2. Subtopics
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
17. Conclusion
Biometrics is the safest and easiest way
for authentication and security. It has
its advantages as well as disadvantages
but finally it’s the newest and smartest
solution to security problems…
21. Summary
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
22. Subtopics
• Brief introduction
• Major contributor
• Methods:
1) On basic level
2) On professional level
• Major Issues
• Conclusion
23. The 6th Day
•Science Fiction Action Thriller Movie
•Directed by Roger Spottiswoode
•Starring Arnold Schwarzenegger
24. iPhone 5S fingerprint sensor hacked
by Germany's Chaos Computer Club
Chaos Computer Club (CCC)
Europe's largest association of hackers.
25. Major Contributor
• Prof. Tsutomu Matsumoto
• “gummy finger” concept:
1)Direct experiment
2)Professional level
31. Hacking from the another
point of view
• In another test of biometric security, an Australian National
University student was able to hack through the device
using the information stored within the system itself.
• Chris Hill worked on discovering the way the system stored
the template information and then created images that had
enough similar “features” of the desired fingerprint to trick
the device.
• He said, “Really all I had to do was crack the code of the
template, so the images I created that were accepted by
the security system did not even look like thumbprints they
just displayed the characteristics required by the computer
program.”
32. Major Issues
• Other issues needing discussion are: What
happens when the part of the body getting
validated is somehow damaged, such as a
finger getting badly burned or deeply cut Or if
someone does manage to create a fake
fingerprint from your finger, how is that issue
resolved, since a finger can’t be easily
changed like a password can?
33. CONCLUSION
Biometric devices have flaws, but so does every
other security hardware and software solution.
Biometric security measures offer such a strong
level of security, that they cannot be thrown out
or ignored simply because a few flaws have been
discovered. They need to be incorporated into an
organization’s already strong defence in depth.
Biometrics, especially in conjunction with
passwords or passcards, offers the level of
security that we need at this stage in the
development of information security…