1 / 14

Biometric standards An overview of biometrics and identity management

Biometric standards An overview of biometrics and identity management. Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen 120070494. The need to identify. Every day we are required to identify ourselves Using a bank card with a PIN at a cash machine

jeneil
Download Presentation

Biometric standards An overview of biometrics and identity management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometric standardsAn overview of biometrics and identity management UNIVERSITY OF PALESTINE Supervisor : Ahmed Abu Mosameh Prepared by samaherel nbahen 120070494

  2. The need to identify • Every day we are required to identify ourselves • Using a bank card with a PIN at a cash machine • A password to log on to a computer • Using a key to open a door • Punching a code into a keypad to enter the workplace • Using passwords on the Internet • Providing a passport and driving licence as proof of identity • We need to be able to accurately IDENTIFY an individual to minimize current issues and threats UNIVERSITY OF PALESTINE

  3. Current attributes used to identify • Name • Address • Postcode • Date of Birth • Account no. • Passwords • PINs • Phone no. • Mother’s maiden name • Passport • Birth certificate • Driving licence • Credit cards • Utility bills • Membership cards • Salary slip UNIVERSITY OF PALESTINE

  4. Is biometrics the answer? • A biometric is part of the person and is not easily compromised through: • Theft • Collusion • Loss • Simplifies user management resulting in cost savings • Users do not need to remember passwords • Users do not need to remember PINs • User accounts cannot be shared • Easy to use UNIVERSITY OF PALESTINE

  5. Biometric definition • The automated recognition of individuals based on their behavioural and biological characteristics • The general meaning of biometrics encompasses counting, measuring and statistical analysis of any kind of data in the biological sciences including the relevant medical sciences • The term is derived from the Greek words “bios” meaning life and “metron” meaning measure UNIVERSITY OF PALESTINE

  6. Biological and behavioural • Behavioural • Signature • Gait • Voice • Keystroke dynamics • Biological • Fingerprint • Face (2D & 3D) • Iris • Vein pattern • Hand geometry • DNA UNIVERSITY OF PALESTINE

  7. Iris • Captures the pattern of flecks on the iris • Uses conventional cameras • Average 2 seconds for identification • No physical contact between user and reader UNIVERSITY OF PALESTINE

  8. Face • Based upon the geometric shape and position of features of the face • Resistant to changes in skin tone, facial hair, hair style, and eyeglasses • No active user involvement required in order to perform identification/verification • Limited success in practical applications UNIVERSITY OF PALESTINE

  9. Voice • Analyses voice patterns and characteristics of speech e.g. pitch, tone, etc. • High user acceptance – perceived as least intrusive biometric technology • Easy for end users to implement • Ideal for telephone systems/mobile environments UNIVERSITY OF PALESTINE

  10. Hand geometry • Measures the physical characteristics of the user’s hand and fingers • Low level infrared light and camera used to capture an image • Suited to applications where there is a large user base or users access the system infrequently • Systems are easy to use and robust UNIVERSITY OF PALESTINE

  11. Signature • Based on analysis of the dynamics of a handwritten signature e.g. shape, speed, stroke order, pen pressure • Generally use pressure sensitive tablets or wired pens • User friendly • Non intrusive – minimal public acceptance issues • Captured signature can be used for digitally signing documents UNIVERSITY OF PALESTINE

  12. Keystroke dynamics • Monitors rate of typing and intervals between letters • Verification based on typing rhythm – intruders may guess password but fail to key in with correct rhythm • Neither enrolment nor verification disturbs the regular flow of work • Low cost – only hardware required is keyboard UNIVERSITY OF PALESTINE

  13. Fingerprint • Variety of fingerprint devices available (silicon and optical) • Template constructed by analysing patterns that make the fingerprint (minutiae) UNIVERSITY OF PALESTINE

  14. DNA • Forensic genetics use deoxyribonucleic acid (DNA) profiling in a number of important human identity applications • 0.01% of a person's entire genome is unique to each individual • This represents 3 million base pairs of DNA • 95% of the human genome are non-coding sequences (called junk DNA) • Standard profiling systems only exploit the junk DNA to maintain the privacy and civil rights of the donor UNIVERSITY OF PALESTINE

More Related