overview on biometrics by ch.ravikumar & priya n
DESCRIPTION
Overview on biometricsTRANSCRIPT
Topic: BIOMETRICS
Presented By:-Ch Ravikumar T.E.ENTC
Priya N T.E.ENTC
Contents
1.Defination
2.Generic Biometric
System
3.Types of biometrics
4.Biometric System
Vulnerabilities
5.Security Approaches
Biometrics
“It is a physiological or behavioral
characteristic of a human being that can
distinguish one person from another and
that theoretically can be used for
identification or verification of identity.”
Who are you? Prove it.
Generic Biometric System
EnrollmentBiometrics
Sensor
IdentificationBiometrics
Sensor
Feature Extractor
Feature Extractor
Feature Matcher
Template
Database
Types of biometrics
Face Recognition
• A face image can be
acquired using a
normal, off-the-shelf
camera
• Easy to accept by
the public
• Cost is rather low
Finger Printing
• Used in forensics
more than
100 years
• Optical, capacitive
readers
• Liveness detection
Finger Printing
Hand Geometry
•Captured using a
CCD camera, or LED
•Orthographic
Scanning
•The system is often
bulky
Eyes:Iris,Retina
• Extracts features
from the colored
tissue surrounding
the pupil.
• Monochrome
camera with visible
and near infra red
light
• Liveness detection
DNA
• Deoxyribonucliec
Acid
• Contains Genetic
information
• Differentiated
using base pairs
Keystrokes
• No special
hardware
Required
• Transparent
capture
Voice
• Speaker recognition uses
a microphone to record
the voice
• Your voice can vary with
age, illness and
emotions
• Interesting with the
increasing use of mobile
phones
Biometric System Vulnerabilities
Biometric System
Vulnerabilities
Adversary Attacks
SpoofingTemplate database leakage
Intrinsic
Limitations
Intrinsic Limitations
• False Non-
Match
• False match
• Zero effort
attack
Adversary Attacks
• Caused due to
negligence of
authorized persons
• An adversary
exploiting the
system security
using insiders
• Direct attack on the
sensors
Spoof Attacks
Template Database leakage
• Biometric template information becomes
available to an adversary
• Easier to recover by using reverse
engineering
Security Approaches
• Biometric Feature Transformations
• Cryptosystems
FUTURE METHODS
Face recognition through blood vessels
FUTURE METHODS
Brainwave recognition
Any Questions……