SlideShare a Scribd company logo
Biometrics

J E F F VA N TA S S E L
       CAP 480
M R S . M C C A RT HY
Problems with biometrics

 There are a few problems with using biometrics.
 “There are also devices that can capture iris images of a
  person walking within a few feet of a video camera (often
  behind a one-way mirror) so that it can be duplicated
  and used for illegitimate purposes. The real problem with
  biometrics is that once an individual's biometrics has
  been compromised, they are compromised for life and
  can never be trusted again. “(Strassmann, 2002).
 “However, my most severe objection to biometrics as an
  authentication method is their reliance on a central
  database that contains the identifying graphic templates.
  If such database is compromised, then the biometrics of
  ALL users in the database are compromised for life.”
  (Strassmann, 2002).
Solution

 The solution is to use another type of security along
  with using biometric devices.
 “Knowledge tokens, such as passwords, secret
  PINs (Personal Identification Numbers), or
  knowledge of personal data (knowing one's mother's
  maiden name, e.g.), or” Abernathy & Tien. (2003).
 “Physical tokens such as ID cards, passports, chip
  cards, or plain old keys.” Abernathy& Tien. (2003).
What are Biometrics?

 Firstly what are biometrics?
 According to the Electronic Frontier Foundation or EFF
  biometrics are “Biometrics refers to the automatic
  identification or identity verification of living persons
  using their enduring physical or behavioral characteristics.
  Many body parts, personal characteristics and imaging
  methods have been suggested and used for biometric
  systems: fingers, hands, feet, faces, eyes, ears, teeth,
  veins, voices, signatures, typing styles, gaits and odors.”
  (Abernathy & Tien, 2003).
What are biometrics? Continued.

 In other words biometrics is measuring the metrics of our
  biological make up.
 They can measure many different aspects that make up
  our bodies.




   Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
Types of biometric devices.

 The different types of biometric devices are as fallows:
 voice;
 - handwriting;
 - fingerprint(s);
 - face;
 - retina of the eye;
 - iris of the eye.
 And many more…
Pictures of biometric devices.
Facial Recognition

 Facial recognition is another biometric device that is
  heavily used in many different industries.
 It can be used to “geometrically map the face and also
  have a view base of the face. There are 3 algorithms that
  have been well studied that are used in facial recognition
  software; Principal Components Analysis (PCA), Linear
  Discriminant Analysis (LDA), and Elastic Bunch Graph
  Matching (EBGM).” ("Face recognition," 2006).
Facial Recognition Devices




("Gambling on research," 2008).
                              ("Biometrics: Identifying friend," 2010).




("Thesis subject: Biometric," 2006).
                                  ("Thesis subject: Biometric," 2006).
Pros of biometric use

 “With both Biometric systems, you eliminate all
  problems associated with „buddy punching‟, but also
  lost/forgotten/replacement ID cards” ("Using
  biometric time," ).
 They can also be easy to use if set up right.
 They can help make your network more secure.
Picture References

 http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for
    fingerprint types
   http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner
   http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner
   http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner
   Gambling on research. (2008, September 18). Retrieved from
    http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for
    woma‟s face recognition
   Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved
    from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for
    man with many cameras
   Thesis subject: Biometric evaluation platform. (2006). Retrieved from
    http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
References

   Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Who's watching you?. Retrieved from
    https://www.eff.org/wp/biometrics-whos-watching-you
   Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf
   Face recognition. (2006, August 7). Retrieved from
    http://www.biometrics.gov/Documents/facerec.pdf
   Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from
    http://www.strassmann.com/pubs/searchsecurity/2002-
   Using biometric time and attendance solutions. (n.d.). Retrieved from
    http://www.hrindustries.co.uk/biometric-solutions.htm

More Related Content

PPTX
Biometric of technology.ppt
DOC
Biometrics poster
PPTX
Biometrics ppt
PPTX
Biometrics
PPT
Introduction to Biometric lectures... Prepared by Dr.Abbas
DOC
Poster on biometrics
PDF
Final Report Biometrics
PPT
Ear Biometrics
Biometric of technology.ppt
Biometrics poster
Biometrics ppt
Biometrics
Introduction to Biometric lectures... Prepared by Dr.Abbas
Poster on biometrics
Final Report Biometrics
Ear Biometrics

What's hot (20)

PPTX
Biomatric
PPT
Biometric slideshare
PPTX
MULTIMODAL BIOMETRIC SECURITY SYSTEM
DOCX
Fingerprint recognition (term paper) Project
DOCX
Biometrics research paper
PPTX
Biometric authentication ppt by navin 6 feb
PPTX
Biometrics technology
PPTX
Biometrics
PPTX
Biometric security using cryptography
PDF
Fingerprint recognition
PPTX
Biometric authentication
PDF
A Survey on Human Ear Recognition
PDF
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
PPTX
biometrics
PDF
Zahid Akhtar - Ph.D. Defense Slides
PDF
Poster (Version 3)
PDF
Case study on Usage of Biometrics (Cryptography)
DOCX
Biometrics
PPTX
Biometrics and its hacking
Biomatric
Biometric slideshare
MULTIMODAL BIOMETRIC SECURITY SYSTEM
Fingerprint recognition (term paper) Project
Biometrics research paper
Biometric authentication ppt by navin 6 feb
Biometrics technology
Biometrics
Biometric security using cryptography
Fingerprint recognition
Biometric authentication
A Survey on Human Ear Recognition
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
biometrics
Zahid Akhtar - Ph.D. Defense Slides
Poster (Version 3)
Case study on Usage of Biometrics (Cryptography)
Biometrics
Biometrics and its hacking
Ad

Similar to Biometrics (20)

PPTX
Biometrics Technology
PDF
Biometrics Essay
PPTX
Biometrics
PDF
4.report (biometric security system)
PPTX
biometric presentation its scopee a.pptx
PPTX
Biometrics Security System
PPTX
Biometric Identification system.pptx
PPT
Biometricstechnology in iot and machine learning
PDF
International Journal of Computational Engineering Research(IJCER)
PPT
Biometrics Technology Intresting PPT
PPTX
Biometric technology
PDF
Role of fuzzy in multimodal biometrics system
TXT
kiran's slide info
PPT
Biometrics methods...
PDF
Biometrics system penetration in mobile devices
DOCX
Cybersecurity governance-1.docx
PPTX
Biometrics For Security Systems
PPT
Biometric
PPTX
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
PPT
Biometrics
Biometrics Technology
Biometrics Essay
Biometrics
4.report (biometric security system)
biometric presentation its scopee a.pptx
Biometrics Security System
Biometric Identification system.pptx
Biometricstechnology in iot and machine learning
International Journal of Computational Engineering Research(IJCER)
Biometrics Technology Intresting PPT
Biometric technology
Role of fuzzy in multimodal biometrics system
kiran's slide info
Biometrics methods...
Biometrics system penetration in mobile devices
Cybersecurity governance-1.docx
Biometrics For Security Systems
Biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
Biometrics
Ad

Biometrics

  • 1. Biometrics J E F F VA N TA S S E L CAP 480 M R S . M C C A RT HY
  • 2. Problems with biometrics  There are a few problems with using biometrics.  “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individual's biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002).  “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
  • 3. Solution  The solution is to use another type of security along with using biometric devices.  “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing one's mother's maiden name, e.g.), or” Abernathy & Tien. (2003).  “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
  • 4. What are Biometrics?  Firstly what are biometrics?  According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
  • 5. What are biometrics? Continued.  In other words biometrics is measuring the metrics of our biological make up.  They can measure many different aspects that make up our bodies.  Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
  • 6. Types of biometric devices.  The different types of biometric devices are as fallows:  voice;  - handwriting;  - fingerprint(s);  - face;  - retina of the eye;  - iris of the eye.  And many more…
  • 8. Facial Recognition  Facial recognition is another biometric device that is heavily used in many different industries.  It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
  • 9. Facial Recognition Devices ("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010). ("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
  • 10. Pros of biometric use  “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ).  They can also be easy to use if set up right.  They can help make your network more secure.
  • 11. Picture References  http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types  http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner  http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner  http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner  Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition  Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras  Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
  • 12. References  Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Who's watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you  Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf  Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf  Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002-  Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm