SlideShare a Scribd company logo
BIOMETRIC ACCURACY
REALITIES AND FALLACIES
Tony Chew
Chief Strategy Officer
V-Key (Singapore)
15 November 2017
Simpler, faster and stronger authentication
WHY WE NEED BIOMETRICS
2
voice
device
eye
IDENTITY VERIFICATION
password
personal data
behavior
3
Deployment of Biometrics in Banking
4
Eye
https://www.ocbc.com/personal-banking/online-banking/campaign/vocal-
password.html?cid=sg:en:others:ebiz:Vocal-Password:Launch:42644:social:Facebook:Link-Post::::
https://www.anz.com.au/promo
/personal/ways-bank/Voice-ID/
https://www.permata
bank.com/
5
Biometrics Accuracy - Realities and Fallacies
AT OCBC, MY VOICE IS MY PASSWORD
7
VOCAL PASSWORD vs FREE SPEECH
8
ANDROID APPLEWINDOWS
FACE BIOMETRICS
FRR 5% @ FAR 0.001%
9
Biometrics Accuracy - Realities and Fallacies
11
FaceID accuracy 1 : 1,000,000
2D vs 3D12
Biometrics Accuracy - Realities and Fallacies
14
AUTHENTICATED
15
BIOMETRIC TEMPLATE IS IRREVERSIBLE
WHY ENCRYPT?
16
PASSWORD
INNOVATRICS IFACE 3.0
FRR 0.6% @ FAR 1%
FRR 1.2% @ FAR 0.1%
17
18
ROC CURVE TEST SCENARIO
1,000 enrolments
1,000 live samples
Cross matching to plot FAR – FRR results
Expected outcomes:
1,000 genuine scores
999,000 impostor scores
1
Measuring biometric accuracy
19
Mobile App Security
20
Device Binding
Jailbreak and Root
Detection
Device encryption
Push Notification
Secure Storage
Geolocation Fencing
Face Authentication
Voice Authentication
One-Time Password
Transaction Signing
Eye Authentication
Fingerprint Authentication
equivalent HSM security
21
Thank You
For any enquiries, please contact us at enquiries@v-key.com

More Related Content

PDF
Biometrics - Future of Authentication
PDF
Biometrics & AI (Artificial Intelligence) is the future of Authentication
PDF
Biometrics - The Future of Authentication in the Banking Industry
PDF
Cybersecurity for Banking & Payments Systems
PDF
Biometric Technology
PDF
Managing Mobile Business Insecurities
PDF
Biometrics Authentication
PDF
Are Mobile Banking Apps Safe?
Biometrics - Future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics - The Future of Authentication in the Banking Industry
Cybersecurity for Banking & Payments Systems
Biometric Technology
Managing Mobile Business Insecurities
Biometrics Authentication
Are Mobile Banking Apps Safe?

What's hot (20)

PDF
Top 7 Mobile Banking Security Tips
PPT
How BYOD Will Shape Wireless Network Security in 2012
PPT
Srand005 message protection
PDF
Instant messaging insight
PDF
The state of mobile app security
PDF
Auth on the web: better authentication
PDF
Techvorm com-android-security-issues-solutions
PDF
5 Ways to Protect your Mobile Security
PDF
2FA in 2020 and Beyond
PDF
WebAuthn
PDF
Creating a Winning Experience While Battling Online Fraud
PDF
VC / PE deals in India in November 2016
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PDF
2015 Cybersecurity Predictions
PPT
Bitdefender Android/Mobile Security
PDF
Droidcon2013 security genes_trendmicro
PDF
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
Your Pathway to Cybersecurity Careers
PDF
Spying Cameras & Spying Phones
Top 7 Mobile Banking Security Tips
How BYOD Will Shape Wireless Network Security in 2012
Srand005 message protection
Instant messaging insight
The state of mobile app security
Auth on the web: better authentication
Techvorm com-android-security-issues-solutions
5 Ways to Protect your Mobile Security
2FA in 2020 and Beyond
WebAuthn
Creating a Winning Experience While Battling Online Fraud
VC / PE deals in India in November 2016
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
2015 Cybersecurity Predictions
Bitdefender Android/Mobile Security
Droidcon2013 security genes_trendmicro
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Your Pathway to Cybersecurity Careers
Spying Cameras & Spying Phones
Ad

Similar to Biometrics Accuracy - Realities and Fallacies (20)

PPTX
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
PDF
Biometric Security Mobile
PPTX
Cyber Vulnerabilities of Biometrics - OWASP 2015
PPTX
Biometric-Authentication-A-Comprehensive-Guide[1].pptx
PDF
"Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)
PPTX
ConnectIdTalk
PPTX
Introduction to Bio-metrics and it's types
PPT
Accuracy of biometrics pw
PPTX
Biometrics-Authentication-Securing-the-Future (1).pptx
PPTX
Biometrics-Authentication-Securing-the-Future (1).pptx
PDF
Biometric Authentication.pdf
PPTX
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
PPTX
Biometric presentation........
PDF
Multi-factor Implicit Biometric Authentication
PDF
The Password Is Dead: An Argument for Multifactor Biometric Authentication
PPT
Bio Metrics
PPT
Ecrime Practical Biometric
PPTX
Biometric authentication
PPT
Biometrics - Chapter 1 Introduction.pptx
PPT
Biometric slideshare
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Biometric Security Mobile
Cyber Vulnerabilities of Biometrics - OWASP 2015
Biometric-Authentication-A-Comprehensive-Guide[1].pptx
"Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)
ConnectIdTalk
Introduction to Bio-metrics and it's types
Accuracy of biometrics pw
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometric Authentication.pdf
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Biometric presentation........
Multi-factor Implicit Biometric Authentication
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Bio Metrics
Ecrime Practical Biometric
Biometric authentication
Biometrics - Chapter 1 Introduction.pptx
Biometric slideshare
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf

Biometrics Accuracy - Realities and Fallacies