SlideShare a Scribd company logo
Biometric System Concepts
and Attacks
By:
Saif Salah
Rafah Amer Jaafar
Supervisor
Dr. Bashar M. Nema
OUTLINE
❖ What is biometrics and Why need Biometrics
❖ Advantages of biometrics and Disadvantages of biometrics
❖ Biometrics Vs Privacy
❖ Types of biometrics
❖ Comparison of Biometrics
❖ Components of Biometric System
❖ Attack Points in a Biometric system
❖ Known Technologies To Resist the Attacks
❖ The last word
What is biometrics
The term biometrics is derived from the Greek
words bio meaning life and metric meaning to
measure.
Biometrics is a multidisciplinary field
concerned with representing, measuring and
statistical analysis of unique physical and
behavioural characteristics e.g. fingerprints,
face, palm veins, etc. to be used as an
individualized code for recognition [1].
Why need Biometrics
The need and the complexity of recognition of
humans has never been in this great in our history
as it is now, so that, the need for fast and accurate
new technology is increasing day by day, Which
are used in Verification (control access systems),
or Identification (surveillance systems).
The first use of biometrics was to link between
identity documents and their holders through a
face photos as in a passport.
Today the Authentication by biometric verification
is becoming increasingly common and an
indispensable tool to overcome the difficulties
being faced in security systems [1].
Advantages and Benefits of biometrics
❖ Hard to fake or steal, unlike passwords or Key.
❖ Fast Verify a large number of individuals in short
time.
❖ Fast Identify the individual from a very huge
number of people.
❖ Ease of use and convenience (Nothing to forget
or lose it).
❖ Simple change along the user's life.(long life)
❖ Non-transferrable from one to another.
❖ Templates take up less storage space.
❖ Continuous authentication in behavioural
identifiers.
Disadvantages of biometrics
❖ It is costly to get up a biometric system and
running it.
❖ If the system fails to capture all of the
biometric data, it can lead to failure in
identifying the person required.
❖ Databases holding biometric data can still be
hacked.
❖ If a user gets injured or burn, then a biometric
authentication system may fail to identify
them.
❖ Errors such as false rejects can still happen.
Biometrics Vs Privacy
❖ Using biometrics can help to protect privacy
by combating identity fraud, But it is also
can reveal an element of personal privacy.
❖ The biometrics are not usually ‘secret’, and
cannot be easily changed, destroyed or
declared invalid in case it was stolen, this
prevent using it again [2].
Types of biometrics
The two main types of biometric identifiers
depend on either physiological characteristics
or behavioural characteristics.
❑ Physiological identifiers
relate to the unique composition of the user,
include:
● Face recognition.
● Fingerprints.
● Iris recognition.
● DNA matching.
Types of biometrics
❑ Behavioural identifiers
It’s the unique ways in which individuals
act, including
● Handwriting
● keystroke
● Voice recognition.
● Walking speed
● Gestures.
Comparison of Biometrics [3]
Components of Biometric System
The biometric systems
have four basic modules
which are sensor module,
feature extractor module,
matcher module and
decision module [4].
These four modules are
necessary in any
biometric system to
acquire and process raw
biometric data and
convert it into some useful
information. The block
diagram of biometric
system is shown in fig.
1- Sensor Module
In this type of module raw biometric data is
captured by the sensor and it scans the
biometric trait to convert it into digital form.
Components of Biometric System
After converting it to
digital form, this module
transmits the data to
feature extraction module.
2- Feature Extraction Module
It processes the raw data captured by sensor
and generate a biometric template. It extracts
the necessary features from the raw data
which needs much attention because
essential features must be extracted in an
optimal way. It basically removes noise from
the input sample and transmits the sample to
the matcher module.
Components of Biometric System
3- Matcher Module
This module compares the input sample
with the templates being stored in the
database using matching algorithm and
produces match score.
The resulting match score is transmitted to
the decision module.
Components of Biometric System
4- Decision Module
After accepting the match score from
matcher module, it compares the matching
score against the predefined security
threshold. If match score is greater than
predefined security threshold it will accept
the individual otherwise reject it.
Components of Biometric System
Attack Points in a Biometric system
Biometric systems provide great advantages over
traditional systems but they are vulnerable to
attacks. There are eight attack points in biometric
system which can be attacked as shown in the
figure below [5,6].
Sensor
(1) Fake
Biometric
Feature
Extractor
Matcher Application
Database
(2) Replay
Biometric
(3) Override Feature
Extractor
(4) Modify
Feature Vector
(6) Modify
Template
(7) Attacking
the Chanel
(8) Override Final
Decision
(5) Override
Matcher
Attack Points in a Biometric system
(1) Fake Biometric
In this type of attack a fake biometric such as a
fake finger or image of the face is presented at the
sensor.
(2) Replay Biometric
Biometric Signals In this mode of attack a
recorded signal is replayed to the system
bypassing to the sensor.
Attack Points in a Biometric system
(3) Override Feature Extractor
The feature extractor is forced to produce feature
sets chosen by the attacker, instead of the actual
values generated from the data obtained from the
sensor.
(4) Modify Feature Vector
The features extracted using the data obtained
from the sensor is replaced with a different
fraudulent feature set.
(5) Override Matcher
The matcher component is attacked to produce
pre-selected match scores regardless of the input
feature set.
Attack Points in a Biometric system
(6) Modify Template
Modifying one or more templates in the database,
which could result either in authorizing a fraud or
denying service to the person, associated with the
corrupted template.
(7) Attacking the Chanel between Database and the
Matcher
Data traveling from the stored template to the
matcher is intercepted and modified in this form of
attack.
(8) Override Final Decision
Here the final match decision is overridden by the
hacker disabling the entire authentication system.
Known Technologies To Resist the
Attacks [6,7]
1- Liveness Detection Mechanisms
Liveness detection can be used to thwart the
attacks at attack point: 1(attacking the sensor).
Liveness detection refers to the ability of the
system to distinguish between a sample feature
provided by a live human being and a copy of a
feature provided by an artifact. Using extra
hardware to acquire life signs like:
1- pulse detection
2- blood pressure
2- thermal measurement;
4- head, face, eye and pupil movement
Known Technologies To Resist the
Attacks
2- Steganographic and Watermarking Techniques
Steganographic and Watermarking techniques are
used to resist attacks at the attack points 2 and 7
(Channel between the sensor and feature extractor
and also the channel between the stored template
and the matcher).
3- Soft biometrics
Soft biometrics can be used to thwart attacks at the
attack points 1 and 8 (attacks on the sensor and
decision maker). Soft Biometric traits are those
characteristics that provide some information about
the individual, but lack the distinctiveness or
permanence to sufficiently differentiate any two
individuals (gender, ethnicity, age, height, weight
etc).
4- Multi-modal Biometric Systems
Multi-modal biometric systems can be used to
resist spoofing attacks (attacks at point 1). Multi-
modal Biometric systems use multiple
representations of a single biometric, a single
biometric with multiple matchers or multiple
biometric identifiers.
The next table gives a comparison of the
advantages and drawbacks of the different
techniques to prevent attacks.
Known Technologies To Resist the
Attacks
Table : Advantages and drawbacks of the different
protection techniques [7].
The last word
The last word
The last word
The last word
References
❖ [1] Marcel, Sébastien, Mark S. Nixon, and Stan Z. Li. Handbook of biometric anti-spoofing. Vol. 1. New
York: Springer, 2014.
❖ [2] Dunstone, Ted, and Neil Yager. Biometric system and data analysis: Design, evaluation, and data
mining. Springer Science & Business Media, 2008.
❖ [3] Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT Professional
3.1 (2001): 27-32.
❖ [4] Jain, Rubal, and Chander Kant. "Attacks on biometric systems: an overview." International Journal of
Advances in Scientific Research 1.07 (2015): 283-288.
❖ [5] Campisi, Patrizio. Security and privacy in biometrics. Vol. 24. London, UK:: Springer, 2013.
❖ [6] Roberts, Chris. "Biometric attack vectors and defences.“ Computers & Security 26.1 (2007): 14-25.
❖ [7] Ambalakat, Parvathi. "Security of biometric authentication systems." 21st Computer Science Seminar.
2005.

More Related Content

PPT
Biometric encryption
PPTX
ATM System by image processing
PPTX
Object detection with deep learning
PPTX
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
PPTX
Graphical User Authentication
PPTX
Graphical Password Authentication
PPTX
Face Recognition Technology
PPT
graphical password authentication
Biometric encryption
ATM System by image processing
Object detection with deep learning
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Graphical User Authentication
Graphical Password Authentication
Face Recognition Technology
graphical password authentication

What's hot (20)

PDF
Criminal Detection System
PPSX
Face recognition technology - BEST PPT
PPTX
Face Recognition Technology by Vishal Garg
PPTX
Project Face Detection
PPTX
Autopsy Digital forensics tool
DOC
Hotel management-system-hms
PPTX
Credit card fraud detection using machine learning Algorithms
PPTX
Security
PPTX
Facial Recognition Attendance System (Synopsis).pptx
PPTX
Face Recognition
PDF
04 Evidence Collection and Data Seizure - Notes
PPTX
Chatbot
PPTX
Biometric authentication ppt by navin 6 feb
PPT
Biometric Security advantages and disadvantages
PPTX
Facial recognition
DOCX
Biometric Authentication Technology - Report
PPTX
Face Recognition Technology
PPTX
Finger Print Sensor
PPTX
L6 Digital Forensic Investigation Tools.pptx
DOCX
Digital forensics Steps
Criminal Detection System
Face recognition technology - BEST PPT
Face Recognition Technology by Vishal Garg
Project Face Detection
Autopsy Digital forensics tool
Hotel management-system-hms
Credit card fraud detection using machine learning Algorithms
Security
Facial Recognition Attendance System (Synopsis).pptx
Face Recognition
04 Evidence Collection and Data Seizure - Notes
Chatbot
Biometric authentication ppt by navin 6 feb
Biometric Security advantages and disadvantages
Facial recognition
Biometric Authentication Technology - Report
Face Recognition Technology
Finger Print Sensor
L6 Digital Forensic Investigation Tools.pptx
Digital forensics Steps
Ad

Similar to Biometric System ‎Concepts and Attacks (20)

PPTX
Biometric Systems
PPTX
Biometric Systems and Security
PPTX
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
PPT
Chapters_1_2.ppt
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PPTX
Biometric Identification system.pptx
DOCX
Biometrics
PDF
Privacy and ethical issues in Biometric Systems
PPT
Biometrics_ppt.ppt
PPT
Biometrics_ppt.ppt
PPTX
Biometrics in Security
PPTX
Introduction to BIOMETRICS Security.pptx
PDF
Importance of Biometrics data security.pdf
PPTX
Introduction to biometric systems security
PDF
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
PPTX
PDF
Biometric technologies and applications
PDF
Biometrics_basicsandcharacteristics_.pdf
PPT
Biometrics - Chapter 1 Introduction.pptx
PPTX
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
Biometric Systems
Biometric Systems and Security
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Chapters_1_2.ppt
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Biometric Identification system.pptx
Biometrics
Privacy and ethical issues in Biometric Systems
Biometrics_ppt.ppt
Biometrics_ppt.ppt
Biometrics in Security
Introduction to BIOMETRICS Security.pptx
Importance of Biometrics data security.pdf
Introduction to biometric systems security
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
Biometric technologies and applications
Biometrics_basicsandcharacteristics_.pdf
Biometrics - Chapter 1 Introduction.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
Ad

Recently uploaded (20)

PDF
Biophysics 2.pdffffffffffffffffffffffffff
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PDF
The scientific heritage No 166 (166) (2025)
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
Cell Membrane: Structure, Composition & Functions
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PDF
lecture 2026 of Sjogren's syndrome l .pdf
PPTX
BIOMOLECULES PPT........................
PDF
An interstellar mission to test astrophysical black holes
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPTX
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
Derivatives of integument scales, beaks, horns,.pptx
PPTX
Microbiology with diagram medical studies .pptx
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PDF
. Radiology Case Scenariosssssssssssssss
PDF
Placing the Near-Earth Object Impact Probability in Context
PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
Biophysics 2.pdffffffffffffffffffffffffff
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
The scientific heritage No 166 (166) (2025)
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
Cell Membrane: Structure, Composition & Functions
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
lecture 2026 of Sjogren's syndrome l .pdf
BIOMOLECULES PPT........................
An interstellar mission to test astrophysical black holes
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Classification Systems_TAXONOMY_SCIENCE8.pptx
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
Derivatives of integument scales, beaks, horns,.pptx
Microbiology with diagram medical studies .pptx
TOTAL hIP ARTHROPLASTY Presentation.pptx
. Radiology Case Scenariosssssssssssssss
Placing the Near-Earth Object Impact Probability in Context
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.

Biometric System ‎Concepts and Attacks

  • 1. Biometric System Concepts and Attacks By: Saif Salah Rafah Amer Jaafar Supervisor Dr. Bashar M. Nema
  • 2. OUTLINE ❖ What is biometrics and Why need Biometrics ❖ Advantages of biometrics and Disadvantages of biometrics ❖ Biometrics Vs Privacy ❖ Types of biometrics ❖ Comparison of Biometrics ❖ Components of Biometric System ❖ Attack Points in a Biometric system ❖ Known Technologies To Resist the Attacks ❖ The last word
  • 3. What is biometrics The term biometrics is derived from the Greek words bio meaning life and metric meaning to measure. Biometrics is a multidisciplinary field concerned with representing, measuring and statistical analysis of unique physical and behavioural characteristics e.g. fingerprints, face, palm veins, etc. to be used as an individualized code for recognition [1].
  • 4. Why need Biometrics The need and the complexity of recognition of humans has never been in this great in our history as it is now, so that, the need for fast and accurate new technology is increasing day by day, Which are used in Verification (control access systems), or Identification (surveillance systems). The first use of biometrics was to link between identity documents and their holders through a face photos as in a passport. Today the Authentication by biometric verification is becoming increasingly common and an indispensable tool to overcome the difficulties being faced in security systems [1].
  • 5. Advantages and Benefits of biometrics ❖ Hard to fake or steal, unlike passwords or Key. ❖ Fast Verify a large number of individuals in short time. ❖ Fast Identify the individual from a very huge number of people. ❖ Ease of use and convenience (Nothing to forget or lose it). ❖ Simple change along the user's life.(long life) ❖ Non-transferrable from one to another. ❖ Templates take up less storage space. ❖ Continuous authentication in behavioural identifiers.
  • 6. Disadvantages of biometrics ❖ It is costly to get up a biometric system and running it. ❖ If the system fails to capture all of the biometric data, it can lead to failure in identifying the person required. ❖ Databases holding biometric data can still be hacked. ❖ If a user gets injured or burn, then a biometric authentication system may fail to identify them. ❖ Errors such as false rejects can still happen.
  • 7. Biometrics Vs Privacy ❖ Using biometrics can help to protect privacy by combating identity fraud, But it is also can reveal an element of personal privacy. ❖ The biometrics are not usually ‘secret’, and cannot be easily changed, destroyed or declared invalid in case it was stolen, this prevent using it again [2].
  • 8. Types of biometrics The two main types of biometric identifiers depend on either physiological characteristics or behavioural characteristics. ❑ Physiological identifiers relate to the unique composition of the user, include: ● Face recognition. ● Fingerprints. ● Iris recognition. ● DNA matching.
  • 9. Types of biometrics ❑ Behavioural identifiers It’s the unique ways in which individuals act, including ● Handwriting ● keystroke ● Voice recognition. ● Walking speed ● Gestures.
  • 11. Components of Biometric System The biometric systems have four basic modules which are sensor module, feature extractor module, matcher module and decision module [4]. These four modules are necessary in any biometric system to acquire and process raw biometric data and convert it into some useful information. The block diagram of biometric system is shown in fig.
  • 12. 1- Sensor Module In this type of module raw biometric data is captured by the sensor and it scans the biometric trait to convert it into digital form. Components of Biometric System After converting it to digital form, this module transmits the data to feature extraction module.
  • 13. 2- Feature Extraction Module It processes the raw data captured by sensor and generate a biometric template. It extracts the necessary features from the raw data which needs much attention because essential features must be extracted in an optimal way. It basically removes noise from the input sample and transmits the sample to the matcher module. Components of Biometric System
  • 14. 3- Matcher Module This module compares the input sample with the templates being stored in the database using matching algorithm and produces match score. The resulting match score is transmitted to the decision module. Components of Biometric System
  • 15. 4- Decision Module After accepting the match score from matcher module, it compares the matching score against the predefined security threshold. If match score is greater than predefined security threshold it will accept the individual otherwise reject it. Components of Biometric System
  • 16. Attack Points in a Biometric system Biometric systems provide great advantages over traditional systems but they are vulnerable to attacks. There are eight attack points in biometric system which can be attacked as shown in the figure below [5,6]. Sensor (1) Fake Biometric Feature Extractor Matcher Application Database (2) Replay Biometric (3) Override Feature Extractor (4) Modify Feature Vector (6) Modify Template (7) Attacking the Chanel (8) Override Final Decision (5) Override Matcher
  • 17. Attack Points in a Biometric system (1) Fake Biometric In this type of attack a fake biometric such as a fake finger or image of the face is presented at the sensor. (2) Replay Biometric Biometric Signals In this mode of attack a recorded signal is replayed to the system bypassing to the sensor.
  • 18. Attack Points in a Biometric system (3) Override Feature Extractor The feature extractor is forced to produce feature sets chosen by the attacker, instead of the actual values generated from the data obtained from the sensor. (4) Modify Feature Vector The features extracted using the data obtained from the sensor is replaced with a different fraudulent feature set. (5) Override Matcher The matcher component is attacked to produce pre-selected match scores regardless of the input feature set.
  • 19. Attack Points in a Biometric system (6) Modify Template Modifying one or more templates in the database, which could result either in authorizing a fraud or denying service to the person, associated with the corrupted template. (7) Attacking the Chanel between Database and the Matcher Data traveling from the stored template to the matcher is intercepted and modified in this form of attack. (8) Override Final Decision Here the final match decision is overridden by the hacker disabling the entire authentication system.
  • 20. Known Technologies To Resist the Attacks [6,7] 1- Liveness Detection Mechanisms Liveness detection can be used to thwart the attacks at attack point: 1(attacking the sensor). Liveness detection refers to the ability of the system to distinguish between a sample feature provided by a live human being and a copy of a feature provided by an artifact. Using extra hardware to acquire life signs like: 1- pulse detection 2- blood pressure 2- thermal measurement; 4- head, face, eye and pupil movement
  • 21. Known Technologies To Resist the Attacks 2- Steganographic and Watermarking Techniques Steganographic and Watermarking techniques are used to resist attacks at the attack points 2 and 7 (Channel between the sensor and feature extractor and also the channel between the stored template and the matcher). 3- Soft biometrics Soft biometrics can be used to thwart attacks at the attack points 1 and 8 (attacks on the sensor and decision maker). Soft Biometric traits are those characteristics that provide some information about the individual, but lack the distinctiveness or permanence to sufficiently differentiate any two individuals (gender, ethnicity, age, height, weight etc).
  • 22. 4- Multi-modal Biometric Systems Multi-modal biometric systems can be used to resist spoofing attacks (attacks at point 1). Multi- modal Biometric systems use multiple representations of a single biometric, a single biometric with multiple matchers or multiple biometric identifiers. The next table gives a comparison of the advantages and drawbacks of the different techniques to prevent attacks. Known Technologies To Resist the Attacks
  • 23. Table : Advantages and drawbacks of the different protection techniques [7].
  • 28. References ❖ [1] Marcel, Sébastien, Mark S. Nixon, and Stan Z. Li. Handbook of biometric anti-spoofing. Vol. 1. New York: Springer, 2014. ❖ [2] Dunstone, Ted, and Neil Yager. Biometric system and data analysis: Design, evaluation, and data mining. Springer Science & Business Media, 2008. ❖ [3] Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT Professional 3.1 (2001): 27-32. ❖ [4] Jain, Rubal, and Chander Kant. "Attacks on biometric systems: an overview." International Journal of Advances in Scientific Research 1.07 (2015): 283-288. ❖ [5] Campisi, Patrizio. Security and privacy in biometrics. Vol. 24. London, UK:: Springer, 2013. ❖ [6] Roberts, Chris. "Biometric attack vectors and defences.“ Computers & Security 26.1 (2007): 14-25. ❖ [7] Ambalakat, Parvathi. "Security of biometric authentication systems." 21st Computer Science Seminar. 2005.