SlideShare une entreprise Scribd logo
1  sur  12
Biometrics

J E F F VA N TA S S E L
       CAP 480
M R S . M C C A RT HY
Problems with biometrics

 There are a few problems with using biometrics.
 “There are also devices that can capture iris images of a
  person walking within a few feet of a video camera (often
  behind a one-way mirror) so that it can be duplicated
  and used for illegitimate purposes. The real problem with
  biometrics is that once an individual's biometrics has
  been compromised, they are compromised for life and
  can never be trusted again. “(Strassmann, 2002).
 “However, my most severe objection to biometrics as an
  authentication method is their reliance on a central
  database that contains the identifying graphic templates.
  If such database is compromised, then the biometrics of
  ALL users in the database are compromised for life.”
  (Strassmann, 2002).
Solution

 The solution is to use another type of security along
  with using biometric devices.
 “Knowledge tokens, such as passwords, secret
  PINs (Personal Identification Numbers), or
  knowledge of personal data (knowing one's mother's
  maiden name, e.g.), or” Abernathy & Tien. (2003).
 “Physical tokens such as ID cards, passports, chip
  cards, or plain old keys.” Abernathy& Tien. (2003).
What are Biometrics?

 Firstly what are biometrics?
 According to the Electronic Frontier Foundation or EFF
  biometrics are “Biometrics refers to the automatic
  identification or identity verification of living persons
  using their enduring physical or behavioral characteristics.
  Many body parts, personal characteristics and imaging
  methods have been suggested and used for biometric
  systems: fingers, hands, feet, faces, eyes, ears, teeth,
  veins, voices, signatures, typing styles, gaits and odors.”
  (Abernathy & Tien, 2003).
What are biometrics? Continued.

 In other words biometrics is measuring the metrics of our
  biological make up.
 They can measure many different aspects that make up
  our bodies.




   Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
Types of biometric devices.

 The different types of biometric devices are as fallows:
 voice;
 - handwriting;
 - fingerprint(s);
 - face;
 - retina of the eye;
 - iris of the eye.
 And many more…
Pictures of biometric devices.
Facial Recognition

 Facial recognition is another biometric device that is
  heavily used in many different industries.
 It can be used to “geometrically map the face and also
  have a view base of the face. There are 3 algorithms that
  have been well studied that are used in facial recognition
  software; Principal Components Analysis (PCA), Linear
  Discriminant Analysis (LDA), and Elastic Bunch Graph
  Matching (EBGM).” ("Face recognition," 2006).
Facial Recognition Devices




("Gambling on research," 2008).
                              ("Biometrics: Identifying friend," 2010).




("Thesis subject: Biometric," 2006).
                                  ("Thesis subject: Biometric," 2006).
Pros of biometric use

 “With both Biometric systems, you eliminate all
  problems associated with „buddy punching‟, but also
  lost/forgotten/replacement ID cards” ("Using
  biometric time," ).
 They can also be easy to use if set up right.
 They can help make your network more secure.
Picture References

 http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for
    fingerprint types
   http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner
   http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner
   http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner
   Gambling on research. (2008, September 18). Retrieved from
    http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for
    woma‟s face recognition
   Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved
    from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for
    man with many cameras
   Thesis subject: Biometric evaluation platform. (2006). Retrieved from
    http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
References

   Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Who's watching you?. Retrieved from
    https://www.eff.org/wp/biometrics-whos-watching-you
   Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf
   Face recognition. (2006, August 7). Retrieved from
    http://www.biometrics.gov/Documents/facerec.pdf
   Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from
    http://www.strassmann.com/pubs/searchsecurity/2002-
   Using biometric time and attendance solutions. (n.d.). Retrieved from
    http://www.hrindustries.co.uk/biometric-solutions.htm

Contenu connexe

Tendances

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear RecognitionIJERA Editor
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hackingNeel Parikh
 

Tendances (20)

Biomatric
BiomatricBiomatric
Biomatric
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear Recognition
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 
biometrics
biometricsbiometrics
biometrics
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Poster (Version 3)
Poster (Version 3)Poster (Version 3)
Poster (Version 3)
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 

Similaire à Biometrics

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 

Similaire à Biometrics (20)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics
BiometricsBiometrics
Biometrics
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometric
Biometric Biometric
Biometric
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 

Biometrics

  • 1. Biometrics J E F F VA N TA S S E L CAP 480 M R S . M C C A RT HY
  • 2. Problems with biometrics  There are a few problems with using biometrics.  “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individual's biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002).  “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
  • 3. Solution  The solution is to use another type of security along with using biometric devices.  “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing one's mother's maiden name, e.g.), or” Abernathy & Tien. (2003).  “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
  • 4. What are Biometrics?  Firstly what are biometrics?  According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
  • 5. What are biometrics? Continued.  In other words biometrics is measuring the metrics of our biological make up.  They can measure many different aspects that make up our bodies.  Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
  • 6. Types of biometric devices.  The different types of biometric devices are as fallows:  voice;  - handwriting;  - fingerprint(s);  - face;  - retina of the eye;  - iris of the eye.  And many more…
  • 8. Facial Recognition  Facial recognition is another biometric device that is heavily used in many different industries.  It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
  • 9. Facial Recognition Devices ("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010). ("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
  • 10. Pros of biometric use  “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ).  They can also be easy to use if set up right.  They can help make your network more secure.
  • 11. Picture References  http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types  http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner  http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner  http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner  Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition  Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras  Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
  • 12. References  Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Who's watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you  Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf  Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf  Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002-  Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm