SlideShare a Scribd company logo
1 of 29
Signature Verification
in Biometrics
Swapnil Bangera
ME-EXTC
Overview
▪ What is a signature?
▪ Digital Signature
▪ Need of Digital Signature
▪ Properties & Requirements of Digital Signatures
▪ Biometric Signature
▪ Types of Biometrics
 Physiological
 Behavioural
▪ Typical System
▪ Advantages
▪ Drawbacks
▪ Conclusion
What is Signature?
▪ A signature is basically a trait of a person which is unique to
himself/herself.
▪ Signature is used in identifying the person and the genuinity of the
document or the file.
▪ It tells us that a particular file is genuine and has come from a right
sender or an authorised person.
Digital Signature
▪ A digital signature is an authentication mechanism that enables the
creator of a message to attach a code that acts as a signature.
▪ These signature is created electronically in the form of bit patterns
which is unique for every user & the message being sent.
▪ They can be verified at reception to check whether the message has
arrived from a right source.
▪ Secure hash algorithms are used to generate digital signatures.
Need of Digital Signatures
▪ Message authentication protects two parties who exchange
messages from any third party. However, it does not protect the two
parties against each other. Several forms of dispute between the two
are possible.
▪ Suppose that John sends an authenticated message to Mary
1. Mary may forge a different message and claim that it came from John. Mary
would simply have to create a message and append an authentication code
using the key that John and Mary share.
2. John can deny sending the message. Because it is possible for Mary to forge a
message, there is no way to prove that John did in fact send the message.
▪ In situations where there is not complete trust between sender and
receiver, something more than authentication is needed.The most
attractive solution to this problem is the digital signature.
Properties & Requirements of Digital
Signature
▪ The digital signature must have the following properties:
– It must verify the author and the date and time of the signature.
– It must authenticate the contents at the time of the signature.
– It must be verifiable by third parties, to resolve disputes.
▪ On the basis of the properties following are the requirements:
– The signature must be a bit pattern that depends on the message being signed.
– The signature must use some information unique to the sender to prevent both
forgery and denial.
– It must be relatively easy to produce the digital signature.
– It must be relatively easy to recognize and verify the digital signature.
– It must be computationally infeasible to forge a digital signature, either by
constructing a new message for an existing digital signature or by constructing a
fraudulent digital signature for a given message.
– It must be practical to retain a copy of the digital signature in storage.
Generic Model of Digital Signature
Process
Simplified Depiction of Essential
Elements of Digital Signature Process
Biometric Signature
▪ Biometrics refers to metrics related to human characteristics.
▪ Biometric signature is used in computer science as a form of
identification and access control.
▪ Biometric identifiers are the distinctive, measurable characteristics
used to label and describe individuals.
Types of Biometrics
▪ Biometric identifiers are often categorized as:
– Physiological characteristics.
– Behavioural characteristics.
▪ Physiological characteristics are related to the shape of the body.
Examples include, but are not limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent.
▪ Behavioural characteristics are related to the pattern of behaviour of
a person, including but not limited to typing rhythm, gait, and voice.
Some researchers have coined the term behaviometrics to describe
the latter class of biometrics.
Physiological Characteristics
a) Fingerprint
This is the one most known method that belongs to this category. It is also
the oldest biometric approach. It is based on the recognition of someone’s
fingerprint , by analysing its characteristics.There are two different techniques to
capture fingerprints.The first is by optically scanning the fingerprint.The other
method is by using electrical charges, that determines which parts of the finger are
directly in contact with the sensor and which are not. Each fingerprint has some
characteristics, such as curves, bifurcations, deltas. One set of these characteristics
is unique for each person.
b) Eyes
There are two methods using the eyes characteristics for authentication.The first
is based on the retinal recognition.The user has to look in a device that performs a laser
-scanning of his retina.The device analyses the blood vessels configuration of the
acquired retinal picture. By the way, it authenticates the user.This blood vessels
configuration is unique for each eye.The device is not friendly, because you have to fix a
point while a laser is analysing your eye. It seems difficult to fool the authentication
system.
The second method is based on the iris recognition.The scan is done by a
camera. Unlike the retinal method, you don't need to be close to the device to be
authenticated.The acquired picture is analysed by the device, and contains 266
different spots. It is said that it is the most reliable biometric authentication method.
Moreover iris is stable through the whole life.The 266 spots are based on characteristics
of the iris, such as furrows and rings. Like for the retinal recognition, the iris recognition
seems difficult to be fooled. Both methods are currently in developing state. Some
prototypes are already available.
c) DNA
This method is based on a DNA analysis.To perform a DNA analysis the user
has to give some of his cells, for example by giving a hair, or some skin.Analysing
DNA takes a long time.That's why it is not used as an authentication method. It is a
shame that it can not be used easily, because it would have provided an excellent
authentication, because everyone is unique through his DNA. But it can be easily
fooled, because anyone can steal a hair of somebody else. Maybe researchers will
find a good way to implement such devices, and it will maybe become the most
efficient way of authenticate people.
d) Face
This method is based on the faces recognition.The device is a simple
camera; even a web cam with low resolution is enough.The user stands in front of
the camera, and then the device computes a digital representation based on some
features of the face.The representation is compared with one which is stored in a
database, and if there is a match, the user is authenticated. It is easy to setup, and
cheap to implement because all you need is a cheap camera and a well-done
software.With good software, it provides you a good authentication method with
unique recognition, except for twins. But the problem is that it is easy to fool,
because all what you need is a single photo of a user's face.
e) Handprints
This method is based on the recognition of the handprints.The device is a
scanner that extracts a picture of a user's hand. Some characteristics like length of
the fingers, distance between them or their relative position are computed, based
on the picture.These characteristics are used to match with an entry in the
database.With these characteristics, you define a unique entity.That provides you
unique recognition except in case of twins or even with same family members.To
fool the system, you can either have a mould of the hand or just a picture of it.This
method is used in some places because it is not so complex to implement.
f) Voice
This method is based on the recognition of someone's voice.The user speaks in a
microphone, and voice is recorded and computed. It is done by using some frequency
analysis of the voice.This analysis is based on how you speak and not on what you say.
It can be useful to authenticate someone through a telephone, and it allows users to
work on a remote location. It is less accurate than other biometrics authentication
methods, and some errors can occur.This authentication method can be easily fooled
by recording someone's voice.The voice recognition is used in many systems because it
is cheap and easy to setup. But it can't be used as a single authentication method: you
have to combine it with another method (biometric or not).
There are several others physiological biometrics, such as lips or earlobes
recognition, sweat ore odour analysis, blood analysis and so on.These biometric
methods are less used and have to improve before they can be used. Some biometrics,
such as the voice can also be considered as a behavioural authentication method, and
that leads us to the analysis of the second type of biometric.
Behavioural Characteristics
a) Signature
The analysis of signature is also a biometrical authentication solution.The
device is a tactile screen.The user performs a signature with a "pen" on this tactile
screen.The parameters that are computed for the authentication are the shape of
the signature, the time taken to do it, the stroke order and the pen pressure.With
the computation of these parameters, the system provides to you a unique
authentication method. It is virtually impossible to reproduce in the same way
somebody else's signature.This method is not deployed today, but it will be more
used in the future. It is easy to implement and it will be standardize, so it will
become quite cheap.
b) Gait
Another behavioural biometrics is the authentication by the gait. It works by
analysing how a person is walking.A camera films the user walking, and by
computing some mathematical function on the inclination of the legs, the
frequency of the balancing of the body, it gives you a good authentication method.
You can use this at distance, and then it can be use as a security system.The
technology is quite new, and the researchers have to improve it, because it is not
able to provide a unique recognition method. It is not used at this time, and if it
becomes a standard, it will be used preferably as a detection system more than as
an authentication method.The good aspect of this biometric is that you can
"authenticate" a person even in a crow, because you can use it far from the subject
and target a specific target.
c) Keystrokes
Keystrokes analysis is also a behavioural biometric, and provides an
authentication method. It works more or less like the signature biometric, by
analysing the way a user is typing on a keyboard. It measures how long a user holds
a key, and how long it takes to the user to switch from one key to another. It
provides a good authentication method in term of uniqueness, but the problem is
that a user can have different keystrokes if he is stressed, or tired. But it is a
comfortable authentication method (more comfortable than an iris or retinal
scanner). It is the easiest biometrics authentication method to implement because
all you need is a little software, and no hardware (just a keyboard).
All theses methods follow a common scheme: Some part or
behaviour of someone is digitalized, transforms in data that follows a
template so it can be compared to entries in a database and then
authenticate or not a user.The size of this template is a part of the
strength of a biometrics. For example fingerprints have templates at
least of 150 bytes, and iris gives a template of 512 bytes.
The database has to be created at the beginning: when you
want to add users to your system, you have to take their biometrics
measures and add these entries in the database.This is called
enrolment.
Typical System
▪ Reference signature:
– Data acquisition
– Pre-processing
– Feature extraction
▪ Matching
– A distance metric criteria is assumed
– Distance between test and reference signature is calculated
– If distance < threshold, it is authenticated
▪ Performance Evaluation
– On skilled and random forgeries
– No public standard signature dataset
Advantages
The Biometric authentication has several advantages. First, the biometrics
authenticates only people. It can not authenticate computer as the classical
authentication methods which are based on IP address or public key.The biometric
characteristics that are used in authentication systems are unique for each person.
The major advantage of the biometrics is that you have always with you your way to
authenticate yourself. For example, you can forget a password or lost an access card.
It is impossible to forget your fingerprint, your gait, your signature... Biometric is
more practical for the user as to remember several password for example. It can
reduce the cost of password and access –card administration.As soon as the
biometric system is set up, there is only a few of administration. In most of the case, it
is more difficult to attack a biometric authentication system as attacking an
authentication system based on password or access -card.You can guess a password
or steal an access card. It seems more difficult to fool a good biometric authentication
system. Furthermore biometric makes possible to know exactly who has been
authenticated and where. A password or an access card can have been borrowed by
someone.With a biometric authentication system, it can not happen. There are a lot
of interesting advantages but also some drawbacks to the biometric authentication.
Drawbacks
The first drawback of biometric authentication is that some methods can't work for some
people. For example, it is impossible to use fingerprint authentication for someone who
has no hands. Some behavioural authentication methods can't work if something is
changed in your life. For example if you have new shoes, perhaps your gait will change,
and it can be a problem to authenticate you. Furthermore if one of your fingers is severely
hurt, the fingerprints authentication will not work. Some characteristics as your face can
also changed with the age. Moreover, most of the biometrics authentications systems are
still in developing state and it can be expensive to install them. As shown in the first part,
someone can fool the biometric authentication. Some biometrics authentication systems
are not really user-friendly such as DNA or retinal recognition. It can be also not very clean.
It is possible that users don't want to use such system. Biometrics authentication raises
also the problem of respect of privacy. It is worrying if your fingerprints are asked
everywhere that you want to go or if every time that you speak, someone can identify you
by analysing your voice. Some movies are based on a world leading by biometric, and it is
really frightening. If biometric is widespread in our every day life and all your activities are
stored in database, there is no more privacy. Personal information taken by biometrics
device can be misused.We must decide in which system we must authenticate by
biometrics and in which system we must not. Using biometric authentication should be a
choice for a user not an obligation. Laws have to be done in order to limit the use of
biometrics information in a reasonable way.
Conclusion
There are several types of biometrics, and each has its advantages and
drawbacks. Depending on what level of security and what do you want
to provide, you have to make the good choice. Biometrics implies that
you have to face some ethics and law considerations. But if you can go
through this problem, it can provide you a very good, secure and easy
way of authenticate people.We think that with the improvement of the
actual techniques, it will become one of the standards in the
authentication methods in a close future. Nevertheless, without a
control by some laws, it would be a mess, because commercial
company could use biometric to target people (as it is done actually on
Internet), and even sell information to other companies. Biometrics is
the tomorrow’s authentication method, but a lot of work has to be
done on both technical and ethical sides.
ThankYou!

More Related Content

What's hot

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
Garima Singh
 

What's hot (20)

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Gait pattern.pptx
Gait pattern.pptxGait pattern.pptx
Gait pattern.pptx
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
1.4 Performance Measures.ppt
1.4 Performance Measures.ppt1.4 Performance Measures.ppt
1.4 Performance Measures.ppt
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Speaker identification
Speaker identificationSpeaker identification
Speaker identification
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
FORENSIC BIOMETRIC
FORENSIC BIOMETRICFORENSIC BIOMETRIC
FORENSIC BIOMETRIC
 
voice recognition
voice recognition voice recognition
voice recognition
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 

Similar to Signature verification in biometrics

Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 

Similar to Signature verification in biometrics (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seetu
SeetuSeetu
Seetu
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 

More from Swapnil Bangera (6)

Steganography
SteganographySteganography
Steganography
 
Shorting post
Shorting postShorting post
Shorting post
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna Synthesis
 
Fading & Doppler Effect
Fading & Doppler EffectFading & Doppler Effect
Fading & Doppler Effect
 
Satellite installation
Satellite installationSatellite installation
Satellite installation
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Signature verification in biometrics

  • 2. Overview ▪ What is a signature? ▪ Digital Signature ▪ Need of Digital Signature ▪ Properties & Requirements of Digital Signatures ▪ Biometric Signature ▪ Types of Biometrics  Physiological  Behavioural ▪ Typical System ▪ Advantages ▪ Drawbacks ▪ Conclusion
  • 3. What is Signature? ▪ A signature is basically a trait of a person which is unique to himself/herself. ▪ Signature is used in identifying the person and the genuinity of the document or the file. ▪ It tells us that a particular file is genuine and has come from a right sender or an authorised person.
  • 4. Digital Signature ▪ A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. ▪ These signature is created electronically in the form of bit patterns which is unique for every user & the message being sent. ▪ They can be verified at reception to check whether the message has arrived from a right source. ▪ Secure hash algorithms are used to generate digital signatures.
  • 5. Need of Digital Signatures ▪ Message authentication protects two parties who exchange messages from any third party. However, it does not protect the two parties against each other. Several forms of dispute between the two are possible. ▪ Suppose that John sends an authenticated message to Mary 1. Mary may forge a different message and claim that it came from John. Mary would simply have to create a message and append an authentication code using the key that John and Mary share. 2. John can deny sending the message. Because it is possible for Mary to forge a message, there is no way to prove that John did in fact send the message. ▪ In situations where there is not complete trust between sender and receiver, something more than authentication is needed.The most attractive solution to this problem is the digital signature.
  • 6. Properties & Requirements of Digital Signature ▪ The digital signature must have the following properties: – It must verify the author and the date and time of the signature. – It must authenticate the contents at the time of the signature. – It must be verifiable by third parties, to resolve disputes. ▪ On the basis of the properties following are the requirements: – The signature must be a bit pattern that depends on the message being signed. – The signature must use some information unique to the sender to prevent both forgery and denial. – It must be relatively easy to produce the digital signature. – It must be relatively easy to recognize and verify the digital signature. – It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message. – It must be practical to retain a copy of the digital signature in storage.
  • 7. Generic Model of Digital Signature Process
  • 8. Simplified Depiction of Essential Elements of Digital Signature Process
  • 9. Biometric Signature ▪ Biometrics refers to metrics related to human characteristics. ▪ Biometric signature is used in computer science as a form of identification and access control. ▪ Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals.
  • 10. Types of Biometrics ▪ Biometric identifiers are often categorized as: – Physiological characteristics. – Behavioural characteristics. ▪ Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. ▪ Behavioural characteristics are related to the pattern of behaviour of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.
  • 11. Physiological Characteristics a) Fingerprint This is the one most known method that belongs to this category. It is also the oldest biometric approach. It is based on the recognition of someone’s fingerprint , by analysing its characteristics.There are two different techniques to capture fingerprints.The first is by optically scanning the fingerprint.The other method is by using electrical charges, that determines which parts of the finger are directly in contact with the sensor and which are not. Each fingerprint has some characteristics, such as curves, bifurcations, deltas. One set of these characteristics is unique for each person.
  • 12.
  • 13. b) Eyes There are two methods using the eyes characteristics for authentication.The first is based on the retinal recognition.The user has to look in a device that performs a laser -scanning of his retina.The device analyses the blood vessels configuration of the acquired retinal picture. By the way, it authenticates the user.This blood vessels configuration is unique for each eye.The device is not friendly, because you have to fix a point while a laser is analysing your eye. It seems difficult to fool the authentication system. The second method is based on the iris recognition.The scan is done by a camera. Unlike the retinal method, you don't need to be close to the device to be authenticated.The acquired picture is analysed by the device, and contains 266 different spots. It is said that it is the most reliable biometric authentication method. Moreover iris is stable through the whole life.The 266 spots are based on characteristics of the iris, such as furrows and rings. Like for the retinal recognition, the iris recognition seems difficult to be fooled. Both methods are currently in developing state. Some prototypes are already available.
  • 14.
  • 15. c) DNA This method is based on a DNA analysis.To perform a DNA analysis the user has to give some of his cells, for example by giving a hair, or some skin.Analysing DNA takes a long time.That's why it is not used as an authentication method. It is a shame that it can not be used easily, because it would have provided an excellent authentication, because everyone is unique through his DNA. But it can be easily fooled, because anyone can steal a hair of somebody else. Maybe researchers will find a good way to implement such devices, and it will maybe become the most efficient way of authenticate people.
  • 16. d) Face This method is based on the faces recognition.The device is a simple camera; even a web cam with low resolution is enough.The user stands in front of the camera, and then the device computes a digital representation based on some features of the face.The representation is compared with one which is stored in a database, and if there is a match, the user is authenticated. It is easy to setup, and cheap to implement because all you need is a cheap camera and a well-done software.With good software, it provides you a good authentication method with unique recognition, except for twins. But the problem is that it is easy to fool, because all what you need is a single photo of a user's face.
  • 17.
  • 18. e) Handprints This method is based on the recognition of the handprints.The device is a scanner that extracts a picture of a user's hand. Some characteristics like length of the fingers, distance between them or their relative position are computed, based on the picture.These characteristics are used to match with an entry in the database.With these characteristics, you define a unique entity.That provides you unique recognition except in case of twins or even with same family members.To fool the system, you can either have a mould of the hand or just a picture of it.This method is used in some places because it is not so complex to implement.
  • 19.
  • 20. f) Voice This method is based on the recognition of someone's voice.The user speaks in a microphone, and voice is recorded and computed. It is done by using some frequency analysis of the voice.This analysis is based on how you speak and not on what you say. It can be useful to authenticate someone through a telephone, and it allows users to work on a remote location. It is less accurate than other biometrics authentication methods, and some errors can occur.This authentication method can be easily fooled by recording someone's voice.The voice recognition is used in many systems because it is cheap and easy to setup. But it can't be used as a single authentication method: you have to combine it with another method (biometric or not). There are several others physiological biometrics, such as lips or earlobes recognition, sweat ore odour analysis, blood analysis and so on.These biometric methods are less used and have to improve before they can be used. Some biometrics, such as the voice can also be considered as a behavioural authentication method, and that leads us to the analysis of the second type of biometric.
  • 21. Behavioural Characteristics a) Signature The analysis of signature is also a biometrical authentication solution.The device is a tactile screen.The user performs a signature with a "pen" on this tactile screen.The parameters that are computed for the authentication are the shape of the signature, the time taken to do it, the stroke order and the pen pressure.With the computation of these parameters, the system provides to you a unique authentication method. It is virtually impossible to reproduce in the same way somebody else's signature.This method is not deployed today, but it will be more used in the future. It is easy to implement and it will be standardize, so it will become quite cheap.
  • 22. b) Gait Another behavioural biometrics is the authentication by the gait. It works by analysing how a person is walking.A camera films the user walking, and by computing some mathematical function on the inclination of the legs, the frequency of the balancing of the body, it gives you a good authentication method. You can use this at distance, and then it can be use as a security system.The technology is quite new, and the researchers have to improve it, because it is not able to provide a unique recognition method. It is not used at this time, and if it becomes a standard, it will be used preferably as a detection system more than as an authentication method.The good aspect of this biometric is that you can "authenticate" a person even in a crow, because you can use it far from the subject and target a specific target.
  • 23. c) Keystrokes Keystrokes analysis is also a behavioural biometric, and provides an authentication method. It works more or less like the signature biometric, by analysing the way a user is typing on a keyboard. It measures how long a user holds a key, and how long it takes to the user to switch from one key to another. It provides a good authentication method in term of uniqueness, but the problem is that a user can have different keystrokes if he is stressed, or tired. But it is a comfortable authentication method (more comfortable than an iris or retinal scanner). It is the easiest biometrics authentication method to implement because all you need is a little software, and no hardware (just a keyboard).
  • 24. All theses methods follow a common scheme: Some part or behaviour of someone is digitalized, transforms in data that follows a template so it can be compared to entries in a database and then authenticate or not a user.The size of this template is a part of the strength of a biometrics. For example fingerprints have templates at least of 150 bytes, and iris gives a template of 512 bytes. The database has to be created at the beginning: when you want to add users to your system, you have to take their biometrics measures and add these entries in the database.This is called enrolment.
  • 25. Typical System ▪ Reference signature: – Data acquisition – Pre-processing – Feature extraction ▪ Matching – A distance metric criteria is assumed – Distance between test and reference signature is calculated – If distance < threshold, it is authenticated ▪ Performance Evaluation – On skilled and random forgeries – No public standard signature dataset
  • 26. Advantages The Biometric authentication has several advantages. First, the biometrics authenticates only people. It can not authenticate computer as the classical authentication methods which are based on IP address or public key.The biometric characteristics that are used in authentication systems are unique for each person. The major advantage of the biometrics is that you have always with you your way to authenticate yourself. For example, you can forget a password or lost an access card. It is impossible to forget your fingerprint, your gait, your signature... Biometric is more practical for the user as to remember several password for example. It can reduce the cost of password and access –card administration.As soon as the biometric system is set up, there is only a few of administration. In most of the case, it is more difficult to attack a biometric authentication system as attacking an authentication system based on password or access -card.You can guess a password or steal an access card. It seems more difficult to fool a good biometric authentication system. Furthermore biometric makes possible to know exactly who has been authenticated and where. A password or an access card can have been borrowed by someone.With a biometric authentication system, it can not happen. There are a lot of interesting advantages but also some drawbacks to the biometric authentication.
  • 27. Drawbacks The first drawback of biometric authentication is that some methods can't work for some people. For example, it is impossible to use fingerprint authentication for someone who has no hands. Some behavioural authentication methods can't work if something is changed in your life. For example if you have new shoes, perhaps your gait will change, and it can be a problem to authenticate you. Furthermore if one of your fingers is severely hurt, the fingerprints authentication will not work. Some characteristics as your face can also changed with the age. Moreover, most of the biometrics authentications systems are still in developing state and it can be expensive to install them. As shown in the first part, someone can fool the biometric authentication. Some biometrics authentication systems are not really user-friendly such as DNA or retinal recognition. It can be also not very clean. It is possible that users don't want to use such system. Biometrics authentication raises also the problem of respect of privacy. It is worrying if your fingerprints are asked everywhere that you want to go or if every time that you speak, someone can identify you by analysing your voice. Some movies are based on a world leading by biometric, and it is really frightening. If biometric is widespread in our every day life and all your activities are stored in database, there is no more privacy. Personal information taken by biometrics device can be misused.We must decide in which system we must authenticate by biometrics and in which system we must not. Using biometric authentication should be a choice for a user not an obligation. Laws have to be done in order to limit the use of biometrics information in a reasonable way.
  • 28. Conclusion There are several types of biometrics, and each has its advantages and drawbacks. Depending on what level of security and what do you want to provide, you have to make the good choice. Biometrics implies that you have to face some ethics and law considerations. But if you can go through this problem, it can provide you a very good, secure and easy way of authenticate people.We think that with the improvement of the actual techniques, it will become one of the standards in the authentication methods in a close future. Nevertheless, without a control by some laws, it would be a mess, because commercial company could use biometric to target people (as it is done actually on Internet), and even sell information to other companies. Biometrics is the tomorrow’s authentication method, but a lot of work has to be done on both technical and ethical sides.