200 likes | 480 Views
Overview on Biometrics. Introduction. The Biometric Airport Security Identification Consortium (BASIC) uses biographic and biometric data to provide a trusted identification credential for aviation workers. This overview serves as an introduction to the uses of biometrics.
E N D
Overview on Biometrics DRAFT
Introduction The Biometric Airport Security Identification Consortium (BASIC) uses biographic and biometric data to provide a trusted identification credential for aviation workers. This overview serves as an introduction to the uses of biometrics. DRAFT
What is “Biometrics”? Biometrics is a general term used alternatively to describe a characteristic or a process. • As a characteristic: a biometric is a measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition. • As a process: a biometric is an automated method of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics. DRAFT
Definition • Biometrics are: • measurable • physiological and/or behavioral characteristics • technologies used for measuring and analyzing a person's unique characteristics • can be used to verify the identity of an individual DRAFT
Common Types of Biometrics • Physiological • Iris • Fingerprint (including nail) • Hand (including knuckle, palm, vascular) • Face • Voice • Retina • DNA • Even Odor, Earlobe, Sweat pore, Lips • Behavioral • Signature • Keystroke • Voice • Gait DRAFT
Which Biometric Technology is the Best? • There is not one biometric modality that is best for all implementations. • Many factors must be taken into account when implementing a biometric device • location, security risks, task (identification or verification), expected number of users, user circumstances, existing data, etc. • Biometric modalities are in varying stages of maturity. • Fingerprint recognition - has been used for over a century • Iris recognition - is a little more than a decade old. • It should be noted that maturity is not related to which technology is the best, but can be an indicator of which technologies have more implementation experience. DRAFT
Why Use Biometrics? • Only biometrics can verify you as you • Tokens (smartcards, etc.) aren't you and can be: • lost • stolen • duplicated (some) • forgotten • Passwords aren't you and can be: • forgotten • shared • observed • broken • Biometrics are secure DRAFT
Why are Biometrics Secure? • Unique: The various biometrics systems have been developed around unique characteristics of individuals. The probability of 2 people sharing the same biometric data is virtually nil. • Cannot be shared: Because a biometric property is an intrinsic property of an individual, it is extremely difficult to duplicate or share (you cannot give a copy of your face or your hand to someone!). • Cannot be copied: Biometric characteristics are nearly impossible to forge or spoof, especially with new technologies ensuring that the biometric being identified is from a live person. • Cannot be lost: A biometric property of an individual can be lost only in case of serious accident. DRAFT
How Biometrics Work • The process comprises 4 main steps: • Sample capture • At enrollment, a person's biometrics is captured by the scanner • Template generation/comparison • Software converts the biometric input into a stored template for comparison to a live biometric • Template is a digital representation of an individual’s distinct characteristics, representing information extracted from a biometric sample • Feature extraction • Software identifies specific points of data as "match points" • Matching • Templates are what are actually compared in a biometric recognition system • The match points are processed into a value that can be compared with biometric data stored in the database. DRAFT
Basic Terms • Enrollment: User provides samples by means of a scan. • User samples registered as a template. DRAFT
Basic Terms • Identification, or 1-to-Many: The biometric system identifies a person from the entire enrolled population. DRAFT
Basic Terms • Authentication, or 1-to-1: The biometric system matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token). DRAFT
Where/How are Biometrics Systems Used?(1 of 2) • Systems or Facilities that require reliable user authentication, for example: • physical access control to offices or buildings • Logical access control to secure networks • e-commerce • Healthcare • Immigration and border control, etc. • TWIC • Currently, the prevailing techniques of user authentication are linked to passwords, user IDs, identification cards and PINs DRAFT
Where/How are Biometrics Systems Used? (2 of 2) • Biometrics systems provide a more accurate and reliable user authentication method • Existing user authentication techniques include: • Something you know, e.g. password or PIN. The issue is that many password are easy to guess, and can also be easily forgotten. • Something you have, e.g. key or car. They can be lost, stolen or duplicated. • Something you know and have, e.g. card + PIN. • Something you are, e.g. fingerprint, hand, iris, retina, voice. You cannot lose them, are unique for each individual and are difficult to forge. DRAFT
Fingerprint Technology • Local Features (Minutia) Characteristics • Type • Orientation • Spatial Frequency • Curvature • Position • A fingerprint is made of a a number of ridges and valleys on the surface of the finger. The ridges form so-called minutia points The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. DRAFT
Iris Technology • Based on visible features, i.e. rings, furrows, freckles and the corona • Iris essentially formed by 8 months of age and remains stable through life • Each iris has 266 unique spots vs. 13-60 for other biometrics • Features and their location are used to form the IrisCodeT, which is the digital template (512 bytes) DRAFT
Face Technology • Uses low cost off-the-shelf camera at low speed, low resolution (3-5fps, 320x240) • Several pictures taken at enrollment to allow for more accurate searches • All technologies emphasize facial features that are less susceptible to alteration such as eye sockets, cheekbones, sides of mouth • Features extracted to form template (1300 bytes) DRAFT
Voice Technology • Voice recognition is not the same as speech recognition • Considered physiological and behavioral • Popular and low-cost, but less accurate and sometimes lengthy enrollment • Capable of working over the phone • telephone banking • password reset • calling card security • call center authentication (i.e. home alarm systems) • probation/house arrest monitoring • Many vendors; many proprietary technologies DRAFT
Cultural & Social Issues • In any large scenario some portion of the general population is likely to be physiologically unable to use one or more technique. • Some people have a concern for the physical effects of the technology upon them. This accounts for the greater acceptance of newer iris recognition technology over the older retinal scan technology. • Religious and cultural concerns may also need to be accommodated by organizations implementing biometric technology. For example, certain cultures and religions prohibit or look with great disfavor upon photographing of individuals. DRAFT