Sie sind auf Seite 1von 17

BIOMETRIC

S
Presented By : Jyoti Turkar

Outline

Introduction

Biometrics techniques

Strengths, and weaknesses

FAR/FRR

Major Players

Summary

Biometrics is the reading of a


unique human physical attribute as
data, which is then applied to
actuating a system.
Access control of Secure areas
Replacing passwords on computers
or PDAs
WHAT IS BIOMETRICS

Retina scanning

Iris scanning

Fingerprint scanning

Hand scanning

Face recognition

Voice recognition & DSV

Signature recognition

Keystroke recognition

BIOMETRICS TECHNIQUES

RETINAL
SCANNING
User Looks Into a
Viewer and Focuses
on a Point; Infrared
Light Scans Retina

Iris Scanning
User looks at a camera
(distance from camera
increasing rapidly to 2-3 feet)

FINGER SCANNING
User Places Finger on
Scanning Device

HAND SCANNING
User Places Hand on
Device

FACIAL RECOGNITION

User Looks at Camera

OTHER TECHNIQUES
Voice Recognition & DSV
User speaks into a microphone or other device, such as a
telephone handset

Signature Recognition
User signs name on a device

Keystroke Recognition
User types standard sample on keyboard

STRENGTHS, AND WEAKNESS


Retina
Iris
Fingerprint
Hand/Finger Geometry
Face Recognition
Voice Recognition
Signature Recognition
Keystroke Recognition

Technique

Strengths

Retina

Highly accurate

Iris

Highly accurate; works


with eyeglasses; more
acceptable to users
than
retina
scan
Mature
technology;
highly accurate; low
cost; small size,
becoming
widely
accurate and
flexible;
acceptable
widely
acceptable to
users
Widely acceptable to
users; low cost; no
direct contact; passive
monitoring
Usable overpossible
existing
telephone system; good
for remote access and
monitoring;
Widely acceptable to
users
Widely acceptable to
users; low cost; uses
existing hardware

Fingerprint

Hand/Finger Geometry
Face Recognition

Voice Recognition

Signature Recognition
Keystroke Recognition

Technique

Weaknesses

Retina

Inconvenient for persons


with eyeglasses; dislike
contact with device and
light beam
New technology, cost,
although this is rapidly
changing
Users can create high
FRR; some persons
dislike contact with
device
User interface is bulky;
dislike contact with
device
Face recognition is less
accurate than other
methods
Less accuracy; subject to
background noise
Less accuracy; not
widely used yet, but has
potential with PDAs
Less accuracy;

Iris
Fingerprint

Hand/Finger Geometry
Face Recognition
Voice Recognition
Signature Recognition
Keystroke Recognition

FAR & FRR


FAR(False Acceptance rate) refers to how often
the system accepts someone it should reject
AND
FRR(False Rejection Rate) is how often the system
rejects someone it shouldnt.

RELATION OF FAR AND FRR


FAR
Accept wrong person

Low

FRR
Reject the correct person

Security Level

High

MAJOR PLAYERS

Computer access

Physical access

Handheld devices

Military/Govt. Agencies/DOD

Financial services

Hospitals

Telecommunication

SUMMARY

As biometric technology advances, the cost


of systems will decrease.

At the same time, biometrics systems will


become increasingly sophisticated and
accurate.

Scientist will physical and behavioral traits


will increase the usefulness of biometrics.

The general public will gradually come to


accept biometric system.

REFERENCES
Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls Planning and Implementing
Your Network Security System. Ventana Communications Group, Inc.

Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from
Attack.

McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct.
2002.

Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.

Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier
Publishing

Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human
Element of Security. Library Journal.

Das könnte Ihnen auch gefallen