim to be? Identification (1:N) Matching against all records in the database Answers Who am I?

Primitive process steps Capture Measuring/sampling the raw biometric data using a sensing device Raw data may be a bitmapped image, audio stream, etc. A series of samples may be captured Sometimes includes a quality value Processing Converting the raw data into a numeric identifier (generally a binary record) Generally involves feature extraction, but can also include other manipulations (sample averaging/weighting, statistics calculations, cohort lists, etc.)

Example finger imaging Y Bifurcations Ridge Endings Minutia Algorithm X Physical Characteristics Numerical Result

Primitive process steps (cont d) Matching Comparing a processed biometric sample to a previously enrolled biometric template(s) to determine level of similarity Correlation process Not same as string or binary compare Many methods (types of algorithms) used Output of match process is a score Analogous to probability of match (i.e., belonging to the same subject) Decision Determination of match results Simple match/no-match Complex weighting, logic, lists, etc.

Scoring & Thresholding Score Candidate List ID 0004 ID 9998 ID 0002 ID 9999 ID 0003 1:N 1:1 Match Sample Template ID 0001 ID 0002 ID 0003 ID 0004 ID 0005 Match Match Score Threshold Output of match process is a score analogous to probability of match Match/no match declared based on comparison of match score to threshold For 1:1, result is boolean (match or no match) For 1:N, can have >1 score exceeding threshold ID 0001 ID 0005 ID 9998 ID 9999 Stored Templates

Accuracy Generally defined in terms of two parameters: 1) False Rejection Rate (FRR): Probability that a submitted sample will not match the corresponding enrollment template Measures how often an authorized user, who should be recognized by the system (granted access), is not recognized FRR = number of false rejections/number of legitimate recognition attempts x 100% Also called False Non-Match Rate (FNMR) or Type I Error Said to measure Robustness 2) False Acceptance Rate (FAR): Probability that a submitted sample will match the enrollment template of another subject Measures how often a non-authorized user, who should not be recognized by the system, is falsely recognized (and granted access) FAR = number of false acceptances/number of imposter recognition attempts x 100% Also called False Match Rate (FMR) or Type II Error Said to measure Distinctiveness

ROC Curves FAR/FRR inversely related Operating point is a compromise Accuracy frequently defined in terms of FRR % achieved for a set operating point FAR. Example:.02 FRR at FAR=.0001 (98% accuracy for FAR of 1 in 10,000) Error Rate FRR FAR FNMR Threshold FMR

Additional quality measurement Failure to Enroll (FTE) Rate Measures how often users are unable to enroll a biometric record Physical characteristic of user prevents creation of template User is not capable or willing to present biometric properly Sensitive to demographics of user population

Biometric system components What do I need to make it work? Capture device (sensor) Finger scanner, microphone, video camera Algorithms Processing (feature extraction) Matching (1:1 or 1:N comparisons) Repository Database to store enrolled biometric identifier records (for later comparison) Should be protected (secure area, signed/encrypted) Interconnections and communications Networks Protocols

Biometric Architectures Centralized or Non-centralized? Where are the reference templates stored? Where is the matching done? Physical Architectural Components Server Workstation (Client) Sensor Token (smart card)

Architectural Variations 16 possible variations 6 most likely Refer to INCITS M1/07-0185 Study Report on Biometrics in E-Authentication

Architecture F Store on Token / Match on Token Physical Token 7 Storage 6 9 Data Capture Signal Processing Matching Decision 2 4 8 1 3 5 10 Client/Device 11 Verifier Used for 1:1 matching based credentialing systems No Back-end communications Biometric data can be stored encrypted on-card Capture and sample processing can be incorporated on token Match confirmation can be used to enable authentication message to allow system access

Architecture A Store on Server / Match on Server 7 Storage 6 9 Data Capture Signal Processing Matching Decision 2 4 8 1 3 5 10 11 Verifier Client/Device Server Used for large-scale, centralized systems Back-end can scale Accommodates variety of network connected clients Supports services models (such as BIAS) Standard ENROLL, VERIFY, IDENTIFY Other low-level services such as identity create & delete, metadata maintenance